Cyber Security & Fraud Protection
Stop putting your investor’s money and your business at risk by sending secure documents and wiring instructions over email. Your new investor management software has two-factor authentication, uses military grade encryption, and performs regular penetration tests to ensure your protection.
- Two-Factor Authentication
- Web Application Firewall
- Military Grade Encryption
- Regular Penetration Tests (performed by outside third party)
We don’t take cyber security lightly.
Because of the financial nature of information stored in our web application, we’ve taken special precautions at every turn to provide additional security to our clients.
It is of paramount importance that we protect the privacy of our clients, and we do this with utmost dedication and diligence.
Security Systems That Will Keep You Safe
We employ several security provisions aimed at securing your personal information and protecting it from internet groups with bad intentions.
Here are some of the security measures we use to protect your data:
3rd Party Audits and Penetration Testing
Because of the sensitive nature of the data we use, we also work with a leading Cybersecurity partner to perform regular penetration testing. Penetration testing is a way to manually stress test our application to the highest level with real people trying to break into our systems (we don’t use real data for these tests).
By now, we are all somewhat familiar (and sometimes annoyed by) Two-Factor Authentication, or 2FA. The fact remains, it works. You’ll periodically be prompted to type in a system generated passcode sent to your phone number on file to verify your identity. This feature can be toggled, but is recommended.
One way we provide security to our clients is through the use of User Rights. There are many different access levels to be given to users at different levels throughout your enterprise. This allows you to have increased control over who has access to what information. Access can also be given on a project-by-project basis.
Another way we provide security to our clients is through Team Rights. Similar to User Rights, these settings apply to your referring partners or any team that you add to your portal. Largely, these are used to toggle notifications and respect communication preferences, but also help determine access to your data.
We believe that a high degree of transparency empowers our client to manage their portals more effectively. In each unified investor profile (even for our support representatives), you’ll find Audit Logs. These logs track a user’s movement through your portal and help increase visibility across your enterprise.
Regular Site Backups
We regularly backup your data so that it’s never difficult to restore lost information. This also provides added security in the event of a system outage, and helps ensure that normal service is never interrupted for long.
Investor Deal Room Privacy & Security Booklet
Features Of Our Investor Relations CRM
3rd-Party Audits & Penetration Testing
Our application is rigorously tested by cybersecurity experts.
Two-factor authentication adds an extra layer of security.
User Access Limitations
You control what data can be accessed by each of your portal's administrators.
View-Only Access Options
Share insights with your referring partners while protecting your investors' data privacy.
Each action taken by any user of your portal is logged and available for you to monitor.
Regular Site Backups
Encrypted backups of your portal's data ensure that important information is never lost.
Frequently Asked Questions
Where is the portal hosted?
All of our portals are hosted in a secure AWS hosting environment and are protected at all layers.
We use IP blocking, network firewalls, key only access, and many other industry best practices to protect our infrastructure and portals.
Is my data safe with Investor Deal Room?
We work hard to ensure your data is safe and regularly monitor our security posture.
Some of the ways we do that are through:
- Encrypting all of your data in transit
- Limiting backend access through a variety of methods
- Strong role management
- Two factor authentication
- Monitoring via Web Application Firewalls
- Third party vendor assessments
Take a look at our 2020 Cyber Security Booklet here.