ilta product briefing: how are your users sharing confidential information?

38
How are Your Users Sharing Confidential Information? Victor Abou-Assaleh, Director of Business Development [email protected]

Upload: titanfile

Post on 22-Jan-2018

135 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: ILTA Product Briefing: How are your users sharing confidential information?

How are Your Users Sharing Confidential Information?

Victor Abou-Assaleh, Director of Business Development

[email protected]

Page 2: ILTA Product Briefing: How are your users sharing confidential information?

Meet Victor

• Speak at events and conferences

• Helped 100s of clients

• Engineering background

• Product expert

• Sushi enthusiast

Page 3: ILTA Product Briefing: How are your users sharing confidential information?

Format

• Trend – 15 minutes

• Live Use Cases – 10 minutes

• Solution Overview – 15 minutes

• Q&A – 20 minutes

• Attendees will be muted

• Ask questions via chat function

• All questions will be answered in Q&A portion

Page 4: ILTA Product Briefing: How are your users sharing confidential information?
Page 5: ILTA Product Briefing: How are your users sharing confidential information?

Yahoo!

• User names, email addresses, telephone numbers, dates of birth, hashed passwords

• Encrypted and unencrypted security questions and answers

Page 6: ILTA Product Briefing: How are your users sharing confidential information?

Poll #1

• Does anyone in your organization use their personal Dropbox account at work?

Page 7: ILTA Product Briefing: How are your users sharing confidential information?
Page 8: ILTA Product Briefing: How are your users sharing confidential information?

Mossack Fonseca

Page 9: ILTA Product Briefing: How are your users sharing confidential information?

2.6 TB of Data!!!

Page 10: ILTA Product Briefing: How are your users sharing confidential information?
Page 11: ILTA Product Briefing: How are your users sharing confidential information?
Page 12: ILTA Product Briefing: How are your users sharing confidential information?

Poll #2

Your employees exchange confidential documents and messages outside the organization everyday.

When a file is too large or too confidential to go through email, what do they do?

Page 13: ILTA Product Briefing: How are your users sharing confidential information?

Cost of Data Breach

Average Cost

Data Breach: $3.8 million

Cost per Record: $154

Page 14: ILTA Product Briefing: How are your users sharing confidential information?

2016 ILTA Tech Survey

• Firms’ top IT challenges include:

– Security management (67%)

– User adoption/lack of training (42%)

– Risk management/compliance (40%)

– Email management (39%).

Page 15: ILTA Product Briefing: How are your users sharing confidential information?

LegalTech 2016 Toronto

• Best Practices: Security Reboot – Proactive Strategies to Strengthen Governance and Security Oversight

• Richard McConnell – Director of IT, GowlingWLG LLP

• Tony Abou-Assaleh – President and Founder, TitanFile

Page 16: ILTA Product Briefing: How are your users sharing confidential information?

Security Panel Take-aways

• Security awareness training

• Network monitoring

• Cloud-based systems

• Useable security

Page 17: ILTA Product Briefing: How are your users sharing confidential information?

Time, Paper, Ink, Trees!

Page 18: ILTA Product Briefing: How are your users sharing confidential information?

Email

• 205 Billion email sent/received per day

• 112 Billion business email sent/received per day

• 122 emails sent/received per day per average office worker

Page 19: ILTA Product Briefing: How are your users sharing confidential information?

How Do Attorneys Use Email?

• Use email to collaborate with clients

89%

• Use unencrypted email66%

• Rely on confidentiality disclaimer

77%

Page 20: ILTA Product Briefing: How are your users sharing confidential information?

IT Director’s Solution Wish List

• Security– Encryption, audit reports, data retention policy,

enterprise integration, flexibility

• User adoption– Fewer calls to Help Desk

– Empower user

– No circumvention

• Address many uses cases– More than just sending a large file out

Page 21: ILTA Product Briefing: How are your users sharing confidential information?

Old World

Cumbersome, Dispersed, Slow, Insecure

Page 22: ILTA Product Briefing: How are your users sharing confidential information?

New World

Easy, Fast, Secure, Compliant

Page 23: ILTA Product Briefing: How are your users sharing confidential information?

Common Use Cases

• Litigation Support

• Corporate/Commercial

• Intellectual Property (IP)

• Insurance & Employment

• Personal Injury

• General Counsel

Page 24: ILTA Product Briefing: How are your users sharing confidential information?

Secure Send from Outlook

Page 25: ILTA Product Briefing: How are your users sharing confidential information?

Live Use Cases

Page 26: ILTA Product Briefing: How are your users sharing confidential information?

Solution Overview

Robust Security

Large file transfer

Enterprise integration

Audit trails

Data residency & retention policy

Page 27: ILTA Product Briefing: How are your users sharing confidential information?

Is TLS Encryption Enough?

Page 28: ILTA Product Briefing: How are your users sharing confidential information?

Security

End-to-end encryption

• Encryption in transit

• Encryption at rest

• Client Side Encryption (CSE)

• IP Fencing

• 2-Factor Authentication

• SSAE 16 II certified data centers

Page 29: ILTA Product Briefing: How are your users sharing confidential information?

Large File Transfer

• Unlimited file size

• Unlimited storage

• Any file type• Video

• Audio

• Images

• MS Office

• Etc…

Page 30: ILTA Product Briefing: How are your users sharing confidential information?

Enterprise Integration

• Full API available

• Active Directory

• Single Sign On

• Outlook add-in

• Document Management Integration

Page 31: ILTA Product Briefing: How are your users sharing confidential information?

Confirmation Emails

Page 32: ILTA Product Briefing: How are your users sharing confidential information?

Audit Trails

Page 33: ILTA Product Briefing: How are your users sharing confidential information?

Email Notifications

Page 34: ILTA Product Briefing: How are your users sharing confidential information?

Data Residency and Retention

• Secure Cloud or On-Premise

• Canada, USA, Europe, Asia

• Data center redundancy

• Custom data retention policies

Page 35: ILTA Product Briefing: How are your users sharing confidential information?

Why Law Firms Choose TitanFile

A secure solution: as easy as email

Protect confidential communication

Save employee time

Increase client satisfaction

Page 36: ILTA Product Briefing: How are your users sharing confidential information?
Page 37: ILTA Product Briefing: How are your users sharing confidential information?

“Client confidentiality is so important to us. TitanFile gives a peace of mind, control and security.”

Page 38: ILTA Product Briefing: How are your users sharing confidential information?

Why Law Firms Choose TitanFile

A secure solution: as easy as email

Protect confidential communication

Save employee time

Increase client satisfaction

Victor Abou-Assaleh

[email protected]

1-855-315-6012 x702

www.titanfile.com