Eliminate the Paper Chase

Size: px
Start display at page:

Download "Eliminate the Paper Chase"

Transcription

1 Eliminate the Paper Chase with V-Rooms Virtual Data Rooms V-Rooms is an Internet-based, ondemand hosted service designed to speed the completion of financial transactions which may involve hundreds of participants and require the distribution of thousands of pages of documents. Our virtual data rooms enable clients to accelerate these complex, information-intensive business transactions and processes, while reducing the time and expenses associated with data distribution, courier, printing and travel. From only $395 per Month (See pricing options on the enclosed Order Form) Brochure Contents 1. Overview 2. Our Clients 3. Our Approach 4. Features 5. Security 6. Data Center 7. Room Set-Up 8. Room Pricing Why use V-Rooms? We provide a very economical, yet full-featured, virtual data room alternative. Your virtual data room can be set-up and fully loaded within hours. You can easily administer your own virtual room, upload documents and manage users. We provide comprehensive customer and technical support 24/7. Please visit our NARRATED GUIDED TOUR and SAMPLE ROOMS 1

2 What do our clients say about V-Rooms? Since 2004, domestic and international companies have trusted V-Rooms as their full service Virtual Data Room Solution Provider. The partial client listing below includes many nationally well-known, industry-leading companies. Hear what our clients are saying about V-Rooms... "We were extremely pleased with our V Rooms Virtual Due Diligence Room. The room allowed us to provide all of the requested data in a clear and concise manner. Our ultimate purchaser repeatedly commented that this due diligence process was one of the cleanest and easiest they had performed. I am certain that the due diligence room was a big reason for a quick and smooth transaction." Cris Cristea Chief Operating Officer Mercy CarePlus Having been through this process previously, I believe the V Rooms Virtual Data Room saved us hundreds of man hours, managing the data query process, and dealing with the version control problems associated with a paper system. Several prospective buyers commented that it was the most efficient and orderly bidding process they had been through. Robert Picchi Principal Blue Ridge Advisory Services Group being a small privately held company, V Rooms proved to be the most economical yet highly function solution for our needs during our due diligence period. The system was set up within hours and was extremely easy to use both at the administration and end users levels. V Rooms was key in meeting our closing target. Ralph Genesi President and CEO Swantech, Inc. Our solution focuses on the need of mid-cap businesses to be able to safely and securely share sensitive and confidential documents online. Our staff can handle all of the administrative details of scanning, uploading and organizing documents. We have facilitated projects with hundreds of users and thousands of files. Our dedication to quality, security, and confidentiality has helped to build these and many other loyal client relationships. 2

3 So how is our approach different from other online deal rooms? The cost for our Virtual Deal Room is typically a fraction of the amount charged by other providers. Secure SSL data encryption, the same as used by banks and Fortune 500 Companies. Customer and Technical Support available 24/7 for your convenience. Highly secure data centers with 99.5% Availability - SAS-70 Compliant and ITIL Certified. Multiple Security Levels (9) restrict access to certain information to only selected users. Dynamic CONFIDENTIAL WATERMARKING on every page of every PDF document that shows the buyer s name/identity and time of downloading to deter file sharing. Private Label Branding opportunity prominently features your company logo. Easily administer your Virtual Data Rooms; add documents and users. Include your Virtual Roadshow (audio/video presentations) in addition to hundreds of documents. Our program requires absolutely no training for the buyer or investor to use. Just point and click. Electronically distribute Offering Documents or Private Placement Memorandum documents while tracking user access. As a Group Administrator, manage up to 1,000 Virtual Rooms for your company. 3

4 What are the features and capabilities of the V-Rooms Virtual Room program? Access Levels - Clients have the ability to assign up to nine access levels based on a hierarchy with virtual room users, allowing clients to grant varying levels of access to a given user. Activity Reports - The ability to effectively track a buyer s or investor's interests creates insight into who is the most interested in the deal and who has lost interest, saving valuable time and expense in the funding process. Archiving At the conclusion of a transaction, client administrators can create backup copies of all reports and related data relating to their work rooms, useful for auditing and record keeping purposes. Audit Requirements - Companies can effectively manage deal audit requirements by eliminating the need to track hard copy documents, faxes and s which create unnecessary confidentiality issues. Branding - Our virtual data rooms allow for clients to brand their virtual rooms with logos to promote their corporate identities. Collaboration Enables selected users to download a document, revise it and post it back to the virtual room. These selected users may be entitled to upload documents to a specific file i.e. counsel documents for review by client. Control Complete control of who sees what information. Scanned and existing electronic files can be added or removed at any time with changes logged. Document transparency and user entitlement is fully controlled by the client. Cost Benefits Clients experience cost savings through the elimination of traditional paper based due diligence processes. With no requirement to invest in software or hardware, users only require a connection to the Internet. Data Center Security - Comprehensive physical site security includes: single point of entry, coded key cards, biometric fingerprint and iris scanners, onsite security force, surveillance cameras and a database of authorized individuals. Deal Management - With the ability to manage large investor or buyer groups effectively, the deal cycle time is significantly compressed. A more competitive environment is created, leading to an optimized funding or financing situation. Disaster Recovery - Our platform solution utilizes a fully redundant hosting infrastructure without requiring the client to make a material investment in systems infrastructure, offering clients maximum reliability. Document Control - At all times, clients maintain complete control over who can see which documents, and when. Clients can rescind or issue full or limited document viewing rights to bidders within minutes. Document Repository - The benefit of having a single, controlled, master document repository eliminates the need for document couriers, faxes and s and to circulate drafts for review and comment. 4 Domestic Data Center - Our data center operation is geographically based in the United States and provides layered security to safeguard the data center 24x7x365. Dynamic Confidential Watermark - Downloaded documents are dynamically watermarked CONFIDENTIAL with the users name, time stamp and computer IP address, considerably restricting the further distribution of confidential information. Alerts - Our virtual rooms allow clients to immediately send automatic alerts notifying other users of new content and prompting them to access the information in the virtual room. Encryption - Our sites are SSL encrypted; using the same encryption technology employed by banks and Fortune 500 companies. Flexibility - Clients can add/remove information at any time. The secure enabled log-on and access via a single URL provides the ability to disable functions for parts of the data room. Folders and Sub-Folders - The use of folders, subfolders and other organizational devices allow customers to use the system as a highly accessible central record repository. Passwords - Customized password protection ensuring single user access based on security levels permissions. Project Management - Turn-key implementation and project management solutions, including copying, scanning and posting of documents to virtual rooms. Search Files - Virtual room data that undergo optical character recognition (OCR) can be searched for key words or phrases to quickly locate information. Security Model - Our security model is based on authentication, authorization and accountability to provide customers with the peace of mind knowing their assets are secure. Self-management - Our virtual room supports a client s ability to remotely manage their work rooms. Clients are able to upload, delete, organize, permission or download documents at once. Users and documents can be added or deleted on the fly. Simultaneous Access - In a secure web-based repository, companies can share their documentation with multiple parties simultaneously on a 24X7 basis. Templates - Established business process templates which can contain folder structures, documents, participants and security privileges to allow for rapid creation and management of a virtual room. Training Not Required The intuitive web browser based interface and compatibility with common desktop programs provides user familiarity and does not require training or additional software. Viewing Rights - Clients can control viewing and printing rights and vary them from party to party and from phase to phase in a deal.

5 Is the Information in your Virtual Deal Room Secure? 5

6 Are Your Documents and Files Stored in a Data Center in the United States? Yes. For clients involved in international transactions, the protection of the data by the United States legal system is crucial. We partner with a world class U.S. based data center provider, Quality Technology Services, to assure the security of your information. The Suwanee, Georgia data center, located outside of Atlanta, GA, boasts 376,000 square feet of secure space, and is one of the largest constant power systems in the world with a robust and redundant network. Quality Tech s data centers are highly secure with 99.5% Availability and are SAS-70 Compliant and ITIL Certified. In addition to their flagship facility in Georgia, they have facilities in Indianapolis, Kansas City, Topeka and Wichita. Computer Redundancy The world-class data center located in Suwanee, Georgia, is the heart of Quality Technology Services. Its unique design includes multiple, redundant and diverse highspeed Internet connections, state-of-the-art security systems and procedures, fully redundant power, cooling and environmental systems, and a variety of co-location options. Secured customer access is available on a 24 x 7 x 365 basis. Quality Tech has deployed a state-of-the-art uninterruptible power architecture delivering Industry leading power density with total capacity of more than 30 megawatts (MW). Data Center Security Quality Technology Services provides layered security to safeguard the data center 24x7x365. The comprehensive physical site security includes: single point of entry, coded key cards, biometric fingerprint and iris scanners, onsite security force, surveillance cameras located throughout the facility and a database of individuals authorized to access facility. The security model is based on authentication, authorization and accountability to provide customers with the peace of mind knowing their assets are secure. 6

7 Who handles the set-up and administration? We can quickly train your staff to administer the Virtual Room - upload files, issue usernames and run reports. Our target is to have your Virtual Data Room up and running within hours. 1. Marketing and Due Diligence Folder Checklist Set up a Virtual Room Checklist with Folders for a new listing within 5 minutes. You may subsequently tailor the Folder Checklist to meet your requirements. 2. Upload Documents Upload the documents directly into the Folders in the Virtual Room as easily as by clicking a mouse. Paper documents may be scanned and converted into a PDF secure electronic format and quickly uploaded to the appropriate folders. 3. Invite Potential Buyers You may begin issuing Usernames and Passwords to selected individuals with Security Access Levels 1-9. Within seconds you may change a user s access level, allowing for the review of more confidential information, or terminate their access entirely. 7

8 PRICING - ORDER FORM Date: / / Client Company: Amount: Circle Data Room Package Desired AMOUNT $395 per month or $2,400/annual INCLUDES Up to 2 Virtual Data Rooms Up to 200 Documents/Files Up to 200 MB of Data Storage Up to 50 Usernames $595 per month or $3,600/annual Up to 5 Virtual Data Rooms Up to 500 Documents/Files Up to 500 MB of Data Storage Up to 100 Usernames $795 per month or $4,800/annual Up to 10 Virtual Data Rooms Up to 1,000 Documents/Files Up to 1 GB of Data Storage Up to 200 Usernames $1,095 per month or $6,600/annual Up to 15 Virtual Data Rooms Up to 1,500 Documents/Files Up to 1.5 GB of Data Storage Up to 300 Usernames (Contact us for Virtual Rooms up to 50,000 Documents or 50 GB of Data) Automatic monthly credit card charge or Invoiced quarterly in advance with unused monthly charges to be refunded Annual pricing is paid lump-sum in advance On the average 10 pages = 1 Document = 1 MB of Data Storage. Also 1 Banker s Box = 250 Documents Additional Services (By our staff - Only If Requested) Scanning Documents - Black and White - $0.25 per page Organize and Convert Files to PDF Format - $3 each Upload Documents/Files to Virtual Room - $300 for batches of up to 100 documents Activate Usernames and Passwords - $300 for batches of up to 100 usernames Thank you for the opportunity to be your Virtual Data Room provider. Sincerely, Optional Payment by Credit Card Authorization to Proceed: Dan Bradbary, CEO Just Sign Here: Due Diligence Online, LLC Fax a copy of this page to Direct: (404)

Secure access provided to sensitive documents - anytime, anywhere. Quick setup and easy administration of data room, documents and users

Secure access provided to sensitive documents - anytime, anywhere. Quick setup and easy administration of data room, documents and users Eliminate the Paper Chase V-Rooms Virtual Data Rooms is an Internet-based, on demand hosted service designed to speed the completion of financial transactions which may involve hundreds of participants

More information

Improving Deal Value with Virtual Due Diligence Rooms

Improving Deal Value with Virtual Due Diligence Rooms W H I T E P A P E R Improving Deal Value with Virtual Due Diligence Rooms M&A Transactions Investment Banking Corporate Divestitures Private Equity Investment Venture Capital Debt Financing Investment

More information

INVESTRAN DATA EXCHANGE

INVESTRAN DATA EXCHANGE INVESTRAN DATA EXCHANGE INVESTRAN DATA EXCHANGE AUTOMATING DATA CAPTURE AND REPORT DISTRIBUTION FOR ALTERNATIVE INVESTMENTS In today s alternative investment world, transparency of data is key, and the

More information

Virtual Data Room. www.millnet.co.uk/vdr. From Deal Making to Due Diligence

Virtual Data Room. www.millnet.co.uk/vdr. From Deal Making to Due Diligence Virtual Data Room From Deal Making to Due Diligence Built with the leading Investment Banks and Law Firms, our revolutionary technology is used by tens of thousands of professionals all over the world.

More information

Five Keys to Ironclad Security in Your M&A Transactions

Five Keys to Ironclad Security in Your M&A Transactions White Paper Five Keys to Ironclad Security in Your M&A Transactions Keeping security front and center when using a virtual data room M E R R I L L D A T A S I T E TM Contents The importance of data security

More information

WHAT ARE THE KEY FEATURES OF ON DEMAND FILE SERVER?

WHAT ARE THE KEY FEATURES OF ON DEMAND FILE SERVER? INTRODUCING ON DEMAND FILE SERVER FROM BT WHOLESALE APPLICATION STORE WHAT IS ON DEMAND FILE SERVER? The three most common technology challenges facing every small business are data storage, information

More information

GiftWrap 4.0 Security FAQ

GiftWrap 4.0 Security FAQ GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels

More information

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for

More information

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery WHITE PAPER HIPPA Compliance and Secure Online Data Backup and Disaster Recovery January 2006 HIPAA Compliance and the IT Portfolio Online Backup Service Introduction October 2004 In 1996, Congress passed

More information

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1 UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,

More information

complexity data room is unique.

complexity data room is unique. The complexity of each data room is unique. is a virtual data room for the secure handling of your confidential company transactions. The due diligence phase is one of the most costly parts of an M&A transaction.

More information

onesource workflow manager

onesource workflow manager onesource workflow manager for Wealth Management TAX & ACCOUNTING improve processes for full compliance The more efficient your office, the better you can serve your clients and comply with regulations.

More information

Introduction. Ease-of-Use

Introduction. Ease-of-Use Remote Data Backup Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and expensive method for

More information

DSI File Server Client Documentation

DSI File Server Client Documentation Updated 11/23/2009 Page 1 of 10 Table Of Contents 1.0 OVERVIEW... 3 1.0.1 CONNECTING USING AN FTP CLIENT... 3 1.0.2 CONNECTING USING THE WEB INTERFACE... 3 1.0.3 GETTING AN ACCOUNT... 3 2.0 TRANSFERRING

More information

TECHN TE ICAL GUIDE LOR F E OR M FI E N PS A UM NCIAL TRANSACTIONS & REPORTING

TECHN TE ICAL GUIDE LOR F E OR M FI E N PS A UM NCIAL TRANSACTIONS & REPORTING TECHNICAL GUIDE LOREM FOR FINANCIAL EPSUM TRANSACTIONS & REPORTING TECHNICAL GUIDE Contents 3 EVERY FEATURE NECESSARY FOR EFFICIENT DUE DILIGENCE 4 WHAT MAKES MERRILL DATASITE UNIQUE? 4 IRONCLAD SECURITY

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

eztechdirect Backup Service Features

eztechdirect Backup Service Features eztechdirect Backup Service Features Introduction Portable media is quickly becoming an outdated and expensive method for safeguarding important data, so it is essential to secure critical business assets

More information

Autodesk Streamline 2008. Achieve maximum project visibility.

Autodesk Streamline 2008. Achieve maximum project visibility. Autodesk Streamline 2008 Achieve maximum project visibility. Achieve Maximum Project Visibility Accelerate your product development process. With the Autodesk Streamline on-demand collaborative project

More information

techsafe Features Technology Partners - 2955 20th Street - Vero Beach, FL 32960 - www.techpart.net - (772) 299-5178 Page 1/9 0910080-01

techsafe Features Technology Partners - 2955 20th Street - Vero Beach, FL 32960 - www.techpart.net - (772) 299-5178 Page 1/9 0910080-01 techsafe Features Page 1/9 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 5 Security File Compression Encryption Transmission

More information

SVA Backup Plus Features

SVA Backup Plus Features 1221 John Q. Hammons Drive Madison, WI 53717 P.O. Box 44966, Madison, WI 53717 P: 608.826.2400 TF: 800.366.9091 F: 608.831.4243 www.sva.com Introduction Computers are the default storage medium for most

More information

Pros 4 Technology Online Backup Features

Pros 4 Technology Online Backup Features Pros 4 Technology Online Backup Features Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and

More information

An Introduction to Merrill DataSite

An Introduction to Merrill DataSite Smart. Simple. Secure. Technical Guide Table of Contents 3 Every feature necessary for efficient due diligence 4 What makes Merrill DataSite so unique? 4 Ironclad security 5 Administrative management tools

More information

Redtail CRM Integration. Users Guide. 2011 Cities Digital, Inc. All rights reserved. Contents i

Redtail CRM Integration. Users Guide. 2011 Cities Digital, Inc. All rights reserved. Contents i Redtail CRM Integration Users Guide 2011 Cities Digital, Inc. All rights reserved. Contents i Contents Redtail Integration with Laserfiche by Cities Digital 1 Overview... 1 Requirements 3 Minimum Server

More information

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016 Evolved Backup Features 1 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 6 Security File Compression Encryption Transmission

More information

Introduction to Merrill DataSite

Introduction to Merrill DataSite Introduction to Merrill DataSite M E R R I L L D A T A S I T E Every feature necessary for efficient due diligence 3 What makes Merrill DataSite unique? 4 Ironclad security 4 Administrative management

More information

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4 TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6 TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4 Cloud services (Data Centre) and related Functional requirement Cloud services as a Control

More information

ITAR Compliant Data Exchange

ITAR Compliant Data Exchange ITAR Compliant Data Exchange Managing ITAR Data Across Collaborative Project Teams WebSpace Customers Aerospace & Defense Manufacturing High Tech & Contract Manufacturing Automotive Manufacturing Medical/

More information

NETWRIX USER ACTIVITY VIDEO REPORTER

NETWRIX USER ACTIVITY VIDEO REPORTER NETWRIX USER ACTIVITY VIDEO REPORTER ADMINISTRATOR S GUIDE Product Version: 1.0 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

SecureSend File Transfer Portal Usage Guide

SecureSend File Transfer Portal Usage Guide System Documentation 03/01/2012 SecureSend File Transfer Portal Usage Guide Recommended Usage Instructions and Frequently Asked Questions Jose Ruano, Stephen Weatherly TABLE OF CONTENTS EXECUTIVE SUMMARY...3

More information

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public] IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

IDrive, is a service offered by Pro Softnet Corporation, an ASP and Internet Solutions Provider, based in Woodland Hills, CA.

IDrive, is a service offered by Pro Softnet Corporation, an ASP and Internet Solutions Provider, based in Woodland Hills, CA. www.idrive.com Backup Review Rating (4 stars out of possible 5) Reviewed on July 27, 2008 Summary IDrive, is a service offered by Pro Softnet Corporation, an ASP and Internet Solutions Provider, based

More information

The All-In-One Browser-Based Document Management Solution

The All-In-One Browser-Based Document Management Solution The All-In-One Browser-Based Document Management Solution General Overview of Content Central Content Central sets the standard for document management and workflow solutions. Users access and interact

More information

Online Backup Solution Features

Online Backup Solution Features CCC Technologies, Inc. 700 Nicholas Blvd., Suite 300 Elk Grove Village, IL 60007 877.282.9227 www.ccctechnologies.com Online Backup Solution Features Introduction Computers are the default storage medium

More information

Software-as-a-Service: Changing How You Share Information in Today s Changing Business World. Part II

Software-as-a-Service: Changing How You Share Information in Today s Changing Business World. Part II Software-as-a-Service: Changing How You Share Information in Today s Changing Business World Part II Contents Introduction...1 Guidelines for Choosing an Online Workspace Provider...2 Evaluating SaaS Solutions:

More information

Rev. 1.0.3. www.telinta.com

Rev. 1.0.3. www.telinta.com Rev. 1.0.3 Copyright Notice Copyright 2014-2015 Telinta Inc. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the

More information

NETGEAR ReadyNAS and Acronis Backup & Recovery 10 Configuring ReadyNAS as an Acronis Backup & Recovery 10 Vault

NETGEAR ReadyNAS and Acronis Backup & Recovery 10 Configuring ReadyNAS as an Acronis Backup & Recovery 10 Vault NETGEAR ReadyNAS and Acronis Backup & Recovery 10 Configuring ReadyNAS as an Acronis Backup & Recovery 10 Vault Table of Contents Contents...2 Concepts...3 Data Deduplication...3 Acronis Vaults...4 Components...4

More information

custom hosting for how you do business

custom hosting for how you do business custom hosting for how you do business 24775 League Island Boulevard Philadelphia PA 19112 gibraltarit.com 866.410.4427 Gibraltar s replicated cloud architecture and PCI/HIPAA compliant data centers provide

More information

DataSite: The Virtual Data Room from Merrill Corporation

DataSite: The Virtual Data Room from Merrill Corporation DataSite: The Virtual Data Room from Merrill Corporation Easy to use. Locally Supported. Fast Implementation. VIRTUAL DATA ROOMS M&A TRANSACTIONS CORPORATE FINANCE PUBLIC AND PRIVATE TRANSACTIONS IPO OFFERINGS

More information

WebArrow: System Overview and Architecture Namzak Labs White Paper, 2003-02

WebArrow: System Overview and Architecture Namzak Labs White Paper, 2003-02 WebArrow: System Overview and Architecture Namzak Labs White Paper, 2003-02 Overview This white paper presents an introduction to, and architectural overview of Namzak Labs WebArrow a system for web-based

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

InstaFile. Complete Document management System

InstaFile. Complete Document management System InstaFile Complete Document management System Index : About InstaFile 1.1 What is InstaFile 1.2 How does it work 1.3 Where you can use InstaFile 1.4 Why only InstaFile InstaFile features and benefits Start

More information

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99% Security overview Collaborate on your projects in a secure environment Thousands of businesses, including Fortune 500 corporations, trust Wrike for managing their projects through collaboration in the

More information

Control scanning, printing and copying effectively with uniflow Version 5. you can

Control scanning, printing and copying effectively with uniflow Version 5. you can Control scanning, printing and copying effectively with uniflow Version 5 you can Bring more control and added efficiency to your scanning and print environment. What is uniflow? uniflow is a software

More information

An Oracle White Paper June 2014. Security and the Oracle Database Cloud Service

An Oracle White Paper June 2014. Security and the Oracle Database Cloud Service An Oracle White Paper June 2014 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database

More information

Veritas AdvisorMail. Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies

Veritas AdvisorMail. Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies Veritas AdvisorMail Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies Email compliance redefined Our new and improved version of redefines

More information

ELECTRONIC & PRINT DISTRIBUTION STORAGE & ARCHIVE SOLUTIONS. Dynamic Solutions. Superior Results.

ELECTRONIC & PRINT DISTRIBUTION STORAGE & ARCHIVE SOLUTIONS. Dynamic Solutions. Superior Results. ELECTRONIC & PRINT DISTRIBUTION STORAGE & ARCHIVE SOLUTIONS Dynamic Solutions. Superior Results. STORAGE & ARCHIVE SOLUTIONS ROBUST SYSTEMS FOR MANAGING DOCUMENTATION AND OTHER CORPORATE RESOURCES CENTRALIZE,

More information

Copyright 2013 Trend Micro Incorporated. All rights reserved.

Copyright 2013 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

How to Select a Virtual Data Room

How to Select a Virtual Data Room How to Select a Virtual Data Room How to Select a Virtual Data Room 2 Introduction When conducting due diligence, financial transactions, or any other complex business processes, it is paramount to fully

More information

Recording & Evaluation mobile and fixed platforms for every business. Screen Recording. Integrated Management Platform. Workforce Optimization

Recording & Evaluation mobile and fixed platforms for every business. Screen Recording. Integrated Management Platform. Workforce Optimization Recording & Evaluation mobile and fixed platforms for every business Screen Recording Integrated Management Platform Workforce Optimization Quality Monitoring This page intentionally left blank MedTel

More information

NetWrix SQL Server Change Reporter

NetWrix SQL Server Change Reporter NetWrix SQL Server Change Reporter Version 2.2 Administrator Guide Contents NetWrix SQL Server Change Reporter Administrator Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 3 1.2 LICENSING... 4 1.3 HOW

More information

White Paper. Driving Transaction Efficiency on Virtual Data Room Best Practices

White Paper. Driving Transaction Efficiency on Virtual Data Room Best Practices White Paper Driving Transaction Efficiency on Virtual Data Room Best Practices INTRODUCTION With the market for M&A transactions expected to remain robust for the immediate future, the ability to complete

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

Leverage SharePoint with PSI:Capture

Leverage SharePoint with PSI:Capture Leverage SharePoint with PSI:Capture A White Paper Courtesy of PSIGEN Software, Inc. Table of Contents Intro to PSI:Capture... 1 Intro to PSI:Capture for SharePoint... 1 Key SharePoint Features... 2 Key

More information

SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan

SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan This document covers three aspects of SysAid IT On-Demand: Architecture Security Business Continuity and Disaster Recovery

More information

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server

More information

Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies.

Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies. Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies. Data Sheet: Symantec.cloud Email Compliance Redefined Our new and improved version of redefines

More information

MassTransit vs. FTP Comparison

MassTransit vs. FTP Comparison MassTransit vs. Comparison If you think is an optimal solution for delivering digital files and assets important to the strategic business process, think again. is designed to be a simple utility for remote

More information

ProjectManager.com Security White Paper

ProjectManager.com Security White Paper ProjectManager.com Security White Paper Standards & Practices www.projectmanager.com Introduction ProjectManager.com (PM) developed its Security Framework to continue to provide a level of security for

More information

ShareFile Security Overview

ShareFile Security Overview ShareFile Security Overview ShareFile Company Policy All ShareFile employees undergo full background checks and sign our information security policy prior to beginning employment with the company. The

More information

Guidelines for the submission of invoices

Guidelines for the submission of invoices Guidelines for the submission of invoices For CGI Vendors (North America Only) Contents 1. Introduction... 1 2. Scope... 1 3. Invoice Scanning and Submission Guidelines... 1 4 Frequently asked questions

More information

Digital Asset Management

Digital Asset Management A collaborative digital asset management system for marketing organizations that improves performance, saves time and reduces costs. MarketingPilot provides powerful digital asset management software for

More information

uturenet & its Document Imaging Services

uturenet & its Document Imaging Services F uturenet & its Document Imaging Services FutureNet Technologies Corporation has become a vital player in the healthcare information management industry. Founded in 1996, FutureNet was formed for the

More information

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents Epygi Technologies Table of Contents Table of Contents About This User s Guide... 3 Introducing the Quadro Configuration Console... 4 Technical Specification... 6 Requirements... 6 System Requirements...

More information

redcoal EmailSMS for MS Outlook and Lotus Notes

redcoal EmailSMS for MS Outlook and Lotus Notes redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: support@redcoal.com Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

Security from a customer s perspective. Halogen s approach to security

Security from a customer s perspective. Halogen s approach to security September 18, 2015 Security from a customer s perspective Using a cloud-based talent management program can deliver tremendous benefits to your organization, including aligning your workforce, improving

More information

Migrating business users to a robust alternative desktop PDF solution is now possible and it s easier than you think.

Migrating business users to a robust alternative desktop PDF solution is now possible and it s easier than you think. Migrating business users to a robust alternative desktop PDF solution is now possible and it s easier than you think. How to avoid compromises when deploying PDF solutions. 2 Executive summary PDF is the

More information

Symantec Backup Exec 11d for Windows Small Business Server

Symantec Backup Exec 11d for Windows Small Business Server Symantec Backup Exec 11d for Windows Small Business Server End-User Call Script for Sales This document is intended as a simple call structure to help get you started when selling Backup Exec 11d for Windows

More information

Technical Proposition. Security

Technical Proposition. Security Technical Proposition ADAM Software NV The global provider of media workflow and marketing technology software ADAM Software NV adamsoftware.net info@adamsoftware.net Why Read this Technical Proposition?

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Virtual Data Room Security 2. Service 3. Simplicity 4. Speed 5. Cost Certainty

Virtual Data Room Security 2. Service 3. Simplicity 4. Speed 5. Cost Certainty Virtual Data Room Transactions are becoming increasingly more complicated. Deals involve numerous participants who need access to an increasing number of documents at all stages of the deal. This creates

More information

Customer Tips. Xerox Network Scanning TWAIN Configuration for the WorkCentre 7328/7335/7345. for the user. Purpose. Background

Customer Tips. Xerox Network Scanning TWAIN Configuration for the WorkCentre 7328/7335/7345. for the user. Purpose. Background Xerox Multifunction Devices Customer Tips dc07cc0432 October 19, 2007 This document applies to these Xerox products: X WC 7328/7335/7345 for the user Xerox Network Scanning TWAIN Configuration for the

More information

Synergy Document Management

Synergy Document Management Synergy Document Management Maximize Your Time and Minimize Your Clutter Today s paper-intensive business environment creates a fundamental need for a scalable document management system. The Synergy Document

More information

Blue Jeans Network Security Features

Blue Jeans Network Security Features Technical Guide Blue Jeans Network Security Features Blue Jeans Network understands an organization s need for secure communications. The Blue Jeans cloud-based video conferencing platform provides users

More information

Navigate your workflow

Navigate your workflow Océ Document Management Tool 2.2 Navigate your workflow Digital document workflow software that streamlines productivity Put convenience and productivity at your fingertips Gain control over your document

More information

Stellar Active Directory Manager

Stellar Active Directory Manager Stellar Active Directory Manager What is the need of Active Directory Manager? Every organization uses Active Directory Services (ADMS) to manage the users working in the organization. This task is mostly

More information

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services 1 Contents 3 Introduction 5 The HIPAA Security Rule 7 HIPAA Compliance & AcclaimVault Backup 8 AcclaimVault Security and

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Xerox Workflow Automation Services Solutions Brochure. Xerox DocuShare 7.0. Enterprise content management for every organization.

Xerox Workflow Automation Services Solutions Brochure. Xerox DocuShare 7.0. Enterprise content management for every organization. Xerox Workflow Automation Services Solutions Brochure Xerox DocuShare 7.0 Enterprise content management for every organization. Office Work Can Work Better Despite huge advances in the technology and tools

More information

Birst Security and Reliability

Birst Security and Reliability Birst Security and Reliability Birst is Dedicated to Safeguarding Your Information 2 Birst is Dedicated to Safeguarding Your Information To protect the privacy of its customers and the safety of their

More information

Retention & Destruction

Retention & Destruction Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of

More information

Enterprise SM VOLUME 1, SECTION 4.5: WEB CONFERENCING SERVICES (WCS)

Enterprise SM VOLUME 1, SECTION 4.5: WEB CONFERENCING SERVICES (WCS) VOLUME 1, SECTION 4.5: WEB CONFERENCING SERVICES (WCS) 4.5 WEB CONFERENCING SERVICE (WCS) [C.2.8.3] This section of our proposal addresses Level 3 s offering to provide Web Conferencing Services (WCS)

More information

BroadData Unified Meeting Security Whitepaper v4.2

BroadData Unified Meeting Security Whitepaper v4.2 BroadData Unified Meeting Security Whitepaper v4.2 Introduction As organizations unlock the true potential of meeting over the Web as an alternative to costly and time-consuming travel, they do so in the

More information

Secure Data Hosting. Your data is our top priority.

Secure Data Hosting. Your data is our top priority. Secure Data Hosting Your data is our top priority. ESO s world-class security infrastructure is designed to provide data redundancy, security and availability while keeping sensitive HIPAA and PHI information

More information

User Guide. Version R91. English

User Guide. Version R91. English AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

Administration Guide. WatchDox Server. Version 4.8.0

Administration Guide. WatchDox Server. Version 4.8.0 Administration Guide WatchDox Server Version 4.8.0 Published: 2015-11-01 SWD-20151101091846278 Contents Introduction... 7 Getting started... 11 Signing in to WatchDox... 11 Signing in with username and

More information

Hosted Testing and Grading

Hosted Testing and Grading Hosted Testing and Grading Technical White Paper July 2014 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or

More information

1. User Guide... 2 1.1 Logging On to OnDemand... 2 1.2 Managing Your Files... 3 1.2.1 Saving Files from OnDemand... 4 1.2.2 Transferring Files

1. User Guide... 2 1.1 Logging On to OnDemand... 2 1.2 Managing Your Files... 3 1.2.1 Saving Files from OnDemand... 4 1.2.2 Transferring Files User Guide................................................................................................. 2 1 Logging On to OnDemand................................................................................

More information

NCR CLOUD SERVICES OVERVIEW. An NCR Brochure

NCR CLOUD SERVICES OVERVIEW. An NCR Brochure NCR CLOUD SERVICES OVERVIEW An NCR Brochure Are you looking for a partner to provide unparalleled security, uptime and performance for your core applications? You have chosen to host your applications

More information

LEA Monitoring User Guide

LEA Monitoring User Guide LEA Monitoring User Guide v. 3.0 September 2012 Contents Contents... 2 Introduction... 4 Acknowledgements... 4 Questions... 4 What is DMI Tracker?... 5 Monitoring... 5 End User System Guidelines... 5 Accessing

More information

Dr.Backup Remote Backup Service. Quick Start User Guide

Dr.Backup Remote Backup Service. Quick Start User Guide Dr.Backup Remote Backup Service Quick Start User Guide Version 8.5.0-1 Copyright 2003-2004 Doctor Backup, LLC. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several

More information

Manual POLICY PATROL SECURE FILE TRANSFER

Manual POLICY PATROL SECURE FILE TRANSFER Manual POLICY PATROL SECURE FILE TRANSFER MANUAL Policy Patrol Secure File Transfer This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software

More information

enicq 5 System Administrator s Guide

enicq 5 System Administrator s Guide Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide

More information