We are extremely proud of the multiple awards received this year.
Early mornings. Late nights. Lots of running around in between... The life of running a startup!
Deals are complicated and the life of a mergers and acquisitions (M&A) professional is not simple. A typical transaction involves multiple global parties accessing confidential data from multiple locations, as well as significant time pressure from all parties. M&A advisers are responsible for making the deal happen, facilitating the agreement of the parties, and closing the transaction. There is no such thing as a simple M&A transaction and closing a successful deal can rely on how fast and efficient the information is made available. A virtual data room (VDR) can help lighten the burden.
Several weeks ago it was discovered that a new vulnerability, which allows a downgrade attack against the TLS protocol itself called Logjam, which exploits EXPORT cryptography.
This vulnerability does not affect EthosData´s virtual data room. Our servers infrastructure and encryption communication does not allow to downgrade attacks as it have a strong 2048-bit encription key exchange parameters (Diffie-Hellman key exchange).
A group from INRIA, Microsoft Research, Johns Hopkins, the University of Michigan, and the University of Pennsylvania published a deep analysis of the Diffie-Hellman algorithm as used in TLS and other protocols.
EthosData and The Vintage Group have been working together providing virtual data room services for US companies since 2009. The partnership was a natural evolution for both companies as EthosData was looking for a local partner with a strong reputation and local presence and The Vintage Group was looking for a market leading virtual data room to complement its offering to companies and advisors.
File sharing security has become all important in today’s internet era. There are layers and layers of security infrastructure, verification technology and sophisticated back end coding that tries to protect you from hackers who can benefit from your confidential information. Why is there a need for such stringent security standards? What are the pitfalls of not using the right technology for file sharing? That is the question we are addressing in this post.
Choosing, storing and managing your password is one of the most important things you can do on your side to keep dataroom security high.
We started providing Virtual Data Room services in India from our New Delhi office in 2007. Back then, most of our efforts were aimed at educating potential users on how the benefits of Virtual Data Rooms far outweigh the traditional paper based physical data rooms, which were the norm (Download this Dataroom Whitepaper to learn more).Investment bankers said that they perceived adoption to be low because of the ingrained habits of their clients who were set in their ways of using paper based systems and were not technologically savvy. Fortunately adoption slow ly but surely took off amongst the M&A community. Every year since then we have seen a steady growth in the number of corporate transaction being run on Virtual Data Rooms.