<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1958976617683363&amp;ev=PageView&amp;noscript=1">

5 Reasons M&A Deals Fail

Analysts estimate that 2018 is going to be a big year in the mergers and acquisitions market. As we’ve written about before, a Deloitte Consulting survey released in late 2017 ...
Read More

3 Tools to Streamline M&A Deal Flow in 2018

 With the start of the new year come the resolutions, as we all look to become better people and improve our quality of life.  One thing that people frequently resolve is to ...
Read More

Are Virtual Data Room Provider's Free Drinks and Game Tickets Worth It?

Everyone loves to be "wined and dined" by a VDR salesperson, but does booze and boxes takes away from investment in data room security? In recent years, the integrity and ...
Read More

Industry Spotlight: US Consumer Retail Market

In 2017, Americans spent a record $6.6 billion on “Cyber Monday,” a day in which many retailers kick off the holiday shopping season online with countless sales and promotions. ...
Read More

Virtual Data Rooms: What Hollywood Moguls can Learn From the Wolves of Wall Street.

The HBO hack earlier this year, in which Game of Thrones scripts and episodes of Curb Your Enthusiasm and Ballers were released online before their air dates, caused chaos for ...
Read More

Top M&A Deal Leaks of 2017

The year isn't even over and there have already been some major M&A deal leaks of 2017. Mergers and acquisitions are highly sensitive transactions that demand the utmost in ...
Read More

Considering a File Sharing Platform? Here's What You Need to Know.

People share files in business all the time. You simply attach a document into an email and send it off to co-workers, clients, vendors, partners, etc. But how safe and ...
Read More

Multi-Layered Security Virtual Data Room Protection: What You Need to Know

Sony. Equifax. Yahoo. HBO. Target. The Democratic National Committee.  Each of these entities suffered major losses (financial and otherwise) as a result of computer hacking.  ...
Read More