Collaboration and security
Securely manage and collaborate on data assets
Safely manage data while turning it into a valuable asset for your team and organization.

Collaboration and security
Securely manage and collaborate on data assets
Safely manage data while turning it into a valuable asset for your team and organization.

Collaboration and security
Securely manage and collaborate on data assets
Safely manage data while turning it into a valuable asset for your team and organization.

Collaboration and security
Securely manage and collaborate on data assets
Safely manage data while turning it into a valuable asset for your team and organization.

Data assets give your business a competitive edge
Project invitation and data access permission settings
Invite collaborators to a project with necessary permissions, allowing flexible collaboration while maintaining data security.

Project invitation and data access permission settings
Invite collaborators to a project with necessary permissions, allowing flexible collaboration while maintaining data security.

Project invitation and data access permission settings
Invite collaborators to a project with necessary permissions, allowing flexible collaboration while maintaining data security.

Project invitation and data access permission settings
Invite collaborators to a project with necessary permissions, allowing flexible collaboration while maintaining data security.


Space permission settings
We support granular management of space permissions for specific purposes such as Admin, Team, Privacy, Security, and Developer.


Space permission settings
We support granular management of space permissions for specific purposes such as Admin, Team, Privacy, Security, and Developer.


Space permission settings
We support granular management of space permissions for specific purposes such as Admin, Team, Privacy, Security, and Developer.


Space permission settings
We support granular management of space permissions for specific purposes such as Admin, Team, Privacy, Security, and Developer.


SSO (Single Sign-On) login
SSO logins provide users with login convenience while enabling businesses to strengthen security management.


SSO (Single Sign-On) login
SSO logins provide users with login convenience while enabling businesses to strengthen security management.


SSO (Single Sign-On) login
SSO logins provide users with login convenience while enabling businesses to strengthen security management.


SSO (Single Sign-On) login
SSO logins provide users with login convenience while enabling businesses to strengthen security management.

IP access control
By restricting login access to only specified IPs, you can block unauthorized access to data and ensure compliance with security standards.

IP access control
By restricting login access to only specified IPs, you can block unauthorized access to data and ensure compliance with security standards.

IP access control
By restricting login access to only specified IPs, you can block unauthorized access to data and ensure compliance with security standards.

IP access control
By restricting login access to only specified IPs, you can block unauthorized access to data and ensure compliance with security standards.

Inactivity timeout
By automatically logging out users after a period of inactivity, minimize security risks and prevent data leaks.

Inactivity timeout
By automatically logging out users after a period of inactivity, minimize security risks and prevent data leaks.

Inactivity timeout
By automatically logging out users after a period of inactivity, minimize security risks and prevent data leaks.

Inactivity timeout
By automatically logging out users after a period of inactivity, minimize security risks and prevent data leaks.


Manage security log
Manage member usage by reviewing access logs, personal data download records, permission change logs, and security settings status.


Manage security log
Manage member usage by reviewing access logs, personal data download records, permission change logs, and security settings status.


Manage security log
Manage member usage by reviewing access logs, personal data download records, permission change logs, and security settings status.


Manage security log
Manage member usage by reviewing access logs, personal data download records, permission change logs, and security settings status.

Protect respondents' data
with security best practices
Protect respondents' data with security best practices
Dataspace provides a 'personal information' question type for collecting sensitive data such as name, phone number, and address.

Dataspace provides a 'personal information' question type for collecting sensitive data such as name, phone number, and address.

Information collected using personal information question types is encrypted and securely stored.

Information collected using personal information question types is encrypted and securely stored.

Information collected using personal information question types allows you to set a retention period. After the retention period ends, the data is automatically disposed of.

Information collected using personal information question types allows you to set a retention period. After the retention period ends, the data is automatically disposed of.

Data assets need to be protected safely
Dataspace has safeguards across data collection, project access levels, and collaboration features such downloading and sharing.

Dataspace has safeguards across data collection, project access levels, and collaboration features such downloading and sharing.

Dataspace has safeguards across data collection, project access levels, and collaboration features such downloading and sharing.

Dataspace ensures secure data management with Google and AWS cloud security, continuously advancing privacy and protection practices.

Dataspace ensures secure data management with Google and AWS cloud security, continuously advancing privacy and protection practices.

Dataspace ensures secure data management with Google and AWS cloud security, continuously advancing privacy and protection practices.

Personal data is automatically encrypted, stored securely, and deleted safely.

Personal data is automatically encrypted, stored securely, and deleted safely.

Personal data is automatically encrypted, stored securely, and deleted safely.

Pricing
Company

Certification Number: ISMS-P-KISA-2023-027
Certification Scope: Research Platform Service
Validity Period: 2023.7.5 ~ 2026.7.4
Copyright © Opensurvey Inc
Copyright © Opensurvey Inc
Copyright © Opensurvey Inc


