SlideShare a Scribd company logo
IT vs. USERS?
How Law Firms Can Maximize Security
While Granting Access to the Web
Firms that establish a secure browsing
environment without compromising data
security or work culture gain a
competitive advantage.
2
There is a battle brewing in law firms, pitting IT security needs against the needs of the users. The pressure
on firms to protect their data is mounting. At the same time, the always-on work culture blurs the lines
between work and personal life.
This dynamic poses a particular challenge for law firm CISOs. They are expected to balance the demands
of different stakeholders. But in information security, striking a balance means dangerous trade-offs.
Compromises like shutting off personal web access to protect the firm against data theft don’t work. They
can actually add new risks. This paper shows how successful firms are optimizing on both axes: data
security and user satisfaction.
Law Firms are the stewards of their client’s most sensitive data.
They handle proprietary information that can be of immense
value to outsiders: internal merger and acquisition documents,
litigation files, intellectual property (IP) records, financial
reports, contracts, employment agreements and more.
Intruders are known to attack the weakest link in the security
chain. The defenses at a top-tier bank are a tough nut to crack,
but in comparison, a bank’s law firm may be a much softer
target.
Attackers exploit security holes in Internet browsers that
lawyers and legal staff use. Every time a page is viewed, the
browser fetches active code and runs it on the local computer.
Because the web page content can include malicious code,
the browser is an open door for attackers to infiltrate the user’s
device, and jump to other resources on the network.
Attacks against law firms are not an abstract threat.
48 of the nation’s most prestigious firms have experienced
large-scale attacks by computer criminals in the first quarter
of 2016 alone.
As news reports following such incidents suggest, the fallout
from law firm data breaches can be catastrophic.
Nationwide, law firms were targeted with
“ransomware”, malicious software that encrypted
their data and demanded a ransom for them to
regain access.
The FBI warns that firms with IP practice groups
are increasingly targeted by attackers who are
after patent and trade secrets.
Sensitive merger and acquisition data was
obtained in a widely publicized security breach at
15 leading firms. Manipulation of financial markets
is the presumed motive behind the network
intrusions.
LAW FIRMS UNDER ATTACK LIKE NEVER BEFORE
SECURITY VS. CULTURE BECOMES IT VS. USERS
CLIENTS HOLD FIRMS ACCOUNTABLE
This trend puts law firms under pressure. Clients are
mandating better IT security controls for their law partners, a
major aspect of which is a secure browsing environment.
We’ve learned of firms that were given an ultimatum from
long-standing clients: “Align your security practices with our
requirements, or we’ll have to part ways.”
Yet law firms don’t have the budgets or IT infrastructure
that their highly regulated clients can command. Wall Street’s
investments in cybersecurity are measured in billions. In
comparison, the average law firm has been spending less than
0.5 percent of its annual revenue on computer security.
As a result, law firms find themselves in a difficult position. IT
leaders are forced to take drastic steps to secure their
environment. This can put them on a collision course with their
firm’s culture.
Lawyers are “always on”, always working. Employees at law
firms expect to be able to access personal web resources like
email or online banking sites while working long hours. Mixing
personal use with business activities is key to the work-life
balance.
Historically, internal policies have allowed partners and staff to
access these personal web resources with minimal controls.
Changes to these policies are guaranteed to cause turmoil in
the organization. We have seen firms try to shut off access to
non-work related websites, only to experience open revolt by
their employees.
In instances where IT suggested that lawyers access personal
websites from their phones or tablets, users protested. Having
to context switch between multiple devices was disruptive to
their job-related workflow.
23 percent of law firms with more than
100 attorneys experienced a security
breach in 2015.
Source: American Bar Association
IT VS. USERS? Maximize Security While Granting Access to the Web
A more important lesson was that users would find ways to work around restrictive policies. Firms who have tried to remove access
reported how their lawyers simply “relocated” to neighborhood coffee shops to access the web - via free, unsecured WiFi networks.
Some firms have turned to existing technologies to secure web access. Many have used Citrix® or other virtualization software as a way
to give employees access to their personal web sites without exposing the firm’s resources.
The rationale is logical. Executing the browser on a remote server prevents web code from reaching the local computer. But virtualizing
the entire desktop environment or publishing apps through a virtualization layer can be confusing to users and complicated to administer.
Another major issue virtualization is that it is not inherently secure. The browser in the virtual infrastructure is as susceptible to web
exploits as the browser on the user’s desktop. And the virtual systems integration points with firm resources, like file repositories or
collaboration apps, open other network resources to exploits.
Virtualization requires additional
investment to deploy and manage
Virtualization can improve insulation
from web-borne threats, but …
can still put the firm at risk, due to lack of inherent
VDI security and connections to all virtual system
resources,
report a poor web experience, including significant
video lag,
expose the firm’s identity when the VDI runs on
premise.
can’t lock down the virtualized environment completely
due to the lack of integrated web policy controls,
struggles to secure the increased attack surface area
across significantly more endpoints
faces additional workload due to complex configuration
and patching requirements,
needs to budget for higher hard and soft costs.
SILO SOLVES THE WEB DILEMMA FOR LAW FIRMS
VIRTUALIZATION IS A POOR MIDDLE GROUND
Web pages are rendered in the
cloud and transmitted back
solely as visual information -
pixels - through an encrypted
point-to-point connection.
No web code ever touches the
device endpoint.
Virtualization is a good start - as described, it provides an insulating layer between the device and all web code. But virtualization alone is
not sufficient. Silo is a secure, cloud based virtual browser designed for maximum security and IT control.
With Silo, the browser is built fresh at session start and destroyed at session end. All web pages are rendered in the cloud with page
content being delivered over an encrypted connection as display information back to the user. No web code ever touches the endpoint,
cookies, trackers and other web residue don’t persist.
Silo’s patented technology enables full configuration of browser functionality based on user needs and IT policies. Silo can be accessed
from firm-only devices, or personal devices as well. Silo can store users bookmarks, login credentials and other personal data, or it can
be a simple, standard browser instance. IT can enable or restrict things like URLs, copy/paste, upload/download, and print, to ensure
data policies remain intact. All configuration controls are at IT’s fingertips.
Silo shifts the attack surface for web exploits from the local IT environment to Authentic8’s
secure cloud environment. And it is as simple to use as any other browser.
Silo shifts the attack surface for web
exploits from the local IT environment to
Authentic8’s secure cloud environment.
Users familiar with any other web browser
will be able to use Silo. It provides the
same web experience they are used to.
Users IT
3IT VS. USERS? Maximize Security While Granting Access to the Web
IT AND USERS RECONCILED: WIN-WIN WITH SILO
IT prefers Silo because it delivers better security. No web code
reaches the network, and no data can pass between firm
repositories and the web.
They can configure Silo with a variety of access and use
policies. Silo is cost-effective and simple to deploy. It integrates
with current IT infrastructure, doesn’t disrupt the user’s
workflow, and it eliminates the web exploit surface area.
Silo runs off-network. Nothing about the firm’s users, network
or identity is exposed on the web.
USERS prefer Silo because it provides web access at the
same or better quality and speed that they’re accustomed to,
even for video content.
They get access to personal sites without disrupting their
workflow. Email, social sites, whatever web content their use
policies allow.
Users can personalize Silo to help them manage credentials to
websites, access from alternate devices, and use any network,
any time without jeopardizing themselves or their data.
This helps law firms to manage a frictionless onboarding process for anyone who accesses the web - partners, associates, employees,
temps, interns and external contractors.
Tools that fail to support the firm’s cultural requirements or conflict with work-life balance needs can negatively impact productivity and
office morale.
With Silo, IT gets definitive control over web use and devices, as well as perfect insulation for the firm’s data. Users get a responsive
personalized browser that they can use without disruptions to their workflow, and without jeopardizing their firm.
Instead of ending up with a weak compromise, both parties win. Silo provides perfect insulation between the firm, their users, data and
the web. Users get a responsive personalized browser without disruption to their workflow.
Silo represents a new approach to solving the
problem. It is an innovative product that addresses
the needs of both groups.
Leading law firms have chosen Silo because it
allows them to achieve maximum protection against
web-borne threats while maximizing user
satisfaction.
Silo’s patented technology combines a rich, fast
web experience with perfect insulation from ALL
web borne threats. IT can provision Silo to users on
demand without additional hardware, software or
ongoing maintenance.
THE SECURE BROWSER THAT MAKES USERS AND IT CLICK
Firms can’t shut off web access, and they can’t continue allowing unfettered access to the web. When evaluating current products to
solve the problem, each represents a tradeoff between IT requirements and user needs.
Security
Guest wifi and
personal devices
Restrict personal
access from work
devices
User Satisfaction
Employee web
use policy
Business as usual
Contact Authentic8
info@authentic8.com
877.659.6535
Firms that establish a secure browsing environment without compromising data security or cultural
needs gain a competitive advantage. See the role Silo can play.
Try Silo for free at WWW.GETSILO.COM/LEGAL
© 2016. AUTHENTIC8, INC.
4IT VS. USERS? Maximize Security While Granting Access to the Web
VDI for browser
isolation
URL filtering
SILO
Maximum security
and user satisfaction

More Related Content

What's hot

Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Louise Spiteri
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
CSCJournals
 
Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & EdiscoveryLouise Spiteri
 
Security and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowSecurity and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to Know
TechSoup
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaks
SocialKwan
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
HB Litigation Conferences
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Karim Vaes
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Trust in the mobile internet of things
Trust in the mobile internet of thingsTrust in the mobile internet of things
Trust in the mobile internet of things
Antonio Gonzalo
 
Keep Student information protected while improving services
Keep Student information protected while improving servicesKeep Student information protected while improving services
Keep Student information protected while improving services
CloudMask inc.
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
Jon Gatrell
 
Visitor management system
Visitor management systemVisitor management system
Visitor management system
mikeecholscyber
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trust
lmgangi
 
20110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.020110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.0
Jesse Wilkins
 
Multi Factor Authentication
Multi Factor AuthenticationMulti Factor Authentication
Multi Factor Authentication
Ping Identity
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And ComplianceOracle
 
Ijnsa050215
Ijnsa050215Ijnsa050215
Ijnsa050215
IJNSA Journal
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
EMC
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's GuideReece Gaumont
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud Data
EMC
 

What's hot (20)

Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
 
Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & Ediscovery
 
Security and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowSecurity and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to Know
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaks
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Trust in the mobile internet of things
Trust in the mobile internet of thingsTrust in the mobile internet of things
Trust in the mobile internet of things
 
Keep Student information protected while improving services
Keep Student information protected while improving servicesKeep Student information protected while improving services
Keep Student information protected while improving services
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
Visitor management system
Visitor management systemVisitor management system
Visitor management system
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trust
 
20110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.020110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.0
 
Multi Factor Authentication
Multi Factor AuthenticationMulti Factor Authentication
Multi Factor Authentication
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And Compliance
 
Ijnsa050215
Ijnsa050215Ijnsa050215
Ijnsa050215
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's Guide
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud Data
 

Similar to IT vs. Users? How Law Firms Can Maximize Security While Granting Access to the Web

10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
IT-Toolkits.org
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
IT-Toolkits.org
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
Citrix
 
Protecting Essential Information
Protecting Essential InformationProtecting Essential Information
Protecting Essential Information
Kim Jensen
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
arms8586
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoTnsangary
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
DMI
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
AnastaciaShadelb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
ChantellPantoja184
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
ijccsa
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
ijccsa
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Clearswift f5 integration
Clearswift f5 integrationClearswift f5 integration
Clearswift f5 integration
Marco Essomba
 
Proxy
ProxyProxy
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
Cigniti Technologies Ltd
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Joseph White MPA CPM
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliance
Peter Goldbrunner
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for Governments
CloudMask inc.
 
Peoplesoft Best Practices for Maintaining Security
Peoplesoft Best Practices for Maintaining SecurityPeoplesoft Best Practices for Maintaining Security
Peoplesoft Best Practices for Maintaining Security
Appsian
 

Similar to IT vs. Users? How Law Firms Can Maximize Security While Granting Access to the Web (20)

10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Protecting Essential Information
Protecting Essential InformationProtecting Essential Information
Protecting Essential Information
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoT
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Clearswift f5 integration
Clearswift f5 integrationClearswift f5 integration
Clearswift f5 integration
 
Proxy
ProxyProxy
Proxy
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliance
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for Governments
 
Peoplesoft Best Practices for Maintaining Security
Peoplesoft Best Practices for Maintaining SecurityPeoplesoft Best Practices for Maintaining Security
Peoplesoft Best Practices for Maintaining Security
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 

IT vs. Users? How Law Firms Can Maximize Security While Granting Access to the Web

  • 1. IT vs. USERS? How Law Firms Can Maximize Security While Granting Access to the Web Firms that establish a secure browsing environment without compromising data security or work culture gain a competitive advantage.
  • 2. 2 There is a battle brewing in law firms, pitting IT security needs against the needs of the users. The pressure on firms to protect their data is mounting. At the same time, the always-on work culture blurs the lines between work and personal life. This dynamic poses a particular challenge for law firm CISOs. They are expected to balance the demands of different stakeholders. But in information security, striking a balance means dangerous trade-offs. Compromises like shutting off personal web access to protect the firm against data theft don’t work. They can actually add new risks. This paper shows how successful firms are optimizing on both axes: data security and user satisfaction. Law Firms are the stewards of their client’s most sensitive data. They handle proprietary information that can be of immense value to outsiders: internal merger and acquisition documents, litigation files, intellectual property (IP) records, financial reports, contracts, employment agreements and more. Intruders are known to attack the weakest link in the security chain. The defenses at a top-tier bank are a tough nut to crack, but in comparison, a bank’s law firm may be a much softer target. Attackers exploit security holes in Internet browsers that lawyers and legal staff use. Every time a page is viewed, the browser fetches active code and runs it on the local computer. Because the web page content can include malicious code, the browser is an open door for attackers to infiltrate the user’s device, and jump to other resources on the network. Attacks against law firms are not an abstract threat. 48 of the nation’s most prestigious firms have experienced large-scale attacks by computer criminals in the first quarter of 2016 alone. As news reports following such incidents suggest, the fallout from law firm data breaches can be catastrophic. Nationwide, law firms were targeted with “ransomware”, malicious software that encrypted their data and demanded a ransom for them to regain access. The FBI warns that firms with IP practice groups are increasingly targeted by attackers who are after patent and trade secrets. Sensitive merger and acquisition data was obtained in a widely publicized security breach at 15 leading firms. Manipulation of financial markets is the presumed motive behind the network intrusions. LAW FIRMS UNDER ATTACK LIKE NEVER BEFORE SECURITY VS. CULTURE BECOMES IT VS. USERS CLIENTS HOLD FIRMS ACCOUNTABLE This trend puts law firms under pressure. Clients are mandating better IT security controls for their law partners, a major aspect of which is a secure browsing environment. We’ve learned of firms that were given an ultimatum from long-standing clients: “Align your security practices with our requirements, or we’ll have to part ways.” Yet law firms don’t have the budgets or IT infrastructure that their highly regulated clients can command. Wall Street’s investments in cybersecurity are measured in billions. In comparison, the average law firm has been spending less than 0.5 percent of its annual revenue on computer security. As a result, law firms find themselves in a difficult position. IT leaders are forced to take drastic steps to secure their environment. This can put them on a collision course with their firm’s culture. Lawyers are “always on”, always working. Employees at law firms expect to be able to access personal web resources like email or online banking sites while working long hours. Mixing personal use with business activities is key to the work-life balance. Historically, internal policies have allowed partners and staff to access these personal web resources with minimal controls. Changes to these policies are guaranteed to cause turmoil in the organization. We have seen firms try to shut off access to non-work related websites, only to experience open revolt by their employees. In instances where IT suggested that lawyers access personal websites from their phones or tablets, users protested. Having to context switch between multiple devices was disruptive to their job-related workflow. 23 percent of law firms with more than 100 attorneys experienced a security breach in 2015. Source: American Bar Association IT VS. USERS? Maximize Security While Granting Access to the Web
  • 3. A more important lesson was that users would find ways to work around restrictive policies. Firms who have tried to remove access reported how their lawyers simply “relocated” to neighborhood coffee shops to access the web - via free, unsecured WiFi networks. Some firms have turned to existing technologies to secure web access. Many have used Citrix® or other virtualization software as a way to give employees access to their personal web sites without exposing the firm’s resources. The rationale is logical. Executing the browser on a remote server prevents web code from reaching the local computer. But virtualizing the entire desktop environment or publishing apps through a virtualization layer can be confusing to users and complicated to administer. Another major issue virtualization is that it is not inherently secure. The browser in the virtual infrastructure is as susceptible to web exploits as the browser on the user’s desktop. And the virtual systems integration points with firm resources, like file repositories or collaboration apps, open other network resources to exploits. Virtualization requires additional investment to deploy and manage Virtualization can improve insulation from web-borne threats, but … can still put the firm at risk, due to lack of inherent VDI security and connections to all virtual system resources, report a poor web experience, including significant video lag, expose the firm’s identity when the VDI runs on premise. can’t lock down the virtualized environment completely due to the lack of integrated web policy controls, struggles to secure the increased attack surface area across significantly more endpoints faces additional workload due to complex configuration and patching requirements, needs to budget for higher hard and soft costs. SILO SOLVES THE WEB DILEMMA FOR LAW FIRMS VIRTUALIZATION IS A POOR MIDDLE GROUND Web pages are rendered in the cloud and transmitted back solely as visual information - pixels - through an encrypted point-to-point connection. No web code ever touches the device endpoint. Virtualization is a good start - as described, it provides an insulating layer between the device and all web code. But virtualization alone is not sufficient. Silo is a secure, cloud based virtual browser designed for maximum security and IT control. With Silo, the browser is built fresh at session start and destroyed at session end. All web pages are rendered in the cloud with page content being delivered over an encrypted connection as display information back to the user. No web code ever touches the endpoint, cookies, trackers and other web residue don’t persist. Silo’s patented technology enables full configuration of browser functionality based on user needs and IT policies. Silo can be accessed from firm-only devices, or personal devices as well. Silo can store users bookmarks, login credentials and other personal data, or it can be a simple, standard browser instance. IT can enable or restrict things like URLs, copy/paste, upload/download, and print, to ensure data policies remain intact. All configuration controls are at IT’s fingertips. Silo shifts the attack surface for web exploits from the local IT environment to Authentic8’s secure cloud environment. And it is as simple to use as any other browser. Silo shifts the attack surface for web exploits from the local IT environment to Authentic8’s secure cloud environment. Users familiar with any other web browser will be able to use Silo. It provides the same web experience they are used to. Users IT 3IT VS. USERS? Maximize Security While Granting Access to the Web
  • 4. IT AND USERS RECONCILED: WIN-WIN WITH SILO IT prefers Silo because it delivers better security. No web code reaches the network, and no data can pass between firm repositories and the web. They can configure Silo with a variety of access and use policies. Silo is cost-effective and simple to deploy. It integrates with current IT infrastructure, doesn’t disrupt the user’s workflow, and it eliminates the web exploit surface area. Silo runs off-network. Nothing about the firm’s users, network or identity is exposed on the web. USERS prefer Silo because it provides web access at the same or better quality and speed that they’re accustomed to, even for video content. They get access to personal sites without disrupting their workflow. Email, social sites, whatever web content their use policies allow. Users can personalize Silo to help them manage credentials to websites, access from alternate devices, and use any network, any time without jeopardizing themselves or their data. This helps law firms to manage a frictionless onboarding process for anyone who accesses the web - partners, associates, employees, temps, interns and external contractors. Tools that fail to support the firm’s cultural requirements or conflict with work-life balance needs can negatively impact productivity and office morale. With Silo, IT gets definitive control over web use and devices, as well as perfect insulation for the firm’s data. Users get a responsive personalized browser that they can use without disruptions to their workflow, and without jeopardizing their firm. Instead of ending up with a weak compromise, both parties win. Silo provides perfect insulation between the firm, their users, data and the web. Users get a responsive personalized browser without disruption to their workflow. Silo represents a new approach to solving the problem. It is an innovative product that addresses the needs of both groups. Leading law firms have chosen Silo because it allows them to achieve maximum protection against web-borne threats while maximizing user satisfaction. Silo’s patented technology combines a rich, fast web experience with perfect insulation from ALL web borne threats. IT can provision Silo to users on demand without additional hardware, software or ongoing maintenance. THE SECURE BROWSER THAT MAKES USERS AND IT CLICK Firms can’t shut off web access, and they can’t continue allowing unfettered access to the web. When evaluating current products to solve the problem, each represents a tradeoff between IT requirements and user needs. Security Guest wifi and personal devices Restrict personal access from work devices User Satisfaction Employee web use policy Business as usual Contact Authentic8 info@authentic8.com 877.659.6535 Firms that establish a secure browsing environment without compromising data security or cultural needs gain a competitive advantage. See the role Silo can play. Try Silo for free at WWW.GETSILO.COM/LEGAL © 2016. AUTHENTIC8, INC. 4IT VS. USERS? Maximize Security While Granting Access to the Web VDI for browser isolation URL filtering SILO Maximum security and user satisfaction