Peer to Peer Magazine

Summer 2014

The quarterly publication of the International Legal Technology Association

Issue link: https://epubs.iltanet.org/i/354776

Contents of this Issue

Navigation

Page 87 of 87

WWW.ILTANET.ORG 89 AccessData . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Aderant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 BEC Legal Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 DocAuto. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 DocsCorp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 HighQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Intelliteach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 IPRO Tech, Inc. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17, 57 Keno Kozie . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Legal Anywhere . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13 Mobile Helix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 NetDocuments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Phoenix Business Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Prosperoware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36, 37 The George Washington University . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Thomson Reuters Elite. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Tikit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Traveling Coaches. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Venyu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Worldox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Younts Consulting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Ad Index DISCLAIMER This report is designed for use as a general guide and is not intended to serve as a recommendation or to replace the advice of experienced professionals. If expert assistance is desired, the services of a competent professional should be sought. Neither ILTA nor any author or contributor shall have liability for any person's reliance on the content of or any errors or omissions in this publication. COPYRIGHT © ILTA 2014 All rights reserved. Printed in the United States of America. No part of this report may be reproduced in any manner or medium whatsoever without the prior written permission of ILTA. Published by ILTA. c/o Editor, 9701 Brodie Lane, Suite 200, Austin, Texas 78748 This publication is printed on 65# Utopia II Matte CV and 60# Flo Matte BK that is FSC ® certified and is 10 percent postconsumer content. The inks are walnut oil-based and completely recyclable: Think Green — pass this issue to a colleague The Future of Security by Bill Caraher of von Briesen & Roper, s.c. As more firms become aware and focused on security, LegalSEC would like to share some thoughts on the future of security and what that might look like by the year 2020. • Alpha-numeric and two-factor passwords are completely phased out in favor of puzzles and other multidimensional, nonlinear methods of authentication. • A security information and event management (SIEM) system is established in firms for centralized reports, alerts and response. • Firms embrace the ISO standards for security controls and certifications. As a result, CIOs and IT directors will spend less time with security audits and client security inquires. • Cloud-based services are enhanced with additional security layers on shared hardware that logically prevent any cross- sharing of data. This results in greater adoption of cloud- based storage and services. • Email as a technology is disrupted and rebooted as a real- time information stream based on pre-authorized contacts with identity validation and encrypted communication channels. • All files saved in document management systems, flat-file storage systems, SharePoint and other repositories are encrypted. • Thumbdrives and all portable media use the latest encryption, management and remote-kill standards that virtually eliminate any concern for data loss. • Advanced biometric security is installed in law firms to prevent physical and digital access. • Data leakage prevention and "break the glass" are enhanced features on the DMS and file systems that track and report on unusual patterns of activity to the SIEM. • Firewalls will be placed inside the firm's Local Area Network to report and block any unusual activity. • The role of chief information security officer (CISO) is adopted by all medium and large law firms. CISO-for-hire contractors help small and solo practices shore up their security. • Multitier, multivendor solutions are implemented for endpoint security, spam, antivirus and other encryption methods. • Mobile devices and platforms are encrypted end-to-end, including all data transmitted and stored remotely. follow LegalSEC updates on Twitter @ILTALegalSEC

Articles in this issue

Links on this page

Archives of this issue

view archives of Peer to Peer Magazine - Summer 2014