SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Biscom The Legal Industry’s Leading Ad-Hoc Secure File Transfer Solution
Agenda Legal Industry Trends Driving Secure File Transfer Adoption SFT Critical Success Factors  Biscom in the Secure File Transfer Market  Biscom Secure File Transfer Overview/Demonstration
Legal Market Thought Leader Active ILTA Sponsor Regular ILTA Product Briefings ILTA RoadshowProgram 2011 ILTA Conference Technology Demo Tract CIO Forum Sponsor Legal Industry Newsletter Press Coverage
2011 CIO Forum Legal Industry Growth Flat IT Headcount Under Pressure  Alternative Fee Arrangements  Firms Reducing Costs and Increasing Efficiency  Clients Demanding Increased Data Security
Protecting Confidential Client Data Reason for data leaks “How well protected do you feel your company is against each of the following types of data leaks?”
Secure File Transfer Critical Success Factors Meet Security and Compliance 100% User Adoption Reduce Cost to Administer Increase Attorney/Staff Productivity
Industry Leading Security 3 Tier Architecture Encryption Secure Reply ,[object Object]
AES256
Anti-VirusSS Secure Package Files Folders Message Authentication Compliance ,[object Object]
Activation
Second Level PW
Transaction Logging
Compliance officerIntegration ,[object Object]
DLP,[object Object]
User Adoption Intuitive for internal and external users Does not impact user behavior Interoperates with best of breed legal applications Document Management Metadata cleansing Data loss prevention
80 Attorney Washington DC Firm Issue Secure transfer of confidential employee data Solution – Biscom Rapid HR Department adoption “You can securely send whatever confidential employee data you might have – addresses, social security numbers and compensation and benefit enrollment information – by simply clicking on a button in Outlook and pressing send.”  Sharon Bovelle, Chief Human Resources Officer
Cost to Administer Eliminates FTP account set up & permissions Ends creation of physical media Reduces help desk support “Set it and Forget It”
450 Attorney Washington DC based firm Issue: Cost, complexity and security issues of FTP, email & Physical media Solution – Biscom Reduced file transfer costs Improved security and staff productivity  “Before Biscom, the litigation team needed IT support for almost every transfer. Now attorneys and administrative staff are nearly self sufficient and require very little IT support…. we’ve seen a 50% reduction in the use of overnight courier services which results in a noticeable amount of cost savings.”  Bob Lamy, CTO
Increase Attorney/Staff Productivity No more hassles with email bounce backs Real time verification of receipt Non-repudiation of receipt Bi-directional collaboration
150 Attorney Chicago based law firm Issue: Using E-mail for large file transfer Solution – Biscom Improved collaboration & firm image Non-repudiation of receipt “It’s a frustratingly annoying process where you breakup information into smaller files and resend multiple e-mails due to a failed receipt. This process not only steals away valuable billing time, it diminishes the collaborative efforts with clients and understates the law firm’s robust technical expertise.”  Joel Rothman, Partner
Biscom  - The Legal Security Software Leader Secures  Transfer of Confidential Client Data Protect Your Firm from Unintended Employee Data Breaches Meet Data Privacy Regulatory Compliance Improves Efficiency & Reduces Cost of Document Exchange Replace High Maintenance, Unsecure FTP Offload Large Email Attachments Reduce Courier/Overnight File Delivery Eliminates need to deploy extranets Facilitates collaboration with Clients and Outside Counsel Highest certification for 5 consecutive years!
What is the biggest issue or challenge facing IT overall? 69 48 47 27 26 25 17 15 1 2010 ILTA Member Technology Purchasing Survey
Biscom Secure File Transfer Key Features Biscom, Inc. document delivery since 1986 Security division launched in 2003 as “intelligent” secure file transfer solution ,[object Object]
Data secured “in transit “and “at rest”
Platform neutral – Windows, Linux, VM
Scalable “out of the box” and integrates with your SAN/NAS storage
Easy to use – no changes to user behavior
Premise and cloud based deployment
Precise auditing & transaction reportingAkin Gump  Strauss Hauer &Feld
Biscom Leadership, Awards & Recognition Legal Tech Newsletter Sean Doherty  Review Legal Technology News American Legal Technology Insider The Legal Intelligencer Peer to Peer Magazine
Three steps to deliver files securely Your senders collect documents and files, and create a package in BDS Your company – Internal Senders External Recipient
Three steps to deliver files securely Your senders collect documents and files, and create a package in BDS Your sender addresses the package and a notification email goes out to your recipients Your company – Internal Senders External Recipient
Three steps to deliver files securely Your senders collect documents and files, and create a package in BDS Your sender addresses the package and a notification email goes out to your recipients Recipients click the embedded link, authenticate, and download their files Your company – Internal Senders External Recipient
How it works Avoiding Large Email Attachments in Exchange Enterprise has established size limits and policies for email attachments Policies based on attachment size, file type, or keyword for secure send Direct Outlook integration, no Exchange connectors or gateways required Re-routing attachments is transparent/seamless to the end user
iManage Connector Streamline SFT for iManagedocuments Upload to BDS directly from WorkSiteSite Import to WorkSite from received BDS deliveries Eliminate duplication of WorkSite documents in temporary file stores

Weitere ähnliche Inhalte

Was ist angesagt?

Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb finalChristophe Monnier
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloudtcarrucan
 
Data Security Issues in Cloud Computing
Data Security Issues in Cloud ComputingData Security Issues in Cloud Computing
Data Security Issues in Cloud ComputingAsad Ali
 
Cloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTSCloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTSAnchises Moraes
 
Office 365 cloud principles
Office 365 cloud principlesOffice 365 cloud principles
Office 365 cloud principlesMotty Ben Atia
 

Was ist angesagt? (6)

Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb final
 
Moving To The Cloud
Moving To The CloudMoving To The Cloud
Moving To The Cloud
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Data Security Issues in Cloud Computing
Data Security Issues in Cloud ComputingData Security Issues in Cloud Computing
Data Security Issues in Cloud Computing
 
Cloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTSCloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTS
 
Office 365 cloud principles
Office 365 cloud principlesOffice 365 cloud principles
Office 365 cloud principles
 

Andere mochten auch

How To Brew Coffee At Home
How To Brew Coffee At HomeHow To Brew Coffee At Home
How To Brew Coffee At HomeJon Gatrell
 
2009 Secure File Transfer Research
2009 Secure File Transfer Research2009 Secure File Transfer Research
2009 Secure File Transfer ResearchJon Gatrell
 
What is your career plan as a tech marketer?
What is your career plan as a tech marketer?What is your career plan as a tech marketer?
What is your career plan as a tech marketer?Jon Gatrell
 
What is a Good Product Manager?
What is a Good Product Manager?What is a Good Product Manager?
What is a Good Product Manager?Jon Gatrell
 
Product Management Career Planning: Set Your Path
Product Management Career Planning: Set Your PathProduct Management Career Planning: Set Your Path
Product Management Career Planning: Set Your PathJon Gatrell
 
Define Your Career Roadmap
Define Your Career RoadmapDefine Your Career Roadmap
Define Your Career RoadmapJon Gatrell
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocolguest029bcd
 

Andere mochten auch (7)

How To Brew Coffee At Home
How To Brew Coffee At HomeHow To Brew Coffee At Home
How To Brew Coffee At Home
 
2009 Secure File Transfer Research
2009 Secure File Transfer Research2009 Secure File Transfer Research
2009 Secure File Transfer Research
 
What is your career plan as a tech marketer?
What is your career plan as a tech marketer?What is your career plan as a tech marketer?
What is your career plan as a tech marketer?
 
What is a Good Product Manager?
What is a Good Product Manager?What is a Good Product Manager?
What is a Good Product Manager?
 
Product Management Career Planning: Set Your Path
Product Management Career Planning: Set Your PathProduct Management Career Planning: Set Your Path
Product Management Career Planning: Set Your Path
 
Define Your Career Roadmap
Define Your Career RoadmapDefine Your Career Roadmap
Define Your Career Roadmap
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 

Ähnlich wie ILTA Conference 2011 - Biscom Secure File Transfer Technology Demonstration

Biscom Delivery Server Sales Presentation
Biscom Delivery Server Sales PresentationBiscom Delivery Server Sales Presentation
Biscom Delivery Server Sales PresentationJoseph Mark Heinzen
 
Life without FTP would be cool
Life without FTP would be coolLife without FTP would be cool
Life without FTP would be cooljgatrell
 
IBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and ExchangeIBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and ExchangeLightwell
 
Topsec technology portfolio
Topsec technology   portfolioTopsec technology   portfolio
Topsec technology portfolioniallmmackey
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5damonhough
 
Microsoft Online Services
Microsoft Online ServicesMicrosoft Online Services
Microsoft Online Servicesbeckyjacobs
 
IBM Sterling File Gateway
IBM Sterling File GatewayIBM Sterling File Gateway
IBM Sterling File GatewayLightwell
 
Zia ephesoft records management webinar
Zia   ephesoft records management webinarZia   ephesoft records management webinar
Zia ephesoft records management webinarZia Consulting
 
Insurance Vertical Presentation
Insurance Vertical PresentationInsurance Vertical Presentation
Insurance Vertical PresentationMurty NSN
 
Unknown Facts about Virtual Data Room For Secured File Sharing.pdf
Unknown Facts about Virtual Data Room For Secured File Sharing.pdfUnknown Facts about Virtual Data Room For Secured File Sharing.pdf
Unknown Facts about Virtual Data Room For Secured File Sharing.pdfHokme
 
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...Amazon Web Services
 
File Transfer of the Future
File Transfer of the FutureFile Transfer of the Future
File Transfer of the FutureLightwell
 
Advantages To Outsourcing Business Class Email
Advantages To Outsourcing Business Class EmailAdvantages To Outsourcing Business Class Email
Advantages To Outsourcing Business Class EmailRefresh Central Arkansas
 
Corporate presentation emea slideshare
Corporate presentation emea slideshareCorporate presentation emea slideshare
Corporate presentation emea slideshareLembit
 
Strategic Discovery 2011 Overview ECA
Strategic Discovery 2011 Overview ECAStrategic Discovery 2011 Overview ECA
Strategic Discovery 2011 Overview ECADavid Haines
 
ALMA LLC project 1 final
ALMA LLC project 1 finalALMA LLC project 1 final
ALMA LLC project 1 finalSheila DeLaney
 
Microsoft+securitate agora-rtm
Microsoft+securitate agora-rtmMicrosoft+securitate agora-rtm
Microsoft+securitate agora-rtmAgora Group
 
Document Mall Customer Presentation
Document Mall Customer PresentationDocument Mall Customer Presentation
Document Mall Customer Presentationkellydday
 

Ähnlich wie ILTA Conference 2011 - Biscom Secure File Transfer Technology Demonstration (20)

Biscom Delivery Server Sales Presentation
Biscom Delivery Server Sales PresentationBiscom Delivery Server Sales Presentation
Biscom Delivery Server Sales Presentation
 
Life without FTP would be cool
Life without FTP would be coolLife without FTP would be cool
Life without FTP would be cool
 
SBDS
SBDSSBDS
SBDS
 
IBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and ExchangeIBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and Exchange
 
Topsec technology portfolio
Topsec technology   portfolioTopsec technology   portfolio
Topsec technology portfolio
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5
 
Microsoft Online Services
Microsoft Online ServicesMicrosoft Online Services
Microsoft Online Services
 
IBM Sterling File Gateway
IBM Sterling File GatewayIBM Sterling File Gateway
IBM Sterling File Gateway
 
Zia ephesoft records management webinar
Zia   ephesoft records management webinarZia   ephesoft records management webinar
Zia ephesoft records management webinar
 
Insurance Vertical Presentation
Insurance Vertical PresentationInsurance Vertical Presentation
Insurance Vertical Presentation
 
Unknown Facts about Virtual Data Room For Secured File Sharing.pdf
Unknown Facts about Virtual Data Room For Secured File Sharing.pdfUnknown Facts about Virtual Data Room For Secured File Sharing.pdf
Unknown Facts about Virtual Data Room For Secured File Sharing.pdf
 
IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...
IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...
IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...
 
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
 
File Transfer of the Future
File Transfer of the FutureFile Transfer of the Future
File Transfer of the Future
 
Advantages To Outsourcing Business Class Email
Advantages To Outsourcing Business Class EmailAdvantages To Outsourcing Business Class Email
Advantages To Outsourcing Business Class Email
 
Corporate presentation emea slideshare
Corporate presentation emea slideshareCorporate presentation emea slideshare
Corporate presentation emea slideshare
 
Strategic Discovery 2011 Overview ECA
Strategic Discovery 2011 Overview ECAStrategic Discovery 2011 Overview ECA
Strategic Discovery 2011 Overview ECA
 
ALMA LLC project 1 final
ALMA LLC project 1 finalALMA LLC project 1 final
ALMA LLC project 1 final
 
Microsoft+securitate agora-rtm
Microsoft+securitate agora-rtmMicrosoft+securitate agora-rtm
Microsoft+securitate agora-rtm
 
Document Mall Customer Presentation
Document Mall Customer PresentationDocument Mall Customer Presentation
Document Mall Customer Presentation
 

Kürzlich hochgeladen

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Kürzlich hochgeladen (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

ILTA Conference 2011 - Biscom Secure File Transfer Technology Demonstration

  • 1. Biscom The Legal Industry’s Leading Ad-Hoc Secure File Transfer Solution
  • 2. Agenda Legal Industry Trends Driving Secure File Transfer Adoption SFT Critical Success Factors Biscom in the Secure File Transfer Market Biscom Secure File Transfer Overview/Demonstration
  • 3. Legal Market Thought Leader Active ILTA Sponsor Regular ILTA Product Briefings ILTA RoadshowProgram 2011 ILTA Conference Technology Demo Tract CIO Forum Sponsor Legal Industry Newsletter Press Coverage
  • 4. 2011 CIO Forum Legal Industry Growth Flat IT Headcount Under Pressure Alternative Fee Arrangements Firms Reducing Costs and Increasing Efficiency Clients Demanding Increased Data Security
  • 5. Protecting Confidential Client Data Reason for data leaks “How well protected do you feel your company is against each of the following types of data leaks?”
  • 6. Secure File Transfer Critical Success Factors Meet Security and Compliance 100% User Adoption Reduce Cost to Administer Increase Attorney/Staff Productivity
  • 7.
  • 9.
  • 13.
  • 14.
  • 15. User Adoption Intuitive for internal and external users Does not impact user behavior Interoperates with best of breed legal applications Document Management Metadata cleansing Data loss prevention
  • 16. 80 Attorney Washington DC Firm Issue Secure transfer of confidential employee data Solution – Biscom Rapid HR Department adoption “You can securely send whatever confidential employee data you might have – addresses, social security numbers and compensation and benefit enrollment information – by simply clicking on a button in Outlook and pressing send.” Sharon Bovelle, Chief Human Resources Officer
  • 17. Cost to Administer Eliminates FTP account set up & permissions Ends creation of physical media Reduces help desk support “Set it and Forget It”
  • 18. 450 Attorney Washington DC based firm Issue: Cost, complexity and security issues of FTP, email & Physical media Solution – Biscom Reduced file transfer costs Improved security and staff productivity “Before Biscom, the litigation team needed IT support for almost every transfer. Now attorneys and administrative staff are nearly self sufficient and require very little IT support…. we’ve seen a 50% reduction in the use of overnight courier services which results in a noticeable amount of cost savings.” Bob Lamy, CTO
  • 19. Increase Attorney/Staff Productivity No more hassles with email bounce backs Real time verification of receipt Non-repudiation of receipt Bi-directional collaboration
  • 20. 150 Attorney Chicago based law firm Issue: Using E-mail for large file transfer Solution – Biscom Improved collaboration & firm image Non-repudiation of receipt “It’s a frustratingly annoying process where you breakup information into smaller files and resend multiple e-mails due to a failed receipt. This process not only steals away valuable billing time, it diminishes the collaborative efforts with clients and understates the law firm’s robust technical expertise.” Joel Rothman, Partner
  • 21. Biscom - The Legal Security Software Leader Secures Transfer of Confidential Client Data Protect Your Firm from Unintended Employee Data Breaches Meet Data Privacy Regulatory Compliance Improves Efficiency & Reduces Cost of Document Exchange Replace High Maintenance, Unsecure FTP Offload Large Email Attachments Reduce Courier/Overnight File Delivery Eliminates need to deploy extranets Facilitates collaboration with Clients and Outside Counsel Highest certification for 5 consecutive years!
  • 22. What is the biggest issue or challenge facing IT overall? 69 48 47 27 26 25 17 15 1 2010 ILTA Member Technology Purchasing Survey
  • 23.
  • 24. Data secured “in transit “and “at rest”
  • 25. Platform neutral – Windows, Linux, VM
  • 26. Scalable “out of the box” and integrates with your SAN/NAS storage
  • 27. Easy to use – no changes to user behavior
  • 28. Premise and cloud based deployment
  • 29. Precise auditing & transaction reportingAkin Gump Strauss Hauer &Feld
  • 30. Biscom Leadership, Awards & Recognition Legal Tech Newsletter Sean Doherty Review Legal Technology News American Legal Technology Insider The Legal Intelligencer Peer to Peer Magazine
  • 31. Three steps to deliver files securely Your senders collect documents and files, and create a package in BDS Your company – Internal Senders External Recipient
  • 32. Three steps to deliver files securely Your senders collect documents and files, and create a package in BDS Your sender addresses the package and a notification email goes out to your recipients Your company – Internal Senders External Recipient
  • 33. Three steps to deliver files securely Your senders collect documents and files, and create a package in BDS Your sender addresses the package and a notification email goes out to your recipients Recipients click the embedded link, authenticate, and download their files Your company – Internal Senders External Recipient
  • 34. How it works Avoiding Large Email Attachments in Exchange Enterprise has established size limits and policies for email attachments Policies based on attachment size, file type, or keyword for secure send Direct Outlook integration, no Exchange connectors or gateways required Re-routing attachments is transparent/seamless to the end user
  • 35. iManage Connector Streamline SFT for iManagedocuments Upload to BDS directly from WorkSiteSite Import to WorkSite from received BDS deliveries Eliminate duplication of WorkSite documents in temporary file stores
  • 37. Biscom Advanced Security Secure Message Secure Reply AD Authentication Anti-Virus/AES256 Encryption Permanent Transaction Logging 3-tier Architecture Compliance Role DLP/Content Filtering
  • 38. Performance Upload Applet No File Size Limit Auto Restart Strong Verification of Receipt
  • 39. Outlook Integration Email Body Sent as Secure or Notification Msg. Optional Message Physical Attachments in Stub “Send Secure” Button
  • 40.
  • 42. CloudPublic-facing, no data stored Business logic, no data stored Data layer
  • 43. Users are assigned roles Senderscan create secure deliveries Recipientscan receive and reply to secure deliveries Administratorscontrol system configuration and user management Reportersview transactions and audit information
  • 44. Administrator Can Track & Audit Files Sent Compliance Officer enterprise audit and reporting
  • 46.
  • 48. CloudPublic-facing, no data stored Business logic, no data stored Data layer
  • 49. Outlook Add-in BDS Options Email body sent as secure message Optional personalized notification message
  • 50. Recipients receive an email notification containing an embedded link Optional Personal message Automatic embedded link
  • 51. View the secure message and download files Delivery meta-data Secure & Notification messages Files to download
  • 52. Reply securely from within delivery
  • 53. Biscom maintains reply threads in delivery view Secure reply thread
  • 54. Stub Added to Sent Folder to Record Biscom Delivery Optional attachment of files records secure & notification messages Lists files included in delivery
  • 55. Biscom’s Web Interface Upload files Select from global address book Enter delivery options Enter secure and notification messages
  • 56. Return on Investment Reduce IT administration Reduce media delivery costs Email storage savings Improve attorney/staff productivity Establish competitive advantage Improve firm image
  • 57. Why Biscom Thought leaders in legal secure file transfer Robust security & technology Simplest to use for attorneys and staff Recognized for best secure collaboration One time cost – no software annuity
  • 58. “We have replaced FTP with Biscom for file transfer to external parties.  As a result, our legal teams can now more efficiently manage large file transfers with minimal IT support, while having the confidence that their files are being transferred with more control and security.   We have experienced a 50% reduction in IT time spent supporting large file transfer and improved attorney productivity”  - CIO, McKenna, Long & Aldridge “We used to burn multi GB deposition videos to DVD and send via overnight delivery.  With Biscom, these large files are now securely transferred quickly and we receive immediate verification of receipt. As a result we have achieved considerable  savings in time, eliminated potential  data breaches and significantly reduced delivery costs”  - CIO, Womble Carlyle Sandridge & Rice

Hinweis der Redaktion

  1. Today law firms face multiple challenges relating to what should be a very simple process of electronic transfer of documents and files form point A to point B. However what should be a simple process has become increasingly complex as files get larger and larger and the potential for data breach is an increasing concern. During our session today we will delve into the technical and legal issues surrounding electronic document exchange with clients, business partners and outside counsel.
  2. Today law firms face multiple challenges relating to what should be a very simple process of electronic transfer of documents and files form point A to point B. However what should be a simple process has become increasingly complex as files get larger and larger and the potential for data breach is an increasing concern. During our session today we will delve into the technical and legal issues surrounding electronic document exchange with clients, business partners and outside counsel.
  3. Today law firms face multiple challenges relating to what should be a very simple process of electronic transfer of documents and files form point A to point B. However what should be a simple process has become increasingly complex as files get larger and larger and the potential for data breach is an increasing concern. During our session today we will delve into the technical and legal issues surrounding electronic document exchange with clients, business partners and outside counsel.
  4. IDG recently released a very revealing study regarding companies perceived level of protection from data leaks. IDG identified internal employee mistakes or carelessness as the number one cause by far for data leaks. Yet when IT departments of companies were surveyed they felt the least protected from unintended employee data leaks.
  5. Today law firms face multiple challenges relating to what should be a very simple process of electronic transfer of documents and files form point A to point B. However what should be a simple process has become increasingly complex as files get larger and larger and the potential for data breach is an increasing concern. During our session today we will delve into the technical and legal issues surrounding electronic document exchange with clients, business partners and outside counsel.
  6. Today law firms face multiple challenges relating to what should be a very simple process of electronic transfer of documents and files form point A to point B. However what should be a simple process has become increasingly complex as files get larger and larger and the potential for data breach is an increasing concern. During our session today we will delve into the technical and legal issues surrounding electronic document exchange with clients, business partners and outside counsel.
  7. Today law firms face multiple challenges relating to what should be a very simple process of electronic transfer of documents and files form point A to point B. However what should be a simple process has become increasingly complex as files get larger and larger and the potential for data breach is an increasing concern. During our session today we will delve into the technical and legal issues surrounding electronic document exchange with clients, business partners and outside counsel.
  8. Today law firms face multiple challenges relating to what should be a very simple process of electronic transfer of documents and files form point A to point B. However what should be a simple process has become increasingly complex as files get larger and larger and the potential for data breach is an increasing concern. During our session today we will delve into the technical and legal issues surrounding electronic document exchange with clients, business partners and outside counsel.
  9. Today law firms face multiple challenges relating to what should be a very simple process of electronic transfer of documents and files form point A to point B. However what should be a simple process has become increasingly complex as files get larger and larger and the potential for data breach is an increasing concern. During our session today we will delve into the technical and legal issues surrounding electronic document exchange with clients, business partners and outside counsel.
  10. Today law firms face multiple challenges relating to what should be a very simple process of electronic transfer of documents and files form point A to point B. However what should be a simple process has become increasingly complex as files get larger and larger and the potential for data breach is an increasing concern. During our session today we will delve into the technical and legal issues surrounding electronic document exchange with clients, business partners and outside counsel.
  11. Today law firms face multiple challenges relating to what should be a very simple process of electronic transfer of documents and files form point A to point B. However what should be a simple process has become increasingly complex as files get larger and larger and the potential for data breach is an increasing concern. During our session today we will delve into the technical and legal issues surrounding electronic document exchange with clients, business partners and outside counsel.
  12. Today law firms face multiple challenges relating to what should be a very simple process of electronic transfer of documents and files form point A to point B. However what should be a simple process has become increasingly complex as files get larger and larger and the potential for data breach is an increasing concern. During our session today we will delve into the technical and legal issues surrounding electronic document exchange with clients, business partners and outside counsel.
  13. Biscom’s Secure Document Exchange technology has been specifically designed to meet the demanding secure file transfer requirements of the legal market.
  14. Biscom is a leader in the document delivery market. A pioneer in the fax server market, its founder patented fax server technology and introduced it to the market in 1986. Today Biscom fax servers process millions of documents daily in many of this country’s largest companies. In 2003 Biscom launched the Biscom Delivery Server division with the charter to develop the next generation secure file transfer solution. Since then Biscom Delivery Server has achieved wide industry recognition and has been successfully deployed in major law firms as well as leading organizations in industries where security is a priority, including healthcare and financial services .
  15. BDS is a secure, manageable file transfer solution that is software only, and runs on pretty much any platform or environment out there. BDS is available as an on-premise or cloud deployment.To send a secure delivery, users simply sign into a Web application or for Outlook users, they compose a new message. Drag and drop the files into the delivery, enter the recipients’ email addresses, and send it off.
  16. A lightweight email notification goes out to all the recipients, with a link back into the application.
  17. Once authenticated, recipients can view the secure delivery and download their files. All of this is being tracked and senders can see exactly who’s opening and downloading their files. All the data is encrypted while stored in our server as well as during transmission. This is a policy-based application – so you can define parameters around the delivery to help with data governance, automatically route messages securely, but also prevent specific files from being sent, or block certain users or entire domains from receiving deliveries. You can even use your favorite scripting language to build automated processes into your workflows or legacy applications.
  18. Biscom Delivery Server is designed to operate seamlessly with Microsoft Exchange to allow users to continue to work in the environment that they are most familiar, with no change to user behavior. Policies managed in the BDS server will determine weather an email is sent normally through Exchange or is re-routed as a BDS delivery. These policies include email attachment size, file type or keyword in the subject line. For emails that are rerouted as a BDS delivery, BDS generates an email notification to the recipient with an embedded hyperlink that directs the recipient to the BDS server to download the attachments. Each step of the way, BDS tracks every transaction and creates a detailed audit trail. BDS also stores only one copy of a file attachment for user access or collaboration. This eliminates the issue of creating multiple copies of the same file in Exchange and can result in dramatic reduction of required Exchange storage.
  19. One of the primary use cases for Biscom Delivery Server (BDS) is replacing law firm FTP sites with advanced ad-hoc secure file transfer. Biscom, in collaboration with Adaptive Solutions,further establishes its commitment to the legal market by delivering seamless integration of its advanced secure file transfer technology with Autonomy iManage. BDS for iManage targets law firm litigation and practice groups that transfer large volumes of files from various sources, including documents stored in WorkSite directories. BDS for iManage improves the efficiency of the transfer process by eliminating the need to move WorkSite documents to a local store before uploading to a BDS delivery. In addition, documents contained in incoming BDS deliveries can be imported directly into a WorkeSite folder, inheriting matter centric metadata. BDS for iManage eliminates duplication of WorkSite files in temporary locations that otherwise would be required to support the file transfer process.
  20. Users are assigned roles based on their requirements. (click) Most users within the organization where BDS is deployed are assigned the Sender role. Senders can create secure deliveries and track the activity and status of deliveries they have sent or received. When a delivery is sent to a person outside the organization BDS automatically creates a recipient role for that person, eliminating the need for IT to get involved with administering external recipient accounts. (click) Recipients can receive and reply to secure deliveries.(click) Administrators control system configuration and user management, including sender permissions.(click) and individuals assigned the reporter role can access reports that track their individual delivery activity, including when a delivery was viewed by the recipients and when each file was downloaded.
  21. BDS maintains detailed transaction logs of delivery activity to meet regulatory compliance and audit for potential data breaches. Comprehensive reporting functions allow administrators to drill down into individual users and see everything that user is doing within the system. The transaction logs are permanently maintained by BDS even after the deliveries are deleted. As Bruce mentioned during his presentation, having this ability to track delivery activity can be instrumental in resolving disputes with adversarial parties regarding confirmation of document delivery.(click) With our most recent release we have introduced a compliance officer role which offers even more insight into user activity. Users who have the compliance role have the ability to access all packages and deliveries in the system for spot checks or audits. The compliance officer role addresses several of the new data breach regulations which require comprehensive, enterprise-wide audit of data transfer activity.
  22. BDS also offers Web interface (shown here) which is typically used by practice support staff whose job function requires frequent transfer of high volumes of large files to support litigation and e-discovery demands. The Web interface provides additional delivery options to give senders even more control over how the delivery is sent out and how the sender gets notified. Even on the web, we support dragging and dropping files, integration with the Global Address List, auto-completion of recipients, a secure message, revisions to a default delivery notification message, and checkpoint restart for very large files. The feedback we’ve received from our customers is that it’s a highly functional yet very simple user interface.In our next release scheduled for mid-2010, your will be able to upload documents directly from an Autonomy iManageFilesite directory, eliminating the extra steps of transferring a Filesite document to a local directory and then uploading to the BDS delivery.