Trusted by industry
Our scores on SecurityScorecard and UpGuard reflect our commitment to security – transparency you can rely on
Powerful security options, tailored to your needs
Key highlights | Core | Premier | Enterprise |
---|
Granular permission settings Define roles and access at a user or group levels and revoke them at any time | |||
Comprehensive immutable audit trails Review every action for any user in the data room to the second | |||
Custom Terms of Use / NDA Set tailored NDAs for different groups to ensure legal alignment before access | |||
Access schedule and expiration by time Define date and time when user access begins and ends automatically | |||
Two-factor verification Use a one-time code sent to a phone or generated by an authenticator app | |||
Email verification Verify each user’s access to their emails to ensure secure access and accountability | |||
Domain and IP-address restriction Restrict access to specific IP addresses and email domains | |||
Custom session timeout Define how long a session remains active before automatic logout | |||
Custom password policies Specify the required frequency of password changes and the minimum complexity standards | |||
Corporate account Manage security rules, user access, and project settings from a single place | |||
Only selected data locations Limit where new data rooms can be created based on your requirements | |||
User management across projects Maintain centralized visibility and control over users working across multiple projects | |||
Export usage and audit logs Send audit logs directly to your security information and event management (SIEM) system | |||
Login access from your own site Allow users to log in to Ideals VDR directly from your organization’s website or portal | |||
Single sign-on Seamless identity management – one secure login gives access to all your projects |
Audited. Fortified. Certified.
Ensure compliance, trust, and total peace of mind with elite security credentials in data management
ISO/IEC 27001:2013 Certified
We continuously update and adhere to the necessary security layers. As a result, we are ISO 27001:2013 certified, providing you with technology that complies with high-risk management standards.
Download certificateSOC 2 & SOC 3 Certified
Taking the necessary precautions to protect your data is what we do. Our platform is SOC 2 and SOC 3 certified. This means that we strictly follow and adhere to the SOC Security Principles.
Download certificateGDPR Compliant
Compliant with the General Data Protection Regulation on maintaining the privacy and integrity of personal data, as well as with other Local Data Protection Laws.
HIPAA Compliant
Ideals compliance with HIPAA has been verified by a 3rd party, our data centers are compliant with U.S. Health Insurance Portability and Accountability Act of 1996 (HIPAA).
Download certificateTrusted security across every layer
Global data residency
Select your preferred data storage location – across multiple locations in Europe, Asia, Oceania, North and South America – to meet compliance needs and ensure optimal performance
Physical data protection
All Ideals data centers are protected by strict access policies and secure vaults
Fully closed secure perimeter
Your data stays protected within a unified, secure environment – never leaving our perimeter. All processing, including AI, happens safely inside, with no external exposure.
Industry-leading 99.95% uptime
Infrastructure components are designed with built-in redundancy, ensuring a highly resilient and fail-safe environment
Real-time data backup
Real time data synchronization between geographically remote data center and a resilient backup to ensure data can never be lost
Disaster recovery
Data remains accessible and protected even in emergencies, thanks to geographically remote data centers and measures to prevent worst-case scenarios
Multi-layered data encryption
Files are transferred with high-grade TLS protocol and encrypted at rest with 256-bit AES keys, stored separately from the data
8 levels of access rights
Administrators can set or restrict permissions easily, providing granular or role-based access to the data room
Dynamic watermarking
Names, IP addresses and times of access are included in watermarks, so you can track the source of any leak
Fence view
Partially conceal documents to prevent security breaches through screen printing, screen capture or unauthorized viewing
Secure spreadsheet viewer
Protect, view, and manipulate Excel spreadsheets online with restricted or secure access, including formula control
User security impersonation
Administrators can view document access from any user’s perspective to ensure that users see only their authorized documents
No footprints
No data is stored on the client side. It’s only held in RAM and never permanently written.
Intelligent redaction
Use advanced AI assistance to streamline redaction and protect sensitive data before sharing documents with third parties
Remote shred
Specify the duration for document downloads and revoke access rights to files even after they have been downloaded