Start the Conversation

Honeypot Field to Catch Bots
Honeypot Field to Catch Bots

Trust Center

Get details about DFIN’s security, privacy, compliance, resiliency, and the latest product security information.

Security Vault

Trust begins with transparency

Our mission is to build our products and services with security, privacy, compliance, and resiliency in mind. That’s why we created the Trust Center: to give you access to the latest information when you need it.

Security

  • Protect your data's integrity, availability, and confidentiality
  • Explore DFIN security products and services
  • Report a security issue
Learn more

Privacy

  • See how DFIN protects and respects individuals' privacy
  • View data protection guidelines
  • Explore global compliance data protection laws
Learn more

Compliance

  • Request compliance certificates
  • Global offerings (ISO/IEC, SOC, Bridge Letters, BSI, etc.)
  • Local and industry-specific certificates
Learn more

Security Matters

  • From the desk of the CISO
  • DFIN white papers
  • Knowledge Hub
  • Current threat landscape
Learn more

Compliance you can trust

Compliance brand - AICPA SOCCompliance brand - ISO 2700ICompliance brand - Cibersecurity FrameworkCompliance brand - GDPR

ActiveDisclosure

View our white paper detailing ActiveDisclosure's comprehensive security and privacy programs.

Learn more

Venue

View our white paper detailing Venue's comprehensive security and privacy programs.

Learn more

Arc Suite®

View our white paper detailing Arc Suite's comprehensive security and privacy programs.

Learn more
Phone expertPhone expert

We can provide additional information including our SOC 2 Type II report, once a Non-Disclosure Agreement is signed

Dannie Combs moderates at CNBC Technology Executive Council Summit

Dannie speaks with an executive panel to discuss the merger and integration of BB&T and SunTrust to form Truist Bank, how Truist turned to UiPath's Automation Cloud platform to build a digital workforce, automated over 150 processes, and tackled an unprecedented volume of fraudulent activity.

Dannie Combs - Chief Information Security Officer

From the desk of the CISO​

Led by Dannie Combs

CISO & CNBC Technology Executive Council Member
Security Icon

Security is integral to global operations

Our information security program is an integral part of our global operations. Over 10,000 businesses trust DFIN to safeguard their data. Our program is subject to annual independent audits for compliance and industry standards certifications, ensuring that our program not only meets but exceeds the most stringent of security requirements.

Security Icon

Data privacy is a top priority

Protecting our customer’s data privacy is a top priority. DFIN understands the importance of protecting the critical business and personal information entrusted to DFIN. We’re also committed to the General Data Protection Regulation (GDPR) compliance and have bolstered our already-strong data protection practices by evaluating and updating our company privacy policies and practices.

Security Icon

Meeting and exceeding compliance standards

DFIN is committed to achieving and maintaining the trust of our customers. Our data governance standards, policies, and procedures are informed by a full range of factors, including continuous monitoring of the security and privacy landscape to ensure our approach remains in step and complies with the latest state, federal, and international requirements.

Leverage our CISO’s insights

VIDEO PODCAST SERIES

Securing Company Data from Cyber Threats

Watch the two-part series as our CISO covers new cyber threats and how DFIN's advanced security protocols future-proof your business against bad actors.

Watch part 1
2 Part SeriesDannie Combs Podcast

Security matters

Our mission is to build our products and services with security, privacy, compliance, and resiliency in mind. That’s why we created the Trust Center: to give you access to the latest information when you need it.

DFIN leverages several technologies, processes, and procedures to ensure customer data remains secure. MFA (multi-factor authentication), data encryption in transit and at rest, EDR (Endpoint Detection and Response), antivirus and malware protection, robust access controls (based on least privileged access), and Network perimeter security to ensure comprehensive data protection for our clients.

DFIN leverages a Secure Software Development Life Cycle process (SSDLC) whereby security is incorporated into all stages of the software development life cycle. Static code analysis (SAST), Dynamic application scanning (DAST), continuous vulnerability scanning, secure software release management, software architecture reviews, and annual independent penetration testing contribute to DFIN's application security practice.

DFIN’s security team is made up of approximately 40 team members spread across several functional teams including Application Security, Cyber Threat Intelligence, Identity and Access Management, Security Architecture, Network Security, IT GRC (Governance, Risk, Compliance), Supply Chain Security, and Cyber Awareness and Advocacy, all under the leadership of our CISO, Dannie Combs. Additionally, DFIN partners with third-party security providers for 24x7 security monitoring and incident response.

Simply click the “Talk to an expert” button and we will be in touch!

DealMaker Cybersecurity Tablet
DFIN AND MORNING CONSULT RESEARCH

DealMaker Meter Cybersecurity Edition

69% of enterprise leaders say the risk outweighs the rewards of storing detailed data. Find out why and gain other valuable insights.

Download report

More findings, right this way

Blog

California’s Climate Accountability Package Takes Center Stage

Craig Clay
View blog

Blog

DFIN / XBRL U.S. Partnership Helps Clients Easily Meet FDTA Data Quality Mandates

John Truzzolino
View blog

Blog

Financial Reporting Requires Security at Every Level, Every Step of the Way

Craig Clay
View blog

Article

Form N-CSR Share Repurchase Disclosure iXBRL Mandate

Form N-CSR Share Repurchase Disclosure iXBRL Mandate - Card
Read article

Blog

Are You Ready for Multi-Extortion Ransomware?

dannie combs
View blog

Blog

SEC’s Modernization of the EDGAR Filing System

clark
View blog

Resources

M&A Industry Trends & Outlook 2023

Priya Shah
View resource

Resources

Top 10 Virtual Data Room Features To Look For

Top 10 Virtual Data Room Features -  Card
View resource

Resources

How M&A Deals Are Being Enhanced With AI & ChatGPT

How M&A Deals Are Being - Card
View resource

Resources

How To Enhance Deal Sourcing With AI & ChatGPT

How To Enhance Deal Sourcing - Card
View resource

Blog

SEC Introduces EDGAR BETA Testing for Filing Fee Modernization Rule

clark
View blog

Resources

Electronic Data Gathering Analysis and Retrieval (EDGAR)

clark
View resource

Video Podcast

Webinar Replay: SEC Regulatory Update, Trends, Lessons Learned from Proxy Season

Webinar Replay: SEC Regulatory Update - Card
Watch podcast

Blog

Life Sciences Organizations Look to Virtual Data Rooms to Manage Clinical Trial Confidential Data, and More

Life Sciences Organizations - Card
View blog

Blog

New DFIN Paper Illuminates the Road to a Public Offering

Craig Clay
View blog

Blog

DFIN’s 2Q Earnings Demonstrate Software’s Continued Strength

Craig Clay
View blog

Case Study

How we helped a major regional bank accelerate filing and improve reporting efficiencies by 20%

How we helped a major regional bank accelerate filing and improve reporting efficiencies by 20% - Card
Read case study

White Paper

The Importance of IPO Readiness: An Essential Framework for Success

The Importance of IPO Readiness: An Essential Framework for Success - Card
Read white paper

White Paper

Beyond the Financials: CFOs Can Help Boards Address New Challenges

Beyond the Financials: CFOs Can Help Boards Address New Challenges - Card
Read white paper

Blog

The SEC Announces New Cybersecurity Risk Disclosure Rules

clark
View blog