Nextpoint Nextpoint Nextpoint Nextpoint
  • Features
  • Services
  • Pricing
  • Security
  • Sign In
  • GET A QUOTE
Nextpoint

DESKTOP & TABLET

TRUSTED EDISCOVERY SECURITY & COMPLIANCE

Rest easy with the strictest data security standards and patented infrastructure.

MOBILE

TRUSTED eDiscovery SECURITY & COMPLIANCE

Rest easy with the strictest data security standards and patented infrastructure.

Keeping your data secure, confidential and accessible

An AWS technology partner since 2005, our data security provisioning is long-proven and without peer.

DESKTOP & MOBILE

AWS DATA CENTERS

Amazon Web Services offers the strictest standards of security and compliance.

DATA ENCRYPTION

Best in class SSL data encryption enforced at all times, in motion or at rest.

SOC II Compliant

Auditing procedure ensures we securely manage data to protect the privacy of our clients.

CONTROLLED ACCESS

Access to all data is permissions based at the case, folder and document level.

AUDIT TRAILS

Comprehensive reporting of data access, views, edits, deletions and downloads.

TWO FACTOR AUTHENTICATION

Forced authentication of all users and devices ensures utmost confidentiality of data.

TABLET LANDSCAPE  PORTRAIT

AWS DATA CENTERS

Amazon Web Services offers the strictest standards of security and compliance.

DATA ENCRYPTION

Best in class SSL data encryption enforced at all times, in motion or at rest.

SOC II Compliant

Auditing procedure ensures we securely manage data to protect the privacy of clients.

CONTROLLED ACCESS

Access to all data is permissions based at the case, folder and document level.

AUDIT TRAILS

Comprehensive reporting of data access, views, edits, deletions and downloads.

TWO FACTOR AUTHENTICATION

Forced authentication of all users and devices ensures utmost confidentiality.

DESKTOP

Download the Nextpoint Security and Privacy Overview.

Get the PDF

TABLET LANDSCAPE

Download the Nextpoint Security and Privacy Overview.

Get the PDF

TABLET PORTRAIT

Download the Nextpoint Security and Privacy Overview.

Get the PDF

MOBILE

Download the Nextpoint Security and Privacy Overview.

Get the PDF

DESKTOP & TABLET LANDSCAPE

AWS Data Centers

For more than 13 years Nextpoint has been hosted by Amazon Web Services. The AWS global cloud-computing infrastructure is managed according to the strictest standards of security and compliance, and trusted by NASA, the CIA and many leading corporations.

Read the 2010 Nextpoint Case Study written by AWS. (Yeah, we’ve been doing this best-in-class security thing a long time!)

TABLET PORTRAIT & MOBILE

AWS Data Centers

For more than 13 years Nextpoint has been hosted by Amazon Web Services. The AWS global cloud-computing infrastructure is managed according to the strictest standards of security and compliance, and trusted by NASA, the CIA and many leading corporations.

Read the 2010 Nextpoint Case Study written by AWS. (Yeah, we’ve been doing this best-in-class security thing a long time!)

DESKTOP & TABLET LANDSCAPE

Always Encrypted

Whether in motion or at rest, our best in class SSL encryption (SHA-256, 256-bit keys) keeps your data unreadable to unauthorized parties—even in the unlikely event that physical access to the data was somehow gained.

Comprehensive Audit Trails

Comprehensive audit trails and reporting features ensure you know who has accessed each and every document.

TABLET PORTRAIT & MOBILE

Always Encrypted

Whether in motion or at rest, our best in class SSL encryption (SHA-256, 256-bit keys) keeps your data unreadable to unauthorized parties—even in the unlikely event that physical access to the data was somehow gained.

Comprehensive Audit Trails

Comprehensive audit trails and reporting features ensure you know who has accessed each and every document.

DESKTOP & TABLET LANDSCAPE

You control access

Access to data is permissions-based. Four distinct “clearance” levels assigned to users based on role—mean you control who can access data at the case, folder and document level.

Forced two-factor user authentication

Just one more level of protection Nextpoint demands to ensure the privacy of your confidential data.

TABLET PORTRAIT & MOBILE

You control access

Access to data is permissions-based. Four distinct “clearance” levels assigned to users based on role—mean you control who can access data at the case, folder and document level.

Forced two-factor user authentication

Just one more level of protection Nextpoint demands to ensure the privacy of your confidential data.

DESKTOP & TABLET LANDSCAPE

Legal cloud security standards

Cloud data security in legal

As a founding member of the Legal Cloud Computing Association, we take cloud data security very seriously. More seriously than other cloud services—and in fact—more seriously than most law firms do.

That’s why we co-authored the industry’s first set of cloud security standards crafted specifically for the legal industry.

TABLET PORTRAIT & MOBILE

Legal cloud security standards

Cloud data security in legal

As a founding member of the Legal Cloud Computing Association, we take cloud data security very seriously. More seriously than other cloud services—and in fact—more seriously than most law firms do.

That’s why we co-authored the industry’s first set of cloud security standards crafted specifically for the legal industry.

Why customers love Nextpoint security

"You can pull it up on any tablet, ipad, or computer and the two-factor security gives me and my clients peace of mind. New updates keep making it easier to use as well."

Nina Towle Herring,

Cory Watson Attorneys


LEARN MORE ABOUT OUR UNMATCHED EDISCOVERY SECURITY

Get More Details

Trusted by some of the world’s smartest law firms

MorganMorgan
McDermott Will & Emery
Clyde & Co
Winston Strawn

TALK WITH US

888.929.NEXT

hello@nextpoint.com

Software

Features

Services

Case Studies

Security

Pricing

Sign In

Resources

eDiscovery Blog

eDiscovery Webinars

eDiscovery Guides

eDiscovery Checklists

For Partners

Company

About Us

Our Values

Careers

Contact Us

© 2023 Nextpoint, Inc.

Privacy Policy | Terms of Use

888.929.NEXT

  • Features
  • Services
  • Pricing
  • Security
  • Sign In
  • GET A QUOTE
  • Features
  • Services
  • Pricing
  • Security
  • Sign In
  • GET A QUOTE
Start Typing