INFORMATION SECURITY
Secure Transactions at Scale
The old way of closing is sluggish, cumbersome, risky and exposes you and your client’s organizations to cyber security threats on every deal.
BEST PRACTICES
Ensure cyber security best practices for every stakeholder in the deal.
Reduce Risk
Robust security features provide a reduced attack surface and added layers of security for every aspect of your deal.
Activity Monitoring
We record detailed information about all changes performed inside the application, such as document access, download, upload, and sharing.
Encryption
We protect all of your data at rest with AES-256 encryption. All data in transit (internal and external) is encrypted with 128-bit SSL/TLS or better.
DDoS Protection
We leverage multiple technologies that provide comprehensive availability protection against all known Layer 3 and 4 attacks.
Backup And Disaster Recovery
We backup all data in real time to multiple locations throughout the United States. We also have a detailed Disaster Recovery process that is tested multiple times per year.
Network Security
Our data centers and servers are continually monitored and protected with intrusion detection systems and multiple firewalls.
Multi-Factor Authentication
We leverage MFA which increases security by requiring the user to provide not just their password, but also a unique code to verify their identity.
Certifications
Our data centers go beyond industry best practices and are ISO 27001 and SOC II certified.
Infrastructure
Our infrastructure is designed to exceed industry standards. It is monitored 24/7 by two independent third party firms to help protect your data.
24/7 Support
Customer & technical support is available to all users 24 hours a day, seven days a week.