Brainloop

Leading edge security

The Brainloop solution’s security architecture enables you to work on and distribute strictly confidential documents both within and beyond the firewall.

 

With strong encryption and the protection of all documents from unauthorised access by internal and external attackers, you move collaboration on your data into a high-security environment.

 

Maximum security in operation every day:

  • IT security made in Germany, hosted in Germany or elsewhere in Europe
  • Hosting in highly available ISO 27001-certified datacentres in Britain, France, Germany, Austria, Switzerland and Luxembourg
  • Two-factor authentication to prevent social engineering attacks
  • Completely separate administration of the Dataroom Centre and the datarooms themselves
  • Encryption of database and file system
  • Restrictively configured firewall
  • Operator Protection – Defence in depth protection against malicious operators and administrator shielding
  • Complete encryption at highest standards at rest, transit and on mobile devices (apps/client)
  • Integration of Information Rights Management technology (Adobe LiveCycle Management)
  • Security categories for consistent implementation of corporate policies
  •  External security audits of our applications several times a year

Certificates & Awards

ISO/IEC 27001:2013

Operation of all SaaS platforms

The ISO 27001 standard certifies that an information security system has been implemented for the secure operation of all SaaS platforms. During the implementation, the ISO 27018 standard was also established as a basis for data protection.

Read More

Download the Certificate

Trusted Cloud Data Protection Profile

Brainloop Cloud Services

Brainloop BoardRoom, CollaborationRoom, DealRoom (based on the Secure Dataroom technology) and MyRoom all comply with the highest level of TCDP data protection requirements for subcontracted data processing services: TCDP Version 1.0 (protection category III, data recoverability level: high).

Read More

Download the Certificate

Security Audit

Brainloop Secure Dataroom Service

Brainloop commissions every year security audits carried out by alternating Experts. In 2018 SEC Consult conducted the penetrations test on our web application with the result that there were no deficits identified.

Read More

Download the Certificate

Security Audit

Secure Client for iOS and Android

Brainloop commissions every year security audits carried out by alternating Experts. In 2018 SEC Consulting conducted the penetrations test on our Secure Clients application with the result that there were no critical deficits identified.

Read More

Download the Certificate

Security Audit

Brainloop MyRoom

Brainloop commissions every year security audits carried out by alternating Experts. In 2019 Secudream conducted the penetrations test on our web application with the result that there were no deficits identified.

Read More

Download the Certificate

FINMA-RS 18/3

Brainloop Switzerland AG

BDO certifies that Brainloop complies with requirements relating to the long-term outsourcing of major business areas – in accordance with the circular 2018/3 of the Swiss Financial Market Supervisory Authority (FINMA-RS 18/3)..

Read More

Brainloop Ranked ‘Best in Test’

Brainloop is the best at adapting to a company’s security strategy.

Com! Professional, a top technology magazine ranks Brainloop’s Secure Dataroom ‘Best in Test’.

Read More

Need maximum data security for your company?

Start using your solution today.

Brainloop solutions are quick and easy to implement and intuitive to use. Users who work on PCs can already start working with them after a brief introduction. No IT knowledge is required to operate these secure solutions. Your company has immediate access to a dataroom available from anywhere in the world – and nobody can use it without your permission.

OUR LATEST ARTICLES ON THE TOPIC INFORMATION SECURITY

IP management: protect your trade secrets and intellectual property

Data theft, hacker attacks, viruses and trojans – cyber-attacks have been increasing for years now and have become a familiar phenomenon in our society. But…

Cryptic messages: an ABC of encryption

There have always been secrets. And people have been trying to protect their intellectual property from prying eyes for almost as long. For example, the…

Software design: the importance of microservices and agility

When a company wants to develop software, the choice of the right architecture is just as decisive for the project’s success as the definition of…

Under lock and key: securing communication processes in law firms

A daily stream of sensitive documents flows through every law firm and legal department. Matter-related documents, transaction and deal bibles, due diligence reports, board and…