RegDOX protects your confidential documents with one of the most advanced encryption and security technologies available. This high standard of security ensures that all your authorized users' activities in the web-based workspace stay confidential and are reliably protected from external access.
High security, two-factor authentication
Users access the secure virtual environment using a password-based registration system. RegDOX recommends complementing this with one of its other authentication processes, such as a one-time code texted to the authorized user’s cell phone. This code is only valid for one user and only for the current session. You can also integrate conventional login processes such as single sign-on (SSO) or smartcards, if required.
Hardware Security Module (HSM)
A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides crypto processing. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server.
Information Rights Management (IRM)
If you have particularly stringent security requirements, you can use the integrated IRM technologies to ensure that a document is in read-only mode once the user has downloaded and opened it on their desktop. A security policy automatically converts Office documents to PDF format, includes a watermark in them if required, and adds Adobe LiveCycle to them.
High security document encryption
The highly secure 256-bit AES encryption on the server protects all your documents effectively and prevents access by unauthorized users. All data uploaded to or downloaded from the data room server for viewing in an authorized user’s browser are encrypted during transmission with up to 256-bit SSL.
Tamper-proof audit trail
All user activities are documented in a tamper-proof audit trail, providing you with a consistently transparent and traceable information flow. The automatic versioning function underpins collaborative work on documents and ensures that you can track changes to every version.
Watermarks / Stamping
To make screen captures more difficult, every screen viewed by the user contains a dynamically embedded watermark – for example, it could show the current user’s name. It is visible but faint enough not to affect the legibility of the content. You can easily modify the text and layout of the watermark to suit your requirements.
Granular access control
You can define access permissions using policies and manage them on a user-by-user basis or by groups of users. The policies available include read-only permissions for documents, which are then automatically converted to PDFs.
High-Security RegDOX Data Centers
- Operation on dedicated servers in certified, high-security data centers in the United States
- Operation is ISO 27001 certified by qualified RegDOX staff
- Meets national and international data protection regulations
- 24x7x365 server and user management with SLA
- Experienced 24x7 customer support and authoritative training courses
- Automated backup and emergency restore processes
- Firewalls on multiple levels plus server load balancing
- Guaranteed fast response times via internet backbone
- Organizational and technical provision for the separation of duties (management/support)