SlideShare ist ein Scribd-Unternehmen logo
1 von 9
PRESENTATION

Mergers and Acquisitions
Firmex provides a secure custom branded data room
          backed by exceptional service
Personalized Home Screen for Sharing Due Diligence
                   Documents
Import a Due Diligence List, Upload Documents and
            share with External Parties
Disable Print & Text Copy, Enforce a Watermark and
   Expire Access on all PDF or Office Documents
Assign User Access and Retain Control over your
            Confidential Documents
Reports to provide visibility, control, and an audit trail
Automatic email alerts to keep parties informed of new
documents that have been made available
Security that gives you peace of mind




Secured with SunGard and SOC II Compliant
We take extreme measures to secure your data in a world-class SAS 70 Type II compliant data
center facility hosted by SunGard, the same company that serves the world’s 25 largest financial services firms.

Physical Security:
24/7 onsite staffing and closed circuit cameras, access secured with biometrics and key cards

Continuous Connectivity:
Automated real-time fail-over to hot standby and onsite engineers, along with offsite backup and server redundancy

Failsafe Power Management Systems:
Redundant power infrastructure with two independent power sources, and an emergency back-up generator

Advanced Environmental Controls:
Automated building monitoring with redundant HVAC system and extensive measures for fire prevention and
containment

Weitere ähnliche Inhalte

Was ist angesagt?

Executive Overview
Executive OverviewExecutive Overview
Executive Overviewneprel
 
Executive Overview
Executive OverviewExecutive Overview
Executive Overviewmjordan100
 
Soc 2 vs iso 27001 certification withh links converted-converted
Soc 2 vs iso 27001 certification withh links converted-convertedSoc 2 vs iso 27001 certification withh links converted-converted
Soc 2 vs iso 27001 certification withh links converted-convertedVISTA InfoSec
 
PD_CL_HIPAACompliantCloud_0116
PD_CL_HIPAACompliantCloud_0116PD_CL_HIPAACompliantCloud_0116
PD_CL_HIPAACompliantCloud_0116Ryan Busch
 
Log Monitoring and Fie Integrity Monitoring
Log Monitoring and Fie Integrity MonitoringLog Monitoring and Fie Integrity Monitoring
Log Monitoring and Fie Integrity MonitoringControlCase
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as UsualControlCase
 
Data Discovery and PCI DSS
Data Discovery and PCI DSSData Discovery and PCI DSS
Data Discovery and PCI DSSControlCase
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?VISTA InfoSec
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated ComplianceControlCase
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated ComplianceControlCase
 
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...ControlCase
 
PCI DSS & PA DSS Version 3.0 Changes Webinar
PCI DSS & PA DSS Version 3.0 Changes WebinarPCI DSS & PA DSS Version 3.0 Changes Webinar
PCI DSS & PA DSS Version 3.0 Changes WebinarControlCase
 
PCI Compliance in the Cloud
PCI Compliance in the CloudPCI Compliance in the Cloud
PCI Compliance in the CloudControlCase
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as UsualControlCase
 
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PALog Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PAControlCase
 
OneAudit™ - Assess Once, Certify to Many
OneAudit™ - Assess Once, Certify to ManyOneAudit™ - Assess Once, Certify to Many
OneAudit™ - Assess Once, Certify to ManyControlCase
 

Was ist angesagt? (17)

Executive Overview
Executive OverviewExecutive Overview
Executive Overview
 
Executive Overview
Executive OverviewExecutive Overview
Executive Overview
 
Soc 2 vs iso 27001 certification withh links converted-converted
Soc 2 vs iso 27001 certification withh links converted-convertedSoc 2 vs iso 27001 certification withh links converted-converted
Soc 2 vs iso 27001 certification withh links converted-converted
 
PD_CL_HIPAACompliantCloud_0116
PD_CL_HIPAACompliantCloud_0116PD_CL_HIPAACompliantCloud_0116
PD_CL_HIPAACompliantCloud_0116
 
Log Monitoring and Fie Integrity Monitoring
Log Monitoring and Fie Integrity MonitoringLog Monitoring and Fie Integrity Monitoring
Log Monitoring and Fie Integrity Monitoring
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as Usual
 
Data Discovery and PCI DSS
Data Discovery and PCI DSSData Discovery and PCI DSS
Data Discovery and PCI DSS
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated Compliance
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated Compliance
 
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
 
PCI DSS & PA DSS Version 3.0 Changes Webinar
PCI DSS & PA DSS Version 3.0 Changes WebinarPCI DSS & PA DSS Version 3.0 Changes Webinar
PCI DSS & PA DSS Version 3.0 Changes Webinar
 
PCI Compliance in the Cloud
PCI Compliance in the CloudPCI Compliance in the Cloud
PCI Compliance in the Cloud
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as Usual
 
Agiliance Wp Key Steps
Agiliance Wp Key StepsAgiliance Wp Key Steps
Agiliance Wp Key Steps
 
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PALog Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
 
OneAudit™ - Assess Once, Certify to Many
OneAudit™ - Assess Once, Certify to ManyOneAudit™ - Assess Once, Certify to Many
OneAudit™ - Assess Once, Certify to Many
 

Andere mochten auch (6)

Chinese Netizen Speak
Chinese Netizen SpeakChinese Netizen Speak
Chinese Netizen Speak
 
建和書屋的故事
建和書屋的故事建和書屋的故事
建和書屋的故事
 
text catalog pediatrie
text catalog pediatrietext catalog pediatrie
text catalog pediatrie
 
Our approach
Our approachOur approach
Our approach
 
Project writing
Project writingProject writing
Project writing
 
Mangerial econo
Mangerial econoMangerial econo
Mangerial econo
 

Ähnlich wie Presentation mergers and acquisitions

Executive Overview
Executive OverviewExecutive Overview
Executive Overviewiorlenko
 
Executive Overview
Executive OverviewExecutive Overview
Executive Overviewcponder
 
Citadon Hosting Services
Citadon Hosting ServicesCitadon Hosting Services
Citadon Hosting Serviceswebhostingguy
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPNAjay Nawani
 
Overview of Office 365 - Presentation By Sajid
Overview of Office 365  - Presentation By Sajid Overview of Office 365  - Presentation By Sajid
Overview of Office 365 - Presentation By Sajid srafiq
 
Journey to the Cloud with Dora The Explorer (Spookinnati Version)
Journey to the Cloud with Dora The Explorer (Spookinnati Version)Journey to the Cloud with Dora The Explorer (Spookinnati Version)
Journey to the Cloud with Dora The Explorer (Spookinnati Version)Seb Matthews
 
Restore brochure optimising document management through technology
Restore brochure optimising document management through technologyRestore brochure optimising document management through technology
Restore brochure optimising document management through technologyNicola (Grice) Tatters
 
azure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdfazure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdfBenAissaTaher1
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security OverviewAllen Brokken
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
AlphaGuardian Networks: Secure, Analytic, Optimized Industrial IoT
AlphaGuardian Networks: Secure, Analytic, Optimized Industrial IoTAlphaGuardian Networks: Secure, Analytic, Optimized Industrial IoT
AlphaGuardian Networks: Secure, Analytic, Optimized Industrial IoTAlphaGuardian Networks
 
Cyberdyne systems (2)
Cyberdyne systems (2)Cyberdyne systems (2)
Cyberdyne systems (2)Bryan Moss
 
Fasoo Secure Document (FSD) for SharePoint
Fasoo Secure Document (FSD) for SharePoint Fasoo Secure Document (FSD) for SharePoint
Fasoo Secure Document (FSD) for SharePoint Fasoo
 
Brochure Data Center
Brochure Data CenterBrochure Data Center
Brochure Data Centerbryanpsu
 
Windows 7 And Windows Server 2008 R2 Combined Value
Windows 7 And Windows Server 2008 R2 Combined ValueWindows 7 And Windows Server 2008 R2 Combined Value
Windows 7 And Windows Server 2008 R2 Combined ValueAmit Gatenyo
 
Panduit EMEA SI Webinar 8
Panduit EMEA SI Webinar 8Panduit EMEA SI Webinar 8
Panduit EMEA SI Webinar 8Panduit
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPNetwork_security
 

Ähnlich wie Presentation mergers and acquisitions (20)

Executive Overview
Executive OverviewExecutive Overview
Executive Overview
 
Executive Overview
Executive OverviewExecutive Overview
Executive Overview
 
Executive Overview
Executive OverviewExecutive Overview
Executive Overview
 
Citadon Hosting Services
Citadon Hosting ServicesCitadon Hosting Services
Citadon Hosting Services
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Overview of Office 365 - Presentation By Sajid
Overview of Office 365  - Presentation By Sajid Overview of Office 365  - Presentation By Sajid
Overview of Office 365 - Presentation By Sajid
 
Expedient Pyramid
Expedient Pyramid Expedient Pyramid
Expedient Pyramid
 
Journey to the Cloud with Dora The Explorer (Spookinnati Version)
Journey to the Cloud with Dora The Explorer (Spookinnati Version)Journey to the Cloud with Dora The Explorer (Spookinnati Version)
Journey to the Cloud with Dora The Explorer (Spookinnati Version)
 
Restore brochure optimising document management through technology
Restore brochure optimising document management through technologyRestore brochure optimising document management through technology
Restore brochure optimising document management through technology
 
Confisio Datacenter
Confisio DatacenterConfisio Datacenter
Confisio Datacenter
 
azure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdfazure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdf
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
AlphaGuardian Networks: Secure, Analytic, Optimized Industrial IoT
AlphaGuardian Networks: Secure, Analytic, Optimized Industrial IoTAlphaGuardian Networks: Secure, Analytic, Optimized Industrial IoT
AlphaGuardian Networks: Secure, Analytic, Optimized Industrial IoT
 
Cyberdyne systems (2)
Cyberdyne systems (2)Cyberdyne systems (2)
Cyberdyne systems (2)
 
Fasoo Secure Document (FSD) for SharePoint
Fasoo Secure Document (FSD) for SharePoint Fasoo Secure Document (FSD) for SharePoint
Fasoo Secure Document (FSD) for SharePoint
 
Brochure Data Center
Brochure Data CenterBrochure Data Center
Brochure Data Center
 
Windows 7 And Windows Server 2008 R2 Combined Value
Windows 7 And Windows Server 2008 R2 Combined ValueWindows 7 And Windows Server 2008 R2 Combined Value
Windows 7 And Windows Server 2008 R2 Combined Value
 
Panduit EMEA SI Webinar 8
Panduit EMEA SI Webinar 8Panduit EMEA SI Webinar 8
Panduit EMEA SI Webinar 8
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 

Presentation mergers and acquisitions

  • 2. Firmex provides a secure custom branded data room backed by exceptional service
  • 3. Personalized Home Screen for Sharing Due Diligence Documents
  • 4. Import a Due Diligence List, Upload Documents and share with External Parties
  • 5. Disable Print & Text Copy, Enforce a Watermark and Expire Access on all PDF or Office Documents
  • 6. Assign User Access and Retain Control over your Confidential Documents
  • 7. Reports to provide visibility, control, and an audit trail
  • 8. Automatic email alerts to keep parties informed of new documents that have been made available
  • 9. Security that gives you peace of mind Secured with SunGard and SOC II Compliant We take extreme measures to secure your data in a world-class SAS 70 Type II compliant data center facility hosted by SunGard, the same company that serves the world’s 25 largest financial services firms. Physical Security: 24/7 onsite staffing and closed circuit cameras, access secured with biometrics and key cards Continuous Connectivity: Automated real-time fail-over to hot standby and onsite engineers, along with offsite backup and server redundancy Failsafe Power Management Systems: Redundant power infrastructure with two independent power sources, and an emergency back-up generator Advanced Environmental Controls: Automated building monitoring with redundant HVAC system and extensive measures for fire prevention and containment