legalworkspace-infographic 0116

legalworkspace-infographic 0116

  • View
    53

  • Download
    2

Embed Size (px)

Text of legalworkspace-infographic 0116

  • WE HAVE BUILT A FORTRESS TO PROTECT YOUR DATA & APPS.

    Here are some (but not all) of the key defenses:

    Data not stored on any remote device: applications and data only accessible when logged in to Legal Workspace

    Two data centers located near our offices in Colorado and Texas with private, secure connection between the two sites

    Private hardware that can only be accessed by our specially trained personnelno third party has access to your data

    Physical access through logged multi-factor identification; video recording of the equipment housing your data and applications

    Encryption of data both in transit and at rest

    Two-factor authentication for clients to access their environments

    Monitored Intrusion Detection and Prevention Systems (IDPS)

    Logged access to all files, folders and resources in the data center

    Aggressive updates of all firmware and software

    reported downtime or loss of billable hours

    of the biggest 100 law firms have had some sort of breach

    someone loses a laptop in the US

    report using encryption on smartphones

    reported infections with viruses/spyware/malware

    reported using encryption for privileged e-mails sent to clients

    report the use of full disk encryption

    report use of intrusion prevention systems

    reported that use of file encryption is higher than full disk

    LEGAL TECHNOLOGY SURVEY STATISTICS

    42%

    Every minute,Every minute,

    30% 30%

    80% 80% 42% 42%

    42%

    22% 22%

    35% 35%

    14% ONLY

    14% ONLY

    20% ONLY

    20% ONLY