Security controls for live deal workflows
DocKosha is designed for firms handling sensitive client documents in active deal rooms. We combine core security controls with practical sharing policies like watermarking, gating, download restrictions, and auditability.
Security controls at a glance
This page is a plain-English overview for advisory firms and client security reviewers. If you need specifics for a questionnaire, contact us.
Encryption in transit & at rest
Authentication
Role-based access control
Row Level Security (RLS)
Secure sharing controls
Internal audit logs
Dynamic watermarking
Privacy-first analytics
Operational monitoring
How DocKosha approaches security for advisory teams
We treat secure deal sharing as a product capability, not a marketing checkbox. Encryption matters, but preventing leaks in practice usually comes down to whether policy is enforced at the room, link, folder, and document level.
Policy controls for live sharing
DocKosha focuses on controls that still matter after a room goes live:
- Link-level permissions for view and download behavior
- Gating like verification, allowlists or blocklists, and NDA terms
- Expiration and revocable access patterns
- Watermarking for accountability and deterrence
Privacy-first analytics for follow-up
Advisory teams often need to know what was opened, revisited, or downloaded. Viewer analytics are designed to surface those signals while minimizing sensitive data collection.
- We avoid storing raw IP addresses
- Identity is collected only when link settings require it
- Events focus on viewing, downloads, and time spent
What this means for sell-side and buy-side work
In plain English: DocKosha helps firms control who can open sensitive materials, what they can do after opening them, and what activity the internal team can review later.
- Use gated access for CIMs, contracts, and financials
- Apply watermarking when documents move outside the firm
- Review audit logs and analytics to support internal follow-up
Reporting a vulnerability
If you believe you’ve found a security issue, email us with steps to reproduce and any relevant logs or screenshots.