Peer to Peer Magazine

December 2011

The quarterly publication of the International Legal Technology Association

Issue link: https://epubs.iltanet.org/i/51267

Contents of this Issue

Navigation

Page 18 of 99

"Big is the new small." David: We have to ensure that any mobile solution that we support meets stringent security requirements to prevent data leakage. Another challenge we face is in the different feature sets that are available with each model of device. And that can drive some users to want multiple devices, which can then affect cost. We have also had to agree and communicate very clearly with users what we do and do not support, so that we manage their expectations. Charlotte: Security is certainly a challenge, as is the concern of storing firm work product on any of these devices. We're implementing Good Technology to connect all iOS and Android devices firmwide, and this allows us to manage devices at an enterprise level. Another challenge is the ability of a limited technology staff to support the seemingly endless number of mobile devices available to our attorneys. In addition, the inability to connect to these devices remotely, especially Apple devices, hampers our ability to support users who may be experiencing difficulty. 20 www.iltanet.org Peer to Peer Justin: We find ourselves challenged with making our users understand that not all mobile devices and applications are as easy and seamless to connect as Apple's products and the App Store. Another challenge is finding that balance between personal and professional use. iPhones, particularly, are the best personal devices you can get but aren't necessarily the best professional devices. Finding that middle ground between a device that users love and one that delivers their work applications smoothly and securely can be a bit daunting. Steven: Security and connectivity are our biggest challenges. We use a device for our wireless access that acts like a firewall between our wireless infrastructure and our internal production network. We jump through quite a few hoops so the user doesn't have to authenticate each time they use the device, so we do a lot of MAC address tracking for each device. That puts a bit of a load on administration. And, of course, security is always a big challenge with these devices: instigating policy, trying to be sure people are keeping devices locked down, etc. Users are carrying around firm intellectual property with documents and email messages, so of course we want to protect against loss. Security for handheld and portable devices is an area that's very young, so we're currently relying on the What challenges do you face in supporting users who utilize mobile devices to perfor m legal work?

Articles in this issue

Links on this page

Archives of this issue

view archives of Peer to Peer Magazine - December 2011