legalworkspace-infographic 0116

1
WE HAVE BUILT A FORTRESS TO PROTECT YOUR DATA & APPS. Here are some (but not all) of the key defenses: Data not stored on any remote device: applications and data only accessible when logged in to Legal Workspace Two data centers located near our offices in Colorado and Texas with private, secure connection between the two sites Private hardware that can only be accessed by our specially trained personnel—no third party has access to your data Physical access through logged multi-factor identification; video recording of the equipment housing your data and applications Encryption of data both in transit and at rest Two-factor authentication for clients to access their environments Monitored Intrusion Detection and Prevention Systems (IDPS) Logged access to all files, folders and resources in the data center Aggressive updates of all firmware and software reported downtime or loss of billable hours of the biggest 100 law firms have had some sort of breach someone loses a laptop in the US report using encryption on smartphones reported infections with viruses/spyware/malware reported using encryption for privileged e-mails sent to clients report the use of full disk encryption report use of intrusion prevention systems reported that use of file encryption is higher than full disk LEGAL TECHNOLOGY SURVEY STATISTICS 42 % Every minute, Every minute, 30 % 30 % 80 % 80 % 42 % 42 % 42 % 22 % 22 % 35 % 35 % 14 % ONLY 14 % ONLY 20 % ONLY 20 % ONLY

Upload: melissa-ek

Post on 12-Apr-2017

59 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: legalworkspace-infographic 0116

WE HAVE BUILT A FORTRESS TO PROTECT YOUR DATA & APPS.

Here are some (but not all) of the key defenses:

Data not stored on any remote device: applications and data only accessible when logged in to Legal Workspace

Two data centers located near our offices in Colorado and Texas with private, secure connection between the two sites

Private hardware that can only be accessed by our specially trained personnel—no third party has access to your data

Physical access through logged multi-factor identification; video recording of the equipment housing your data and applications

Encryption of data both in transit and at rest

Two-factor authentication for clients to access their environments

Monitored Intrusion Detection and Prevention Systems (IDPS)

Logged access to all files, folders and resources in the data center

Aggressive updates of all firmware and software

reported downtime or loss of billable hours

of the biggest 100 law firms have had some sort of breach

someone loses a laptop in the US

report using encryption on smartphones

reported infections with viruses/spyware/malware

reported using encryption for privileged e-mails sent to clients

report the use of full disk encryption

report use of intrusion prevention systems

reported that use of file encryption is higher than full disk

LEGAL TECHNOLOGY SURVEY STATISTICS

42%

Every minute,Every minute,

30% 30%

80% 80% 42% 42%

42%

22% 22%

35% 35%

14% ONLY

14% ONLY

20% ONLY

20% ONLY