Posts By :

Michael Beumer

Nextpoint Grid View: Even More Customizable

Nextpoint Grid View: Even More Customizable 150 150 Michael Beumer

At Nextpoint, we understand that it is crucial for ediscovery and litigation tools to be as fast and cost-effective as possible. To that end, we periodically introduce a major enhancements, like our review metrics designed to help you track and monitor the progress of your review. But we are also continually tweaking our interface in response…

read more

Bringing Litigation Technology Into the 21st Century

Bringing Litigation Technology Into the 21st Century 150 150 Michael Beumer

Just a few years ago, the New York Times predicted that an army of robots would put attorneys out of work. It’s an interesting premise, and there may be some truth in it. But in my experience in legal technology, the real challenge is not that technology is taking over legal tasks. It is that,…

read more

Nextpoint Introduces Discovery Cloud Enhanced Review Metrics

Nextpoint Introduces Discovery Cloud Enhanced Review Metrics 150 150 Michael Beumer

Responding to Customer Requests, Nextpoint Deploys Enhanced Review Metrics to the Discovery Cloud™ Platform, Giving Reviewers New Tools to Track Progress and Control Costs in eDiscovery. March 19, 2013 – Nextpoint, Inc., the nation’s leading provider of cloud-based regulatory, compliance, and litigation software, has introduced Enhanced Review Metrics in the Discovery Cloud ™ review platform.…

read more
legal-cloud-computing

Why Legal Cloud Computing Is the Only Solution for eDiscovery

Why Legal Cloud Computing Is the Only Solution for eDiscovery 1000 674 Michael Beumer

We’ve been saying for years that the only way for the legal system to deal with the volumes of information available for discovery is legal cloud computing. If you are a Nextpoint user or just friendly follower, we are preaching to the choir. It seems like such an obvious proposition that perhaps we take it…

read more

Nextpoint Introduces Automated eDiscovery Tool to Prevent Inadvertent Production of Privileged Materials

Nextpoint Introduces Automated eDiscovery Tool to Prevent Inadvertent Production of Privileged Materials 150 150 Michael Beumer

Nextpoint’s Privilege Protect ® helps solve one of the thorniest problem in litigation – securely transferring electronic data to opposing parties while preventing the production of privileged communications. Chicago, IL (PRWEB) October 09, 2012 Nextpoint, Inc., the nation’s leading provider of cloud-based regulatory, compliance, and litigation software, announces the release of Privilege Protect™ eDiscovery technology.…

read more

CEO of CMP.LY Talks Social Media Disclosure

CEO of CMP.LY Talks Social Media Disclosure 150 150 Michael Beumer

Nextpoint’s Expert Witness is a feature offering insights from lawyers, technologists, law enforcement, entrepreneurs, and other interesting people influencing our industry and world. Check back regularly for thought-provoking expert opinions.   Tom Chernaik Tom Chernaik is CEO of CMP.LY. The company’s unique disclosure solution is built on a foundation of Tom’s experience and insights in…

read more

Data Security Report: Hacking by the Numbers

Data Security Report: Hacking by the Numbers 150 150 Michael Beumer

Verizon’s “Hacktivism” 2012 report analyzed 855 data security breaches in 2011, finding that both small and large businesses are experiencing the second highest data loss since the report’s inception in 2004. Written to help prevent future breaches in 2012, the report carefully breaks down and analyzes global data breach statistics from 2011 and offers recommended solutions. So…

read more

Cloud Computing Security: Physical and Environmental Controls

Cloud Computing Security: Physical and Environmental Controls 150 150 Michael Beumer

Physical and Environmental Controls  As a further comparison to the typical on-premise solution you may be using to store confidential client data, here’s a closer look at physical and environmental controls of cloud data centers. The following precautions apply to nearly all large scale cloud vendors, but for this case we are specifically referring to…

read more

Cloud Computing Security Provisions: Two-Factor Authentication

Cloud Computing Security Provisions: Two-Factor Authentication 150 150 Michael Beumer

This week we’re going to take a look at a series of cloud computing security provisions to keep data safe. There are a number of reasons why cloud computing environments (including Nextpoint) can be inherently more secure than any solution hosted on-premise. One of the most basic and important provisions is two-factor authentication. If vetting any…

read more