Intralinks Virtual Data Room (VDR) is a secure cloud-based platform that allows businesses to store, share, and manage confidential documents with third parties. Intralinks VDR is used by a wide range of businesses, including investment banks, law firms, accounting firms, and corporations, for a variety of purposes, including mergers and acquisitions, initial public offerings (IPOs), private equity deals, and real estate transactions.
Intralinks VDR offers a number of security features to protect confidential data, including:
• Encryption: Intralinks VDR encrypts all data at rest and in transit using 256-bit AES encryption, which is the industry standard for data encryption.
• Watermarking: Intralinks VDR can watermark documents with the user's name and IP address, which can help to deter unauthorized copying and sharing of documents.
• Document fencing: Intralinks VDR's document fencing feature allows administrators to restrict users from taking screenshots of documents or printing them.
• Remote shredding: Intralinks VDR allows administrators to remotely shred documents, even after they have been downloaded by users.
• Dynamic watermarking: Intralinks VDR's dynamic watermarking feature can be used to watermark documents with a unique watermark for each user. This can help to prevent unauthorized users from sharing documents with others.
• Document control: Intralinks VDR allows administrators to control how documents are shared and downloaded. For example, administrators can restrict users from downloading documents or forwarding them to others.
• Document permissions: Intralinks VDR allows administrators to set granular permissions for documents. For example, administrators can restrict users from viewing, downloading, or printing certain documents.
• Document audit trails: Intralinks VDR keeps a detailed audit trail of all activity on documents, so that administrators can track who accessed what documents and when.
In addition to these general security features, Intralinks VDR also offers a number of specific security features that can be used to protect sensitive data, such as:
• Two-factor authentication: Intralinks VDR supports two-factor authentication, which adds an extra layer of security to user logins.
• IP address restrictions: Intralinks VDR allows administrators to restrict access to the data room to specific IP addresses.
• Session timeouts: Intralinks VDR automatically times out user sessions after a period of inactivity, which can help to prevent unauthorized access to the data room.
How Intralinks VDR's security features protect your data
Intralinks VDR's security features are designed to protect your data from unauthorized access, use, disclosure, disruption, modification, or destruction. Intralinks VDR's security features are implemented at all levels, from the data center to the application layer.
At the data center level, Intralinks VDR uses a number of security measures to protect data, including:
• Physical security: Intralinks VDR data centers are located in secure facilities that are monitored 24/7 by security personnel. Data centers are also protected by biometric access control systems and multiple layers of surveillance.
• Environmental security: Intralinks VDR data centers are equipped with environmental controls to protect data from fire, flood, and other natural disasters.
• Power security: Intralinks VDR data centers have redundant power systems to ensure that data is always available.
At the application layer, Intralinks VDR uses a number of security features to protect data, including:
• Encryption: Intralinks VDR encrypts all data at rest and in transit using 256-bit AES encryption.
• Access controls: Intralinks VDR allows administrators to set granular access controls for users and groups, so that users can only access the documents that they are authorized to access.
• Audit trails: Intralinks VDR keeps a detailed audit trail of all activity in the data room, so that administrators can track who accessed what documents and when.
• Vulnerability assessment: Intralinks VDR regularly conducts vulnerability assessments to identify and address any security vulnerabilities.
コメント