3 Risks (and Solutions) for Document Security in 2017

Organizations have focused on securing the storage of documents, but little attention is paid to access and distribution of documents.

, Legaltech News

   | 2 Comments

Organizations have focused on securing the storage of documents, but little attention is paid to access and distribution of documents.

This premium content is reserved for Legal Technology subscribers.

Continue reading by getting started with a subscription.

Already a subscriber? Log in now

What's being said

  • Hans Downer CEO SavvyDox

    Document leaks and/or theft is a very big problem. SavvyDox, a cloud based SaaS solution helps address that concern with an intuitive and easy to use solution. The document author controls who can read the document since the reviewers cannot copy or forward the document to others outside of the author’s distribution list. ECM’s are great for document retention, but they are notoriously difficult to navigate for non-technical end users and as a result, the anticipated benefits of an ECM never materialize. File Sync and Share solutions share files, but do not manage the modification of the document content. Both of those solutions open the door to document leaks when end users open a document in MS Word and have the ability to store that document on their device. SavvyDox doesn’t replace an ECM or File Sync and Share solution, it integrates with them to provide a complementary front end that is easy to use and controls the modification of document contents while reducing the possibility of document leaks or theft. SavvyDox provides measurable productivity improvements; improved document quality due to the parallel review process; reduced risk of document leaks or theft; and an easy to use front end to an ECM that will help generate the anticipated, but unrealized benefits of that multimillion dollar investment. For more information, visit savvydox.com

  • Amateur

    Most breaches happen inside the firewall - in fact, the firewall doesn‘t really do much, so, that‘s kind of a worthless suggestion. Rather focus on limiting what people have access to once they‘re already inside the firewall, which is far more important.

Comments are not moderated. To report offensive comments, click here.

Preparing comment abuse report for Article #1202777380768

Thank you!

This article's comments will be reviewed.