Not another document repository with features bolted on. Dealspace is designed from first principles for how M&A transactions actually work.
Traditional VDRs are document-centric — you upload files into folders and hope people find them. Dealspace flips the model: the Request is the unit of work.
Issue specific, trackable requests to the seller. No ambiguity about what's needed.
Open, assigned, answered, vetted, published. Know exactly where every request stands.
Every request has a complete thread — comments, clarifications, status changes. Full context, always.
Most users are workers, not deal managers. When the accountant logs in, they see their task inbox — not a deal room, not workstream dashboards. Just: what do I need to do today.
Finance team sees Finance. Legal sees Legal. No information overload.
Assignees see only their tasks. Complete one, it routes to the next person automatically.
Buyers only see published answers. Internal routing is invisible to external parties.
When a buyer submits a question, AI searches for existing answers. Match found? Human confirms, answer broadcasts to everyone who asked the same thing. One answer, many recipients.
Not just keyword matching. AI understands that "revenue breakdown" and "sales by segment" are the same question.
AI suggests, human confirms. No answer goes out without explicit approval.
Deal data never trains AI models. Private data stays private.
Not everyone needs to log into another platform. Participants can respond via email, Slack, or Teams. Requests route to people wherever they are.
Reply to request notifications directly from your inbox. Attachments included.
Get notified in your existing channels. Respond without context switching.
Basic responses work without an account. Full features available in the web app.
Every access, every download, every routing hop — logged. When compliance asks "who saw what when," you have the answer.
Who viewed which document, when, and from where. IP addresses, timestamps, duration.
Every file download recorded. Watermarked with user identity for leak tracing.
Full chain of custody. Who assigned, who approved, who published — every transition logged.