ILTA Conference 2011 - Biscom Secure File Transfer Technology Demonstration
Upcoming SlideShare
Loading in...5
×
 

ILTA Conference 2011 - Biscom Secure File Transfer Technology Demonstration

on

  • 632 views

International Legal Technology Association (ILTA) 2011 Annual Conference presentation by Biscom Legal Director Charlie Magliato who demonstrated Biscom's leading secure file transfer product for the ...

International Legal Technology Association (ILTA) 2011 Annual Conference presentation by Biscom Legal Director Charlie Magliato who demonstrated Biscom's leading secure file transfer product for the legal industry.

Statistics

Views

Total Views
632
Views on SlideShare
632
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Today law firms face multiple challenges relating to what should be a very simple process of electronic transfer of documents and files form point A to point B. However what should be a simple process has become increasingly complex as files get larger and larger and the potential for data breach is an increasing concern. During our session today we will delve into the technical and legal issues surrounding electronic document exchange with clients, business partners and outside counsel.
  • Today law firms face multiple challenges relating to what should be a very simple process of electronic transfer of documents and files form point A to point B. However what should be a simple process has become increasingly complex as files get larger and larger and the potential for data breach is an increasing concern. During our session today we will delve into the technical and legal issues surrounding electronic document exchange with clients, business partners and outside counsel.
  • Today law firms face multiple challenges relating to what should be a very simple process of electronic transfer of documents and files form point A to point B. However what should be a simple process has become increasingly complex as files get larger and larger and the potential for data breach is an increasing concern. During our session today we will delve into the technical and legal issues surrounding electronic document exchange with clients, business partners and outside counsel.
  • IDG recently released a very revealing study regarding companies perceived level of protection from data leaks. IDG identified internal employee mistakes or carelessness as the number one cause by far for data leaks. Yet when IT departments of companies were surveyed they felt the least protected from unintended employee data leaks.
  • Today law firms face multiple challenges relating to what should be a very simple process of electronic transfer of documents and files form point A to point B. However what should be a simple process has become increasingly complex as files get larger and larger and the potential for data breach is an increasing concern. During our session today we will delve into the technical and legal issues surrounding electronic document exchange with clients, business partners and outside counsel.
  • Today law firms face multiple challenges relating to what should be a very simple process of electronic transfer of documents and files form point A to point B. However what should be a simple process has become increasingly complex as files get larger and larger and the potential for data breach is an increasing concern. During our session today we will delve into the technical and legal issues surrounding electronic document exchange with clients, business partners and outside counsel.
  • Today law firms face multiple challenges relating to what should be a very simple process of electronic transfer of documents and files form point A to point B. However what should be a simple process has become increasingly complex as files get larger and larger and the potential for data breach is an increasing concern. During our session today we will delve into the technical and legal issues surrounding electronic document exchange with clients, business partners and outside counsel.
  • Today law firms face multiple challenges relating to what should be a very simple process of electronic transfer of documents and files form point A to point B. However what should be a simple process has become increasingly complex as files get larger and larger and the potential for data breach is an increasing concern. During our session today we will delve into the technical and legal issues surrounding electronic document exchange with clients, business partners and outside counsel.
  • Today law firms face multiple challenges relating to what should be a very simple process of electronic transfer of documents and files form point A to point B. However what should be a simple process has become increasingly complex as files get larger and larger and the potential for data breach is an increasing concern. During our session today we will delve into the technical and legal issues surrounding electronic document exchange with clients, business partners and outside counsel.
  • Today law firms face multiple challenges relating to what should be a very simple process of electronic transfer of documents and files form point A to point B. However what should be a simple process has become increasingly complex as files get larger and larger and the potential for data breach is an increasing concern. During our session today we will delve into the technical and legal issues surrounding electronic document exchange with clients, business partners and outside counsel.
  • Today law firms face multiple challenges relating to what should be a very simple process of electronic transfer of documents and files form point A to point B. However what should be a simple process has become increasingly complex as files get larger and larger and the potential for data breach is an increasing concern. During our session today we will delve into the technical and legal issues surrounding electronic document exchange with clients, business partners and outside counsel.
  • Today law firms face multiple challenges relating to what should be a very simple process of electronic transfer of documents and files form point A to point B. However what should be a simple process has become increasingly complex as files get larger and larger and the potential for data breach is an increasing concern. During our session today we will delve into the technical and legal issues surrounding electronic document exchange with clients, business partners and outside counsel.
  • Biscom’s Secure Document Exchange technology has been specifically designed to meet the demanding secure file transfer requirements of the legal market.
  • Biscom is a leader in the document delivery market. A pioneer in the fax server market, its founder patented fax server technology and introduced it to the market in 1986. Today Biscom fax servers process millions of documents daily in many of this country’s largest companies. In 2003 Biscom launched the Biscom Delivery Server division with the charter to develop the next generation secure file transfer solution. Since then Biscom Delivery Server has achieved wide industry recognition and has been successfully deployed in major law firms as well as leading organizations in industries where security is a priority, including healthcare and financial services .
  • BDS is a secure, manageable file transfer solution that is software only, and runs on pretty much any platform or environment out there. BDS is available as an on-premise or cloud deployment.To send a secure delivery, users simply sign into a Web application or for Outlook users, they compose a new message. Drag and drop the files into the delivery, enter the recipients’ email addresses, and send it off.
  • A lightweight email notification goes out to all the recipients, with a link back into the application.
  • Once authenticated, recipients can view the secure delivery and download their files. All of this is being tracked and senders can see exactly who’s opening and downloading their files. All the data is encrypted while stored in our server as well as during transmission. This is a policy-based application – so you can define parameters around the delivery to help with data governance, automatically route messages securely, but also prevent specific files from being sent, or block certain users or entire domains from receiving deliveries. You can even use your favorite scripting language to build automated processes into your workflows or legacy applications.
  • Biscom Delivery Server is designed to operate seamlessly with Microsoft Exchange to allow users to continue to work in the environment that they are most familiar, with no change to user behavior. Policies managed in the BDS server will determine weather an email is sent normally through Exchange or is re-routed as a BDS delivery. These policies include email attachment size, file type or keyword in the subject line. For emails that are rerouted as a BDS delivery, BDS generates an email notification to the recipient with an embedded hyperlink that directs the recipient to the BDS server to download the attachments. Each step of the way, BDS tracks every transaction and creates a detailed audit trail. BDS also stores only one copy of a file attachment for user access or collaboration. This eliminates the issue of creating multiple copies of the same file in Exchange and can result in dramatic reduction of required Exchange storage.
  • One of the primary use cases for Biscom Delivery Server (BDS) is replacing law firm FTP sites with advanced ad-hoc secure file transfer. Biscom, in collaboration with Adaptive Solutions,further establishes its commitment to the legal market by delivering seamless integration of its advanced secure file transfer technology with Autonomy iManage. BDS for iManage targets law firm litigation and practice groups that transfer large volumes of files from various sources, including documents stored in WorkSite directories. BDS for iManage improves the efficiency of the transfer process by eliminating the need to move WorkSite documents to a local store before uploading to a BDS delivery. In addition, documents contained in incoming BDS deliveries can be imported directly into a WorkeSite folder, inheriting matter centric metadata. BDS for iManage eliminates duplication of WorkSite files in temporary locations that otherwise would be required to support the file transfer process.
  • Users are assigned roles based on their requirements. (click) Most users within the organization where BDS is deployed are assigned the Sender role. Senders can create secure deliveries and track the activity and status of deliveries they have sent or received. When a delivery is sent to a person outside the organization BDS automatically creates a recipient role for that person, eliminating the need for IT to get involved with administering external recipient accounts. (click) Recipients can receive and reply to secure deliveries.(click) Administrators control system configuration and user management, including sender permissions.(click) and individuals assigned the reporter role can access reports that track their individual delivery activity, including when a delivery was viewed by the recipients and when each file was downloaded.
  • BDS maintains detailed transaction logs of delivery activity to meet regulatory compliance and audit for potential data breaches. Comprehensive reporting functions allow administrators to drill down into individual users and see everything that user is doing within the system. The transaction logs are permanently maintained by BDS even after the deliveries are deleted. As Bruce mentioned during his presentation, having this ability to track delivery activity can be instrumental in resolving disputes with adversarial parties regarding confirmation of document delivery.(click) With our most recent release we have introduced a compliance officer role which offers even more insight into user activity. Users who have the compliance role have the ability to access all packages and deliveries in the system for spot checks or audits. The compliance officer role addresses several of the new data breach regulations which require comprehensive, enterprise-wide audit of data transfer activity.
  • BDS also offers Web interface (shown here) which is typically used by practice support staff whose job function requires frequent transfer of high volumes of large files to support litigation and e-discovery demands. The Web interface provides additional delivery options to give senders even more control over how the delivery is sent out and how the sender gets notified. Even on the web, we support dragging and dropping files, integration with the Global Address List, auto-completion of recipients, a secure message, revisions to a default delivery notification message, and checkpoint restart for very large files. The feedback we’ve received from our customers is that it’s a highly functional yet very simple user interface.In our next release scheduled for mid-2010, your will be able to upload documents directly from an Autonomy iManageFilesite directory, eliminating the extra steps of transferring a Filesite document to a local directory and then uploading to the BDS delivery.

ILTA Conference 2011 - Biscom Secure File Transfer Technology Demonstration ILTA Conference 2011 - Biscom Secure File Transfer Technology Demonstration Presentation Transcript

  • Biscom
    The Legal Industry’s Leading Ad-Hoc Secure File Transfer Solution
  • Agenda
    Legal Industry Trends Driving Secure File Transfer Adoption
    SFT Critical Success Factors
    Biscom in the Secure File Transfer Market
    Biscom Secure File Transfer Overview/Demonstration
  • Legal Market Thought Leader
    Active ILTA Sponsor
    Regular ILTA Product Briefings
    ILTA RoadshowProgram
    2011 ILTA Conference
    Technology Demo Tract
    CIO Forum Sponsor
    Legal Industry Newsletter
    Press Coverage
  • 2011 CIO Forum
    Legal Industry Growth Flat
    IT Headcount Under Pressure
    Alternative Fee Arrangements
    Firms Reducing Costs and Increasing Efficiency
    Clients Demanding Increased Data Security
  • Protecting Confidential Client Data
    Reason for data leaks
    “How well protected do you feel your company is
    against each of the following types of data leaks?”
  • Secure File Transfer Critical Success Factors
    Meet Security and Compliance
    100% User Adoption
    Reduce Cost to Administer
    Increase Attorney/Staff Productivity
  • Industry Leading Security
    3 Tier Architecture
    Encryption
    Secure Reply
    • SSL128
    • AES256
    • Anti-Virus
    SS
    Secure Package
    Files
    Folders
    Message
    Authentication
    Compliance
    • Auto Registration
    • Activation
    • Second Level PW
    • Transaction Logging
    • Compliance officer
    Integration
    • Metadata mgmt
    • DLP
  • AmLaw 100 Firm
    650 attorney 100 firm
    Issue
    Required increased document exchange security
    HIPPA Compliance Concern
    Solution – Biscom
    Strong recipient authentication
    “The level of security (the previous) service offered, which allowed recipients to forward documents to another person or give someone unauthorized access, was a concern for the transmission of HIPAA data. Biscom’s security level is much more stringent.” Director, Practice & Project Services, AmLaw 100 Law Firm
  • User Adoption
    Intuitive for internal and external users
    Does not impact user behavior
    Interoperates with best of breed legal applications
    Document Management
    Metadata cleansing
    Data loss prevention
  • 80 Attorney Washington DC Firm
    Issue
    Secure transfer of confidential employee data
    Solution – Biscom
    Rapid HR Department adoption
    “You can securely send whatever confidential employee data you might have – addresses, social security numbers and compensation and benefit enrollment information – by simply clicking on a button in Outlook and pressing send.” Sharon Bovelle, Chief Human Resources Officer
  • Cost to Administer
    Eliminates FTP account set up & permissions
    Ends creation of physical media
    Reduces help desk support
    “Set it and Forget It”
  • 450 Attorney Washington DC based firm
    Issue:
    Cost, complexity and security issues of FTP, email & Physical media
    Solution – Biscom
    Reduced file transfer costs
    Improved security and staff productivity
    “Before Biscom, the litigation team needed IT support for almost every transfer. Now attorneys and administrative staff are nearly self sufficient and require very little IT support…. we’ve seen a 50% reduction in the use of overnight courier services which results in a noticeable amount of cost savings.” Bob Lamy, CTO
  • Increase Attorney/Staff Productivity
    No more hassles with email bounce backs
    Real time verification of receipt
    Non-repudiation of receipt
    Bi-directional collaboration
  • 150 Attorney Chicago based law firm
    Issue:
    Using E-mail for large file transfer
    Solution – Biscom
    Improved collaboration & firm image
    Non-repudiation of receipt
    “It’s a frustratingly annoying process where you breakup information into smaller
    files and resend multiple e-mails due to a failed receipt. This process not only steals away valuable billing time, it diminishes the collaborative efforts with clients and understates the law firm’s robust technical expertise.” Joel Rothman, Partner
  • Biscom - The Legal Security Software Leader
    Secures Transfer of Confidential Client Data
    Protect Your Firm from Unintended Employee Data Breaches
    Meet Data Privacy Regulatory Compliance
    Improves Efficiency & Reduces Cost of Document Exchange
    Replace High Maintenance, Unsecure FTP
    Offload Large Email Attachments
    Reduce Courier/Overnight File Delivery
    Eliminates need to deploy extranets
    Facilitates collaboration with Clients and Outside Counsel
    Highest certification for 5 consecutive years!
  • What is the biggest issue or challenge facing IT overall?
    69
    48
    47
    27
    26
    25
    17
    15
    1
    2010 ILTA Member Technology Purchasing Survey
  • Biscom Secure File Transfer
    Key Features
    Biscom, Inc. document delivery since 1986
    Security division launched in 2003 as “intelligent” secure file transfer solution
    • Software-only architecture - no proprietary hardware required
    • Data secured “in transit “and “at rest”
    • Platform neutral – Windows, Linux, VM
    • Scalable “out of the box” and integrates with your SAN/NAS storage
    • Easy to use – no changes to user behavior
    • Premise and cloud based deployment
    • Precise auditing & transaction reporting
    Akin Gump
    Strauss Hauer &Feld
  • Biscom Leadership, Awards & Recognition
    Legal Tech Newsletter
    Sean Doherty Review Legal Technology News
    American Legal Technology Insider
    The Legal Intelligencer
    Peer to Peer Magazine
  • Three steps to deliver files securely
    Your senders collect documents and files, and create a package in BDS
    Your company – Internal Senders
    External Recipient
  • Three steps to deliver files securely
    Your senders collect documents and files, and create a package in BDS
    Your sender addresses the package and a notification email goes out to your recipients
    Your company – Internal Senders
    External Recipient
  • Three steps to deliver files securely
    Your senders collect documents and files, and create a package in BDS
    Your sender addresses the package and a notification email goes out to your recipients
    Recipients click the embedded link, authenticate, and download their files
    Your company – Internal Senders
    External Recipient
  • How it works
    Avoiding Large Email Attachments in Exchange
    Enterprise has established size limits and policies for email attachments
    Policies based on attachment size, file type, or keyword for secure send
    Direct Outlook integration, no Exchange connectors or gateways required
    Re-routing attachments is transparent/seamless to the end user
  • iManage Connector
    Streamline SFT for iManagedocuments
    Upload to BDS directly from WorkSiteSite
    Import to WorkSite from received BDS deliveries
    Eliminate duplication of WorkSite documents in temporary file stores
  • Demonstration
  • Biscom Advanced Security
    Secure Message
    Secure Reply
    AD Authentication
    Anti-Virus/AES256 Encryption
    Permanent Transaction Logging
    3-tier Architecture
    Compliance Role
    DLP/Content Filtering
  • Performance
    Upload Applet
    No File Size Limit
    Auto Restart
    Strong Verification of Receipt
  • Outlook Integration
    Email Body Sent as Secure or Notification Msg.
    Optional Message
    Physical Attachments in Stub
    “Send Secure” Button
  • Deployment
    Multiple deployment options:
    • Server-based (Windows or Linux)
    • VMware Appliance
    • Cloud
    Public-facing, no data stored
    Business logic, no data stored
    Data layer
  • Users are assigned roles
    Senderscan create secure deliveries
    Recipientscan receive and reply to secure deliveries
    Administratorscontrol system configuration and user management
    Reportersview transactions and audit information
  • Administrator Can Track & Audit Files Sent
    Compliance Officer enterprise audit and reporting
  • Customizable Interface
  • Deployment
    Multiple deployment options:
    • Server-based (Windows or Linux)
    • VMware Appliance
    • Cloud
    Public-facing, no data stored
    Business logic, no data stored
    Data layer
  • Outlook Add-in
    BDS Options
    Email body sent as secure message
    Optional personalized notification message
  • Recipients receive an email notification containing an embedded link
    Optional Personal message
    Automatic embedded link
  • View the secure message and download files
    Delivery meta-data
    Secure & Notification messages
    Files to download
  • Reply securely from within delivery
  • Biscom maintains reply threads in delivery view
    Secure reply thread
  • Stub Added to Sent Folder to Record Biscom Delivery
    Optional attachment of files
    records secure & notification messages
    Lists files included in delivery
  • Biscom’s Web Interface
    Upload files
    Select from global address book
    Enter delivery options
    Enter secure and notification messages
  • Return on Investment
    Reduce IT administration
    Reduce media delivery costs
    Email storage savings
    Improve attorney/staff productivity
    Establish competitive advantage
    Improve firm image
  • Why Biscom
    Thought leaders in legal secure file transfer
    Robust security & technology
    Simplest to use for attorneys and staff
    Recognized for best secure collaboration
    One time cost – no software annuity
  • “We have replaced FTP with Biscom for file transfer to external parties.  As a result, our legal teams can now more efficiently manage large file transfers with minimal IT support, while having the confidence that their files are being transferred with more control and security.   We have experienced a 50% reduction in IT time spent supporting large file transfer and improved attorney productivity” 
    - CIO, McKenna, Long & Aldridge
    “We used to burn multi GB deposition videos to DVD and send via overnight delivery.  With Biscom, these large files are now securely transferred quickly and we receive immediate verification of receipt. As a result we have achieved considerable  savings in time, eliminated potential  data breaches and significantly reduced delivery costs” 
    - CIO, Womble Carlyle Sandridge & Rice