Admincontrol AS

Virtual Data Room

Virtual Data Rooms (VDRs) from Admincontrol are custom-designed to streamline and support due diligence processes. In the data room institutions can share confidential documentation and perform Q&A rounds in an intuitive and secure environment.

A Virtual Data Room ensures rapid, transparent and secure information sharing.


  • VDR built around streamlined process
  • Structure and control of data and sensitive documents
  • Secure interaction and sharing outside of the organisation
  • Access and support available, 24/7/365
  • Dedicated client manager
  • Available on any device
  • Security at heart of the service
  • Unlimited storage
  • Unlimited users
  • An agile Q&A module is core functionality


  • Run complex Q&A sessions very simply
  • Very useful for complex procurement processes
  • Only pay for what you use
  • Can be set up with 60 minutes
  • Download your data at end of process
  • Ensures business-critical information gets to the right people
  • Cost savings
  • Faster and better decision making with full audit trail
  • Permanent access to key documents, online and offline
  • Our expert consultant will assist in running of VDR


£250 to £1,000 a licence a month

Service documents


G-Cloud 12

Service ID

3 4 5 6 4 3 8 7 8 7 7 0 4 7 3


Admincontrol AS David Reilly
Telephone: +44 (0) 7437 216579

Service scope

Software add-on or extension
Cloud deployment model
Private cloud
Service constraints
No constraints
System requirements
  • Modern browser access
  • Any device

User support

Email or online ticketing support
Email or online ticketing
Support response times
Almost immediately and certainly within 5 minutes. No difference at weekends.
User can manage status and priority of support tickets
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Onsite support
Support levels
All support is included in fee. Local support team in UK can be onsite. Training is for all users is also included within license. When onboarding a client we base a team at client to undertake training and onboarding thereafater support tend to be based over web, telephone or video conference. Any onsite refresher training for existing or new staff is also included.Phone & Email based support is available on a 24x7x365 basis and is provided free of charge if specified in the subscription agreement. Service and support includes setting up the Portal and/or Data Room, assist customer in getting started and technical assistance and/or user issues that may occur. Our goal is to provide truly excellent support service around the clock and respond on all support requests as soon as possible. Support statistics may be provided upon request
Support available to third parties

Onboarding and offboarding

Getting started
Admicontrol appoints a consultant to work on each VDR. Consultant will assist client design and implement VDR including Q&A sessions.
Service documentation
Documentation formats
End-of-contract data extraction
Simply choose to download.
End-of-contract process
Contract is all inclusive Access to the Admincontrol service • Unlimited storage capacity for scanned and uploaded documents • Unlimited distribution of documents between registered users • Support to users by phone and e-mail 24/7 days a week • Always access to the latest version of the service • Unlimited number of user.

At end of life of data room client simply informs our support team and bulk downloads all material or we can supply on disk.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Identical although we also have specific free iPad and iPhone app. You can can work offline through the app.
Service interface
Customisation available
Description of customisation
VDR is designed specifically for each client


Independence of resources
Our Internal QA team performs performance tests to ensure that Response times should be less than 3 seconds max for any function performed (given that the user has an acceptable internet connection (ADSL/4G or better))


Service usage metrics
Metrics types
Admincontrol provides standard reports on - login - storage used
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Drag and drop or browse through directory and choose files. You can batch download also.
Data export formats
  • CSV
  • Other
Other data export formats
  • Zipped archive
  • Original format (PDF, Word, Excel, Powerpoint,
  • Ext, Image (bmp,png,gif,jpg,tif), audio (mp3), video (mov,mpg,avi), Message (.msg)
Data import formats
  • CSV
  • Other
Other data import formats
  • Zipped archive
  • Original format (PDF, Word, Excel, Powerpoint,
  • Text, Image (bmp,png,gif,jpg,tif), audio (mp3), video (mov,mpg,avi), Message (.msg)

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
The SLA states availability of 99.97% quarterly based, and we are above/performing better than this. Phone Support is available 24x7x365. No direct penalty other than liability due to direct damage as specified in the standard terms and conditions. Admincontrol’s liability due to direct damage inflicted on the Client in relation to use of the service, regardless of cause, is limited to the lesser of the Client s documented economic loss or the total amount of the Subscription Agreement. This includes loss of data or financial loss that may occur in relation to use of the service, including reduced availability or functionality of the service
Approach to resilience
Available on request
Outage reporting
All maintenances that affect uptime and availability is communicated to the customer 1 week in advance. On login page for all users and on email to portal administrator.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Username or password
  • Other
Other user authentication
Touch ID available on iPad and iPhone
Access restrictions in management interfaces and support channels
Only a limited amount of personnel with Support function or IT Operations may access customer data, all access is logged and only dedicated user accounts are used.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
5 March 2018
What the ISO/IEC 27001 doesn’t cover
Our Data Centres are also covered.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
Other security governance standards
ISAE 3000 and ISO 27001:2013 Certification is to be completed within Q1 2018.
Information security policies and processes
Admincontrol service security policy, customer support security policy, Email Security Policy, information security policy for employees, Laptop Security Policy are defined and approved by management and are available upon request.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
A formal change management process is in place and all changes registered and followed up via our bug tracking and project management tool. We use Stage gate model for managing projects and Agile methodologies for the actual development. All changes are maintained in our bug tracking and project management software including our versioning control and source code management.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Patch management policy & process in place. All devices are updated with patches as soon as possible with automatic update procedures. Patches and firmware for network components follow vendor patching requirements. Weekly vulnerability scans are performed to identify any missing patches or other misconfigurations.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
All traffic is monitored with managed Intrusion Prevention System connected to 24x7x365 Manned Security Operation Center notifying Admincontrol IT Operations Duty of any suspicious, harmfull or unauthorised activities. All traffic is default denied unless specifically authorised. Centralized and Managed log & SIEM solution in place. Incident management process implemented to act on any security incidents. Logs are stored in Read Only Archive All systems are monitored 24x7x365. IT Operations department utilize tools for network monitoring and ip address mapping to detect any discrepancy on the networks, weekly vulnerability and network scans are performed by our authorised system personnel.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Admincontrol has a documented incident response plan. We have a response team in place, along with a set of policy and procedures for handling incidents, gathering and communication to relevant parties. This is available on request.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£250 to £1,000 a licence a month
Discount for educational organisations
Free trial available

Service documents