1. WE HAVE BUILT A FORTRESS TO
PROTECT YOUR DATA & APPS.
Here are some (but not all) of the key defenses:
Data not stored on any remote device:
applications and data only accessible when
logged in to Legal Workspace
Two data centers located near our offices in
Colorado and Texas with private, secure
connection between the two sites
Private hardware that can only be accessed by
our specially trained personnel—no third party
has access to your data
Physical access through logged multi-factor
identification; video recording of the equipment
housing your data and applications
Encryption of data both in transit and at rest
Two-factor authentication for clients to access
their environments
Monitored Intrusion Detection and Prevention
Systems (IDPS)
Logged access to all files, folders and resources
in the data center
Aggressive updates of all firmware and software
reported
downtime or
loss of billable hours
of the biggest 100
law firms have
had some sort of breach
someone loses a
laptop in the US
report using
encryption
on smartphones
reported
infections with
viruses/spyware/malware
reported using
encryption for
privileged e-mails
sent to clients
report the
use of full
disk encryption
report use
of intrusion
prevention systems
reported that
use of file
encryption is higher
than full disk
LEGAL TECHNOLOGY SURVEY STATISTICS
42%
Every minute,Every minute,
30%
30%
80%
80%
42%
42%
42%
22%
22%
35%
35%
14%
ONLY
14%
ONLY
20%
ONLY
20%
ONLY