SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Virtual Data Room
 From Deal Making to Due Diligence
           Built with the leading Investment Banks and Law Firms, our
           revolutionary technology is used by tens of thousands of
           professionals all over the world.




              www.EthosData.com
Virtual Data Room:
What you need to know and why

Transactions are becoming increasingly more complicated. Deals involve numerous participants who
need access to an escalating number of documents at any given stage of the deal. This creates a huge
administrative burden on lawyers, bankers and companies driving cost up and slowing down execution.

Our Virtual Data Room helps optimize all stages of the deal cycle. From idea marketing to post closing,
with our Virtual Data Room, you can easily and securely share information with potential investors,
buyers and partners.


1. Security:
Our platform is built on the highest industry standards and technology. Our infrastructure has passed
the most demanding security audits and is SAS 70 Level II compliant. You can easily customize security
to each particular user and/or document – which gives you ultimate control over disclosure.


2. Service:
Our experienced Deal Coordinators will work with you to prepare and perform all steps needed to
optimize set up and execution of your transaction. This includes Virtual Data Room structure design,
scanning and upload of documents, permission management and the rest of our suite. Each project is
assigned a local dedicated Deal Coordinator who is available 24/7.


3. Simplicity:
Our interface and process makes it extremely easy for you to manage the Virtual Data Room.
Everything is essentially point-and-click, meaning there is no learning curve. Although the technology-
end of the Virtual Data Room is quite complex, from the user perspective, it could not be easier.


4. Speed:
Virtual Data Rooms can be set up in a matter of minutes. Our interface and infrastructure are designed
to make the process quick and easy so that you can get started immediately.


5. Cost Certainty:
The cost of our Virtual Data Room is certain and transparent. Our fees include unlimited use of our
dedicated Deal Coordinators and their expertise. There are no hidden fees, overnight or weekend
charges.



        24 hours a day, 7 days a week, 365 days a year! Our Deal
      Coordinators have been selected for their M&A experience with
                      banks and investment firms.
Over the years, our platform has evolved with the help of finance professionals, lawyers and
 corporations. All the functionality of our platform is built to optimize transactions, to give our
            users the best and most secure Virtual Data Room experience possible.

Simplicity
The EthosData platform is designed so that both users and administrators can apply its functionality
easily without any training. Its tools and practicality make it very simple for users to get the most from
the platform.

Windows Explorer Look and Feel
Users will be able to start working in the Virtual Data Room almost immediately. Navigation has a very
familiar interface, based on the Windows Explorer aesthetic and functionality. It effortlessly guides users
and administrators through the content, without the time-constraining process of training.

Google Powered Search
All documents are searchable by title and content using the world’s leading search engine, Google .
Search terms can be simple or advanced and search results are prioritized by relevance.

Site Map
The Virtual Data Room provides a single view of the entire project that can be easily printable or
exportable as a worksheet. If you need to work on multiple documents, the Site Map allows you to stay
in the same window instead of digging through various folders.

                                                                     Document Messages
                                                                     Administrators can easily send new
                                                                     content or links to all users. Users can
                                                                     also opt to receive daily or weekly
                                                                     emails highlighting any changes in the
                                                                     Virtual Data Room.

                                                                     New Items
                                                                     Users can get a list of the files that
                                                                     have been uploaded to the project since
                                                                     their last log in date or within a date
                                                                     range. Users can also filter to show only
                                                                     unread documents.




                                                                                        Access your
                                                                                        Virtual Data
                                                                                      Room anywhere
                                                                                       in the world.




                            www.EthosData.com
Security
Security is top priority for our clients. We continually invest to keep our technology and platform secure
and confidential.

Infrastructure Security
Our servers are housed in two geographically remote and highly secure data centers with SunGard
Availability Services (SAS70 Type II certified), the industry-leading hosting service provider that boasts
over 10,000 global clients. These facilities are used by a number of leading banks, government agencies
and blue-chip corporations. Each facility uses real-time replication, multiple connections, alternate power
sources, intrusion detection and state-of-the-art emergency response systems for further data protection.
In addition, fire wall mechanisms, virus scanning and intrusion detection software are continuously
monitored on our platform. The hosting facilities are equipped with video surveillance, proximity card
readers and biometric scanners, which operate 24 hours a day, 7 days a week and 365 days a year.

Application Security
Over the years, our software engineers have responded to client and regulatory requirements to ensure
that our application adheres to the highest security standards. This guarantees that all content is
safeguarded against unauthorized access.

Data Encryption
All communication transmitted to and from the Virtual Data Room is protected with 128-bit encryption.

Document Protection and Locking
We use the strongest document level protection available. Our document security provides the ability to
remotely lock down PDF documents. The site administrator can easily control whether users can copy,
print, forward or alter a document.
Our Virtual Data Room can block the use of the “print screen” key, and add a personalized watermark.
This encryption and locking functionality can be enforced on any PDF document posted to the Virtual
Data Room system. Our Virtual Data Room allows you to track and audit usage and even alter
permissions and revoke read access after the document has been distributed.

Process Security
Our operations have been audited for processes, technology and security by leading financial institutions
and law firms. We also perform regular internal audits to ensure that all points of potential data
compromise are minimized.

Personnel Security
In addition to layers of technical security, we rigorously screen our staff, requiring each employee to sign a
non-disclosure agreement. All EthosData employees from software engineers to account managers, undergo
a thorough background check. All members of staff go through comprehensive training in data privacy and
compliance prior to any involvement in client transactions. All client data is kept strictly confidential and all
user passwords are stored in our secure database in a hash format, inaccessible by even our technical team.




                                                                       Taking every precaution to
                                                                      ensure that your deal is safe
                                                                              and secure




                             www.EthosData.com
Advanced Functionality
Our Virtual Data Room provides simple, effective tools that allow our clients to obtain valuable
information regarding the individual interest of each user. It also tracks every single action for
compliance, and provides a very powerful and easy to use platform to organize all questions and
answers about a document or folder.

Reporting
Get detailed information about the activities of each user or organization including what documents he
or she has viewed, questions asked and log-ins. Information is presented in an easy-to-read graphical
format. The underlying detailed information can be exported to Excel for further analysis.

QnA
Manage the entire the flow of questions and comments about a given document with convenience and
ease. Administrators can answer multiple questions, add links to existing documents and export to
Excel for easy organization.

Audit
The Virtual Data Room logs every action performed by users in the system. Site administrators can
search these actions using our comprehensive audit search tool. Each audit record will provide
information on the action, the user that performed the action, the exact date and time when the action
was performed, and any additional metadata relevant to the action. This ensures full coverage to
minimize the risks associated with all aspects of compliance and disclosure.




                                                             Customized to your
                                                          specifications for ultimate
                                                                  disclosure

Speed
Our platform and processes are set up so that projects can be launched in minutes.

Add a folder structure in one go
Easily upload entire projects with multiple files and folders. No need for cumbersome installations or
plug-ins.

Bulk upload of users
Adding a list of users is as easy as pasting their email addresses together in one text box. The platform
will do the rest, guiding the administrator through the process with a few simple steps.

Open documents fast
Our PDF based document encryption provides a secure and speedy experience for the user. Users can
also download more than one file at a time with the bulk download tool.


                          www.EthosData.com
Speed, Security and Service
brought to you by EthosData the leading provider of
critical document exchange services.




                        www.EthosData.com
                      contact@EthosData.com



                               (c) 2010 EthosData Limited

Weitere ähnliche Inhalte

Was ist angesagt?

Restore brochure optimising document management through technology
Restore brochure optimising document management through technologyRestore brochure optimising document management through technology
Restore brochure optimising document management through technologyNicola (Grice) Tatters
 
Project Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for HadoopProject Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for HadoopCloudera, Inc.
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...eSAT Publishing House
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniquesijcsa
 
Article data-centric security key to cloud and digital business
Article   data-centric security key to cloud and digital businessArticle   data-centric security key to cloud and digital business
Article data-centric security key to cloud and digital businessUlf Mattsson
 
Advanced redaction whitepaper
Advanced redaction whitepaperAdvanced redaction whitepaper
Advanced redaction whitepaperMark_Miller
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureInformation Technology
 
IRJET- Secure E-Documents Storage using Blockchain
IRJET- Secure E-Documents Storage using BlockchainIRJET- Secure E-Documents Storage using Blockchain
IRJET- Secure E-Documents Storage using BlockchainIRJET Journal
 
Design an active verification mechanism for certificates revocation in OCSP f...
Design an active verification mechanism for certificates revocation in OCSP f...Design an active verification mechanism for certificates revocation in OCSP f...
Design an active verification mechanism for certificates revocation in OCSP f...IJECEIAES
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyDavid J Rosenthal
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationIJSRD
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceVignesh Ganesan I Microsoft MVP
 
DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)Abdullah Ozturk
 
DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2Lucas Gritziotis
 
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Okta-Inc
 

Was ist angesagt? (20)

Restore brochure optimising document management through technology
Restore brochure optimising document management through technologyRestore brochure optimising document management through technology
Restore brochure optimising document management through technology
 
Project Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for HadoopProject Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for Hadoop
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...
 
489 493
489 493489 493
489 493
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
 
PKI by Tim Polk
PKI by Tim PolkPKI by Tim Polk
PKI by Tim Polk
 
Article data-centric security key to cloud and digital business
Article   data-centric security key to cloud and digital businessArticle   data-centric security key to cloud and digital business
Article data-centric security key to cloud and digital business
 
Advanced redaction whitepaper
Advanced redaction whitepaperAdvanced redaction whitepaper
Advanced redaction whitepaper
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
 
IRJET- Secure E-Documents Storage using Blockchain
IRJET- Secure E-Documents Storage using BlockchainIRJET- Secure E-Documents Storage using Blockchain
IRJET- Secure E-Documents Storage using Blockchain
 
4AA4-1812ENW
4AA4-1812ENW4AA4-1812ENW
4AA4-1812ENW
 
Design an active verification mechanism for certificates revocation in OCSP f...
Design an active verification mechanism for certificates revocation in OCSP f...Design an active verification mechanism for certificates revocation in OCSP f...
Design an active verification mechanism for certificates revocation in OCSP f...
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and Compliance
 
DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)
 
DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2
 
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
 

Ähnlich wie 20100420 ethosdata brochure

Virtual Data Room Brochure
Virtual Data Room BrochureVirtual Data Room Brochure
Virtual Data Room BrochureEthosData
 
Inforouterproducttour V7
Inforouterproducttour V7Inforouterproducttour V7
Inforouterproducttour V7Charles Rey
 
Laserfiche cloud factsheet
Laserfiche cloud factsheetLaserfiche cloud factsheet
Laserfiche cloud factsheetCorey Robert
 
N2WDMS - A Workflow and Document Management Software
N2WDMS - A Workflow and Document Management SoftwareN2WDMS - A Workflow and Document Management Software
N2WDMS - A Workflow and Document Management SoftwarePranaySoluSoft
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010dcampbellelite
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010Darrin Campbell
 
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET Journal
 
CESSI Digital Library Case Study Eng
CESSI Digital Library Case Study EngCESSI Digital Library Case Study Eng
CESSI Digital Library Case Study Engatolomei
 
How Virtual Data Rooms Are Revolutionizing Business Transactions.pdf
How Virtual Data Rooms Are Revolutionizing Business Transactions.pdfHow Virtual Data Rooms Are Revolutionizing Business Transactions.pdf
How Virtual Data Rooms Are Revolutionizing Business Transactions.pdfHokme
 
Landmark In Control Product Flyer
Landmark In Control Product FlyerLandmark In Control Product Flyer
Landmark In Control Product Flyertaglia3
 
LegalAnywhereConnect Brochure
LegalAnywhereConnect BrochureLegalAnywhereConnect Brochure
LegalAnywhereConnect BrochureNancy DaCorsi
 
Mobile content generation application | Wireless Community Network Enabler#
Mobile content generation application | Wireless Community Network Enabler#Mobile content generation application | Wireless Community Network Enabler#
Mobile content generation application | Wireless Community Network Enabler#Mike Taylor
 
Wireless mobile content genteration application with RSS feed integration
Wireless mobile content genteration application with RSS feed integrationWireless mobile content genteration application with RSS feed integration
Wireless mobile content genteration application with RSS feed integrationMike Taylor
 

Ähnlich wie 20100420 ethosdata brochure (20)

LiveDOCS
LiveDOCSLiveDOCS
LiveDOCS
 
Virtual Data Room Brochure
Virtual Data Room BrochureVirtual Data Room Brochure
Virtual Data Room Brochure
 
eQuorum-eBook-6-2021.pdf
eQuorum-eBook-6-2021.pdfeQuorum-eBook-6-2021.pdf
eQuorum-eBook-6-2021.pdf
 
Inforouterproducttour V7
Inforouterproducttour V7Inforouterproducttour V7
Inforouterproducttour V7
 
Electronic Data Discovery
Electronic Data DiscoveryElectronic Data Discovery
Electronic Data Discovery
 
Tech Vault Solution
Tech Vault SolutionTech Vault Solution
Tech Vault Solution
 
Laserfiche cloud factsheet
Laserfiche cloud factsheetLaserfiche cloud factsheet
Laserfiche cloud factsheet
 
N2WDMS - A Workflow and Document Management Software
N2WDMS - A Workflow and Document Management SoftwareN2WDMS - A Workflow and Document Management Software
N2WDMS - A Workflow and Document Management Software
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010
 
DTI Overview Presentation 2010
DTI Overview Presentation 2010DTI Overview Presentation 2010
DTI Overview Presentation 2010
 
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...IRJET -  	  Secure Data Sharing in Cloud Computing using Revocable Storage Id...
IRJET - Secure Data Sharing in Cloud Computing using Revocable Storage Id...
 
DocTrix DocFlow 2013
DocTrix DocFlow 2013DocTrix DocFlow 2013
DocTrix DocFlow 2013
 
CESSI Digital Library Case Study Eng
CESSI Digital Library Case Study EngCESSI Digital Library Case Study Eng
CESSI Digital Library Case Study Eng
 
How Virtual Data Rooms Are Revolutionizing Business Transactions.pdf
How Virtual Data Rooms Are Revolutionizing Business Transactions.pdfHow Virtual Data Rooms Are Revolutionizing Business Transactions.pdf
How Virtual Data Rooms Are Revolutionizing Business Transactions.pdf
 
Landmark In Control Product Flyer
Landmark In Control Product FlyerLandmark In Control Product Flyer
Landmark In Control Product Flyer
 
Abhilash_Documentum
Abhilash_Documentum Abhilash_Documentum
Abhilash_Documentum
 
Abhilash_Documentum
Abhilash_Documentum Abhilash_Documentum
Abhilash_Documentum
 
LegalAnywhereConnect Brochure
LegalAnywhereConnect BrochureLegalAnywhereConnect Brochure
LegalAnywhereConnect Brochure
 
Mobile content generation application | Wireless Community Network Enabler#
Mobile content generation application | Wireless Community Network Enabler#Mobile content generation application | Wireless Community Network Enabler#
Mobile content generation application | Wireless Community Network Enabler#
 
Wireless mobile content genteration application with RSS feed integration
Wireless mobile content genteration application with RSS feed integrationWireless mobile content genteration application with RSS feed integration
Wireless mobile content genteration application with RSS feed integration
 

Kürzlich hochgeladen

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Kürzlich hochgeladen (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

20100420 ethosdata brochure

  • 1. Virtual Data Room From Deal Making to Due Diligence Built with the leading Investment Banks and Law Firms, our revolutionary technology is used by tens of thousands of professionals all over the world. www.EthosData.com
  • 2. Virtual Data Room: What you need to know and why Transactions are becoming increasingly more complicated. Deals involve numerous participants who need access to an escalating number of documents at any given stage of the deal. This creates a huge administrative burden on lawyers, bankers and companies driving cost up and slowing down execution. Our Virtual Data Room helps optimize all stages of the deal cycle. From idea marketing to post closing, with our Virtual Data Room, you can easily and securely share information with potential investors, buyers and partners. 1. Security: Our platform is built on the highest industry standards and technology. Our infrastructure has passed the most demanding security audits and is SAS 70 Level II compliant. You can easily customize security to each particular user and/or document – which gives you ultimate control over disclosure. 2. Service: Our experienced Deal Coordinators will work with you to prepare and perform all steps needed to optimize set up and execution of your transaction. This includes Virtual Data Room structure design, scanning and upload of documents, permission management and the rest of our suite. Each project is assigned a local dedicated Deal Coordinator who is available 24/7. 3. Simplicity: Our interface and process makes it extremely easy for you to manage the Virtual Data Room. Everything is essentially point-and-click, meaning there is no learning curve. Although the technology- end of the Virtual Data Room is quite complex, from the user perspective, it could not be easier. 4. Speed: Virtual Data Rooms can be set up in a matter of minutes. Our interface and infrastructure are designed to make the process quick and easy so that you can get started immediately. 5. Cost Certainty: The cost of our Virtual Data Room is certain and transparent. Our fees include unlimited use of our dedicated Deal Coordinators and their expertise. There are no hidden fees, overnight or weekend charges. 24 hours a day, 7 days a week, 365 days a year! Our Deal Coordinators have been selected for their M&A experience with banks and investment firms.
  • 3. Over the years, our platform has evolved with the help of finance professionals, lawyers and corporations. All the functionality of our platform is built to optimize transactions, to give our users the best and most secure Virtual Data Room experience possible. Simplicity The EthosData platform is designed so that both users and administrators can apply its functionality easily without any training. Its tools and practicality make it very simple for users to get the most from the platform. Windows Explorer Look and Feel Users will be able to start working in the Virtual Data Room almost immediately. Navigation has a very familiar interface, based on the Windows Explorer aesthetic and functionality. It effortlessly guides users and administrators through the content, without the time-constraining process of training. Google Powered Search All documents are searchable by title and content using the world’s leading search engine, Google . Search terms can be simple or advanced and search results are prioritized by relevance. Site Map The Virtual Data Room provides a single view of the entire project that can be easily printable or exportable as a worksheet. If you need to work on multiple documents, the Site Map allows you to stay in the same window instead of digging through various folders. Document Messages Administrators can easily send new content or links to all users. Users can also opt to receive daily or weekly emails highlighting any changes in the Virtual Data Room. New Items Users can get a list of the files that have been uploaded to the project since their last log in date or within a date range. Users can also filter to show only unread documents. Access your Virtual Data Room anywhere in the world. www.EthosData.com
  • 4. Security Security is top priority for our clients. We continually invest to keep our technology and platform secure and confidential. Infrastructure Security Our servers are housed in two geographically remote and highly secure data centers with SunGard Availability Services (SAS70 Type II certified), the industry-leading hosting service provider that boasts over 10,000 global clients. These facilities are used by a number of leading banks, government agencies and blue-chip corporations. Each facility uses real-time replication, multiple connections, alternate power sources, intrusion detection and state-of-the-art emergency response systems for further data protection. In addition, fire wall mechanisms, virus scanning and intrusion detection software are continuously monitored on our platform. The hosting facilities are equipped with video surveillance, proximity card readers and biometric scanners, which operate 24 hours a day, 7 days a week and 365 days a year. Application Security Over the years, our software engineers have responded to client and regulatory requirements to ensure that our application adheres to the highest security standards. This guarantees that all content is safeguarded against unauthorized access. Data Encryption All communication transmitted to and from the Virtual Data Room is protected with 128-bit encryption. Document Protection and Locking We use the strongest document level protection available. Our document security provides the ability to remotely lock down PDF documents. The site administrator can easily control whether users can copy, print, forward or alter a document. Our Virtual Data Room can block the use of the “print screen” key, and add a personalized watermark. This encryption and locking functionality can be enforced on any PDF document posted to the Virtual Data Room system. Our Virtual Data Room allows you to track and audit usage and even alter permissions and revoke read access after the document has been distributed. Process Security Our operations have been audited for processes, technology and security by leading financial institutions and law firms. We also perform regular internal audits to ensure that all points of potential data compromise are minimized. Personnel Security In addition to layers of technical security, we rigorously screen our staff, requiring each employee to sign a non-disclosure agreement. All EthosData employees from software engineers to account managers, undergo a thorough background check. All members of staff go through comprehensive training in data privacy and compliance prior to any involvement in client transactions. All client data is kept strictly confidential and all user passwords are stored in our secure database in a hash format, inaccessible by even our technical team. Taking every precaution to ensure that your deal is safe and secure www.EthosData.com
  • 5. Advanced Functionality Our Virtual Data Room provides simple, effective tools that allow our clients to obtain valuable information regarding the individual interest of each user. It also tracks every single action for compliance, and provides a very powerful and easy to use platform to organize all questions and answers about a document or folder. Reporting Get detailed information about the activities of each user or organization including what documents he or she has viewed, questions asked and log-ins. Information is presented in an easy-to-read graphical format. The underlying detailed information can be exported to Excel for further analysis. QnA Manage the entire the flow of questions and comments about a given document with convenience and ease. Administrators can answer multiple questions, add links to existing documents and export to Excel for easy organization. Audit The Virtual Data Room logs every action performed by users in the system. Site administrators can search these actions using our comprehensive audit search tool. Each audit record will provide information on the action, the user that performed the action, the exact date and time when the action was performed, and any additional metadata relevant to the action. This ensures full coverage to minimize the risks associated with all aspects of compliance and disclosure. Customized to your specifications for ultimate disclosure Speed Our platform and processes are set up so that projects can be launched in minutes. Add a folder structure in one go Easily upload entire projects with multiple files and folders. No need for cumbersome installations or plug-ins. Bulk upload of users Adding a list of users is as easy as pasting their email addresses together in one text box. The platform will do the rest, guiding the administrator through the process with a few simple steps. Open documents fast Our PDF based document encryption provides a secure and speedy experience for the user. Users can also download more than one file at a time with the bulk download tool. www.EthosData.com
  • 6. Speed, Security and Service brought to you by EthosData the leading provider of critical document exchange services. www.EthosData.com contact@EthosData.com (c) 2010 EthosData Limited