SlideShare a Scribd company logo
1 of 1
Download to read offline
WE HAVE BUILT A FORTRESS TO
PROTECT YOUR DATA & APPS.
Here are some (but not all) of the key defenses:
Data not stored on any remote device:
applications and data only accessible when
logged in to Legal Workspace
Two data centers located near our offices in
Colorado and Texas with private, secure
connection between the two sites
Private hardware that can only be accessed by
our specially trained personnel—no third party
has access to your data
Physical access through logged multi-factor
identification; video recording of the equipment
housing your data and applications
Encryption of data both in transit and at rest
Two-factor authentication for clients to access
their environments
Monitored Intrusion Detection and Prevention
Systems (IDPS)
Logged access to all files, folders and resources
in the data center
Aggressive updates of all firmware and software
reported
downtime or
loss of billable hours
of the biggest 100
law firms have
had some sort of breach
someone loses a
laptop in the US
report using
encryption
on smartphones
reported
infections with
viruses/spyware/malware
reported using
encryption for
privileged e-mails
sent to clients
report the
use of full
disk encryption
report use
of intrusion
prevention systems
reported that
use of file
encryption is higher
than full disk
LEGAL TECHNOLOGY SURVEY STATISTICS
42%
Every minute,Every minute,
30%
30%
80%
80%
42%
42%
42%
22%
22%
35%
35%
14%
ONLY
14%
ONLY
20%
ONLY
20%
ONLY

More Related Content

What's hot

RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIADheeraj Kataria
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And PrivacyMISY
 
Vulnerabilities In Industrial Control System
Vulnerabilities In Industrial Control SystemVulnerabilities In Industrial Control System
Vulnerabilities In Industrial Control SystemCentextech
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 
Document Security
Document SecurityDocument Security
Document SecurityTim O'Leary
 
FOUR BEST PRACTICES TO IMPROVE DOC SECURITY
FOUR BEST PRACTICES TO IMPROVE DOC SECURITYFOUR BEST PRACTICES TO IMPROVE DOC SECURITY
FOUR BEST PRACTICES TO IMPROVE DOC SECURITYTim O'Leary
 
Types Of Computer Security Attacks
Types Of Computer Security AttacksTypes Of Computer Security Attacks
Types Of Computer Security AttacksCentextech
 
Pertemuan 14 keamanan sistem operasi
Pertemuan 14 keamanan sistem operasiPertemuan 14 keamanan sistem operasi
Pertemuan 14 keamanan sistem operasinewbie2019
 
Security communication
Security communicationSecurity communication
Security communicationSay Shyong
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
Security Architecture
Security ArchitectureSecurity Architecture
Security ArchitectureJoben Domingo
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Security Measure
Security MeasureSecurity Measure
Security Measuresyafiqa
 

What's hot (20)

9 - Security
9 - Security9 - Security
9 - Security
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
 
Vulnerabilities In Industrial Control System
Vulnerabilities In Industrial Control SystemVulnerabilities In Industrial Control System
Vulnerabilities In Industrial Control System
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Document Security
Document SecurityDocument Security
Document Security
 
FOUR BEST PRACTICES TO IMPROVE DOC SECURITY
FOUR BEST PRACTICES TO IMPROVE DOC SECURITYFOUR BEST PRACTICES TO IMPROVE DOC SECURITY
FOUR BEST PRACTICES TO IMPROVE DOC SECURITY
 
Types Of Computer Security Attacks
Types Of Computer Security AttacksTypes Of Computer Security Attacks
Types Of Computer Security Attacks
 
System Security
System SecuritySystem Security
System Security
 
Pertemuan 14 keamanan sistem operasi
Pertemuan 14 keamanan sistem operasiPertemuan 14 keamanan sistem operasi
Pertemuan 14 keamanan sistem operasi
 
Security communication
Security communicationSecurity communication
Security communication
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
Poicy 121
Poicy 121Poicy 121
Poicy 121
 
Intruders
IntrudersIntruders
Intruders
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Security Measure
Security MeasureSecurity Measure
Security Measure
 

Viewers also liked

Viewers also liked (8)

Travelplan informa anticipate al invierno
Travelplan informa anticipate al inviernoTravelplan informa anticipate al invierno
Travelplan informa anticipate al invierno
 
Story integration of science curriculum
Story integration of science curriculumStory integration of science curriculum
Story integration of science curriculum
 
005 30 60-90, 45-45-90 day 2
005 30 60-90, 45-45-90 day 2005 30 60-90, 45-45-90 day 2
005 30 60-90, 45-45-90 day 2
 
Teaching with Technology
Teaching with TechnologyTeaching with Technology
Teaching with Technology
 
La Turchia
La TurchiaLa Turchia
La Turchia
 
8 2-3
8 2-38 2-3
8 2-3
 
Oптика
OптикаOптика
Oптика
 
England unai & daira
England unai & dairaEngland unai & daira
England unai & daira
 

Similar to legalworkspace-infographic 0116

3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer CrimeMISY
 
Securing Management Information Systems.ppt
Securing Management Information Systems.pptSecuring Management Information Systems.ppt
Securing Management Information Systems.pptRoshni814224
 
08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.ppt08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.pptRoshni814224
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1bora.gungoren
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10jpmccormack
 
Final Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docxFinal Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docxlmelaine
 
Protecting the Healthcare Database
Protecting the Healthcare DatabaseProtecting the Healthcare Database
Protecting the Healthcare DatabaseSteve Dunn
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicCitrix
 
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityManage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityCitrix
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data ProtectionCreatorsCircle
 
Typical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdfTypical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdfaptexx
 
Why Go Beyond Encryption
Why Go Beyond EncryptionWhy Go Beyond Encryption
Why Go Beyond Encryptionguest990c6c
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyJan Wong
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010Joseph Mark Heinzen
 

Similar to legalworkspace-infographic 0116 (20)

3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
DLP and MDM Datasheet
DLP and MDM DatasheetDLP and MDM Datasheet
DLP and MDM Datasheet
 
Securing Management Information Systems.ppt
Securing Management Information Systems.pptSecuring Management Information Systems.ppt
Securing Management Information Systems.ppt
 
08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.ppt08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.ppt
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Byod
ByodByod
Byod
 
Windows 10: Windows 10 de ITPros a ITPros
Windows 10: Windows 10 de ITPros a ITProsWindows 10: Windows 10 de ITPros a ITPros
Windows 10: Windows 10 de ITPros a ITPros
 
Final Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docxFinal Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docx
 
Protecting the Healthcare Database
Protecting the Healthcare DatabaseProtecting the Healthcare Database
Protecting the Healthcare Database
 
Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data Infographic
 
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityManage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
 
Typical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdfTypical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdf
 
Why Go Beyond Encryption
Why Go Beyond EncryptionWhy Go Beyond Encryption
Why Go Beyond Encryption
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 

legalworkspace-infographic 0116

  • 1. WE HAVE BUILT A FORTRESS TO PROTECT YOUR DATA & APPS. Here are some (but not all) of the key defenses: Data not stored on any remote device: applications and data only accessible when logged in to Legal Workspace Two data centers located near our offices in Colorado and Texas with private, secure connection between the two sites Private hardware that can only be accessed by our specially trained personnel—no third party has access to your data Physical access through logged multi-factor identification; video recording of the equipment housing your data and applications Encryption of data both in transit and at rest Two-factor authentication for clients to access their environments Monitored Intrusion Detection and Prevention Systems (IDPS) Logged access to all files, folders and resources in the data center Aggressive updates of all firmware and software reported downtime or loss of billable hours of the biggest 100 law firms have had some sort of breach someone loses a laptop in the US report using encryption on smartphones reported infections with viruses/spyware/malware reported using encryption for privileged e-mails sent to clients report the use of full disk encryption report use of intrusion prevention systems reported that use of file encryption is higher than full disk LEGAL TECHNOLOGY SURVEY STATISTICS 42% Every minute,Every minute, 30% 30% 80% 80% 42% 42% 42% 22% 22% 35% 35% 14% ONLY 14% ONLY 20% ONLY 20% ONLY