RegDOX Solutions

The Secure Data Room solution provider for Corporate, EAR, HIPAA, DFARS and ITAR compliance in the cloud.

CALL US NOW: +1.800.517.3171
ADDRESS: One Tara Boulevard, Suite 300, Nashua, NH 03062
  • Facebook
  • Linkedin
  • Twitter
  • YouTube
  • Home
  • Product Overview
    • Secure Data Room
    • Managed Services
    • Use Cases
      • Real Estate Management
      • RegDOX Board Solution
      • Life Sciences Out-Licensing
      • Mergers & Acquisitions
      • Secure Collaboration
      • IPOs & 701 Disclosures
      • Secure Email
      • Aerospace & Defense
      • Research & Development
      • Universities & Education
    • Free Trial
    • Extensions
      • RegDOX For Tablets
      • RegDOX For Mobile
      • Microsoft Office Integration
      • RegDOX Secure File Editing
  • Regulatory Compliance Solutions
    • Solution for ITAR
    • Solution for DFARS
    • Solution for EAR
    • Long-Term Cloud Storage
    • RegDOX DFARS Assessment
    • RegDOX On the Fives
  • Enterprise Solutions
    • Financial Services
    • Real Estate
    • Energy & Utilities
    • Healthcare & HIPAA
    • Legal Services
    • Life Science & Chemicals
    • Consulting
    • Manufacturing & Technology
  • News & Events
    • News
    • Blog
    • Events
    • Media Resources
  • About
    • Careers
    • Certificates & Awards
    • Customer Support
    • High Security Platform
  • Downloads & Videos
    • Downloads
    • RegDOX Desktop tools
    • Videos
  • Contact

high-security-banner2

Security Features

RegDOX protects your confidential documents with one of the most advanced encryption and security technologies available. This high standard of security ensures that all your authorized users' activities in the web-based workspace stay confidential and are reliably protected from external access.

cloud-keyboard1

High security, two-factor authentication

Users access the secure virtual environment using a password-based registration system. RegDOX recommends complementing this with one of its other authentication processes, such as a one-time code texted to the authorized user’s cell phone. This code is only valid for one user and only for the current session. You can also integrate conventional login processes such as single sign-on (SSO) or smartcards, if required.

Hardware Security Module (HSM)

A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides crypto processing. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server.

 

Information Rights Management (IRM)

If you have particularly stringent security requirements, you can use the integrated IRM technologies to ensure that a document is in read-only mode once the user has downloaded and opened it on their desktop. A security policy automatically converts Office documents to PDF format, includes a watermark in them if required, and adds Adobe® security features to them.

High security document encryption

The highly secure 256-bit AES encryption on the server protects all your documents effectively and prevents access by unauthorized users. All data uploaded to or downloaded from the data room server for viewing in an authorized user’s browser are encrypted during transmission with up to 256-bit SSL.

Tamper-proof audit trail

All user activities are documented in a tamper-proof audit trail, providing you with a consistently transparent and traceable information flow. The automatic versioning function underpins collaborative work on documents and ensures that you can track changes to every version.

Watermarks / Stamping

To make screen captures more difficult, every screen viewed by the user contains a dynamically embedded watermark – for example, it could show the current user’s name. It is visible but faint enough not to affect the legibility of the content. You can easily modify the text and layout of the watermark to suit your requirements.

Granular access control

You can define access permissions using policies and manage them on a user-by-user basis or by groups of users. The policies available include read-only permissions for documents, which are then automatically converted to PDFs.


High-Security RegDOX Data Centers

  • Operation on dedicated servers in certified, high-security data centers in the United States
  • Operation is ISO 27001 certified by qualified RegDOX staff
  • Meets national and international data protection regulations
  • 24x7x365 server and user management with SLA
  • Experienced 24x7 customer support and authoritative training courses
  • Automated backup and emergency restore processes
  • Firewalls on multiple levels plus server load balancing
  • Guaranteed fast response times via internet backbone
  • Organizational and technical provision for the separation of duties (management/support)

Print

Download RegDOX Secure Data
Room Product Data Sheet

[salesforce form="18"]
Download RegDOX Security
Backgrounder Product Data Sheet

Start Your Free Trial

Looking for something else?

Share this page.

  • share 
  • tweet 
  • share 
  • e-mail 
  • rss feed 
  • Home
  • Product Overview
  • Regulatory Compliance Solutions
  • Enterprise Solutions
  • News & Events
  • About
  • Downloads & Videos
  • Contact
Contact Us
Free Trial
RegDOX®
About RegDOX
Certificates & Awards
Site Map
Accessibility
Privacy Policy
SERVICES
Schedule a Demo
Training
Start Your Free Trial
Reseller Program
Customer Support
CONTACT US
+1.603.589.4830
RegDOX.Sales@RegDOX.com
One Tara Blvd. Suite 300
Nashua, NH 03062 USA

Copyright © 2021 - RegDOX Solutions Inc. - All Rights Reserved
Powered by EWS & CwD
  • 
  • 
  • 
  • 