Responding to Customer Requests, Nextpoint Deploys Enhanced Review Metrics to the Discovery Cloud™ Platform, Giving Reviewers New Tools to Track Progress and Control Costs in eDiscovery. March 19, 2013 – Nextpoint, Inc., the nation’s leading provider of cloud-based regulatory, compliance, and litigation software, has introduced Enhanced Review Metrics in the Discovery Cloud ™ review platform.…
read moreWe’ve been saying for years that the only way for the legal system to deal with the volumes of information available for discovery is legal cloud computing. If you are a Nextpoint user or just friendly follower, we are preaching to the choir. It seems like such an obvious proposition that perhaps we take it…
read moreNextpoint’s Privilege Protect ® helps solve one of the thorniest problem in litigation – securely transferring electronic data to opposing parties while preventing the production of privileged communications. Chicago, IL (PRWEB) October 09, 2012 Nextpoint, Inc., the nation’s leading provider of cloud-based regulatory, compliance, and litigation software, announces the release of Privilege Protect™ eDiscovery technology.…
read moreNextpoint’s Expert Witness is a feature offering insights from lawyers, technologists, law enforcement, entrepreneurs, and other interesting people influencing our industry and world. Check back regularly for thought-provoking expert opinions. Tom Chernaik Tom Chernaik is CEO of CMP.LY. The company’s unique disclosure solution is built on a foundation of Tom’s experience and insights in…
read moreVerizon’s “Hacktivism” 2012 report analyzed 855 data security breaches in 2011, finding that both small and large businesses are experiencing the second highest data loss since the report’s inception in 2004. Written to help prevent future breaches in 2012, the report carefully breaks down and analyzes global data breach statistics from 2011 and offers recommended solutions. So…
read morePhysical and Environmental Controls As a further comparison to the typical on-premise solution you may be using to store confidential client data, here’s a closer look at physical and environmental controls of cloud data centers. The following precautions apply to nearly all large scale cloud vendors, but for this case we are specifically referring to…
read moreThis week we’re going to take a look at a series of cloud computing security provisions to keep data safe. There are a number of reasons why cloud computing environments (including Nextpoint) can be inherently more secure than any solution hosted on-premise. One of the most basic and important provisions is two-factor authentication. If vetting any…
read more