CALL US: 888.929.NEXT
Get A Quote
CALL US: 888.929.NEXT

How Do I Know my Data is Secure?

Nextpoint provides High-grade SSL Encryption Certificate (AES-256, 256-bit keys) in all stages of transmission and storage. Nextpoint employs two-factor authentication, advanced encryption, and other security measures to ensure database security. 

Nextpoint provides high-grade SSL Encryption Certificate (AES-256, 256-bit keys) in all stages of transmission and storage. The Amazon Incident Management team employs industry-standard diagnostic procedures to drive resolution during business-impacting events. Staff operators provide 24 x 7 x 365 coverage to detect incidents and to manage the impact and resolution.

In addition, Nextpoint employs extensive monitoring – a mix of basic services provided by external services and complex monitors developed internally. We prefer not to reveal specific measures and tactics with sources outside of the company in order to maintain the integrity of our solutions. Amazon also regularly verifies the integrity of Nextpoint data using checksums.

More information about Amazon’s security precautions >


Yeah, but what about physical security?

Our data is hosted in data centers where critical facilities have extensive setback and military grade perimeter control berms as well as other natural boundary protection.

Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, state of the art intrusion detection systems, and other electronic means.

Authorized staff must pass two-factor authentication no fewer than three times to access data center floors. All visitors and contractors are required to present ID and are signed in and escorted by authorized staff. 

Where are my documents stored?

Data is stored in Amazon Web Services facilities, in data centers where critical facilities have extensive setback and military grade perimeter control berms as well as other natural boundary protection.

As mentioned, physical access is strictly controlled both at the perimeter and building ingress points by professional security staff utilizing video surveillance, state of the art intrusion detection systems, and other electronic means.


Does Nextpoint use security testing?

We test our systems on an ongoing basis, including daily penetration testing of the technology platform. Audits are performed to the standards required for maintenance.


How does Nextpoint control passwords?

We insist on the strongest passwords, two-factor authentication, and device authentication. Administrators can set up differentiated access levels for unique users, providing control over what individual users can do in the application. Every use of the application is authenticated and logged, providing an audit trail of user activities and modifications.


How do I know data is truly deleted from your systems?

Nextpoint uses hosting providers that follow protocols identified in to DoD 5220.22-M (“National Industrial Security Program Operating Manual “) or NIST 800-88 (“Guidelines for Media Sanitization”) to destroy data as part of the decommissioning process. If a hardware device is unable to be decommissioned using these procedures, the device will be degaussed or physically destroyed in accordance with industry-standard practices.

Security FAQ

What are my system requirements?

You need a computer or device with an up-to-date web browser. (Chrome, Safari, Explorer 9 or later recommended.)


Can I limit what users can see and do?

The Nextpoint platform has powerful user controls built in. In addition, the Analytic dashboard tracks reviewer productivity and helps move reviews forward.

How do I update the application?

There is no such thing as a Nextpoint security patch or out-of-date software. Because our software is cloud-based, when we deploy an update, it is instantly available for all of our users. There is no installation, no maintenance, and and no security patches for you to manage.

Administration FAQ

How fast is Nextpoint processing?

Upload times vary depending on the data. But because Nextpoint is a cloud-based platform, we can bring more computing resources online as needed to process your data faster than any in-house solution can hope to match.


When can I start my review?

You can begin your review as soon as your data has finished processing.


Can Nextpoint handle terabytes of data?

Nextpoint’s Client Success team is experienced in culling even the biggest and most complicated data sets down to size. There is probably no complication they haven’t seen before. In addition, the hosted software scales to manage any sized matter. We can bring as much computing power online as needed (all at the same low price.)


But how do I know what’s in my data?

Nextpoint’s expert Client Success team will upload your data, identify it all, eliminate the unnecessary stuff, and then organize it into a usable archive. As part of the Nextpoint Early Case Assessment, we will even give you a convenient web portal with advanced reporting tools to break it all down. Your clients will love knowing what they’re up against, and you can get started faster while providing them with more informed legal advice. Nextpoint’s client success team will also use duplicate and near duplicate detection technology to eliminate redundant or unneeded data.


Does Nextpoint offer technology assisted review or predictive coding capability?

The Nextpoint platform is integrated with Backstop LLP’s advanced machine learning search capabilities to assist in the review process. The software is a class of automatic document-classification software. Using artificial intelligence, Nextpoint software learns from attorney classifications of documents for large-scale document reviews in legal cases.  

Analyze FAQ

What can I do to search more easily?

We’ve got powerful search tools that offer full Boolean controls and numerous filtering criteria. Saved search. Filters. Highlighting tools to find important words faster. Advanced search tools can help you find your smoking gun documents while reviewer tools quickly classify and code it all. Bulk tagging, coding, and all sorts of features designed just for eDiscovery reviewers.


Are there limits on stamping and coding?

Of course not. You have custom redaction stamping, labeling, tagging, and codes quickly and effectively identify responsive, privileged, and confidential documents.


Can I customize my window?

Nextpoint’s Grid View layout is a streamlined interface for quickly browsing documents. And it is totally customizable.

How can I control user access and manage 

my review team?

Nextpoint has powerful tools for administrators to set user access and monitor reviews. They can set subreview assignments through user management and assignment controls. In addition, the Enhanced Review Metrics window gives administrators detailed graphical reports tracking the progress of any review project based for individual reviewers or review teams.


Can I use Nextpoint remotely?

Nextpoint is accessible anywhere phone, ipad, or any device with a browser. Work wherever the day takes you.

Review FAQ

How do I exchange evidence with third parties like clients or co-counsel?

Nextpoint exchange is completely secure, completely electronic, and is included in our litigation services.

Step 1: Create a single, secure database for producing and exchanging evidence in litigation.

Step 2: Send an email to clients, co-counsel, judges or opposing counsel, allowing them to enter the secure sign in process.

It’s that simple.


Can I still download evidence?

Of course. You can always download data to disk if necessary.

What about protecting privileged information? 

Nextpoint Privilege Protect uses layers of technologies to detect documents that may be privileged before producing to outside parties. We scan your production database with powerful computer algorithms to identify confidential material that’s for your eyes only.

The Privilege Protect workflow is a simple, step-by-step process that walks you through the steps necessary to check your document collection for confidential information. Near duplicate detection spots content in your dataset that looks like documents that have been marked privileged or confidential. You can quickly review these documents and prevent any inadvertent disclosure of privilege.

Exchange FAQ

I have a hearing, settlement conference, or trial, what do I do with all of my evidence?

Nextpoint is a litigation database. Upload all of your data, depositions, transcripts, email, and other electronically stored information (ESI) is in a single, integrated environment. You can securely share documents, treatments, and evidence with clients, co-counsel, judges, and other parties.

All key evidence types – documents, depositions, and transcripts – are instantly available through the powerful search engine. Stream video, create designations, create document call-out treatments, and prep your entire case in the Nextpoint platform.


My team is all over the country.
How do I collaborate and control my evidence?

The single online repository means you can always work remotely, even on an iPad or phone. Review documents, treatments, and deposition designations from anywhere. Data never leaves the database, so you can collaborate and share documents without creating multiple copies or ever losing data. Give your clients, co-counsel, or anyone who needs to see your work secure access to the database with a simple but powerful authentication protocol.

What about managing my deposition designations?

Built-in streaming video playback gives you immediate access to designated testimony. Hyperlinked deposition exhibits and transcripts make it easy to review, research, and find and manage all of your key testimony and evidence.

Also, you can manage your deposition designation exchange process by using our label or issue-coding. And like everything Nextpoint does, it’s all accessible on mobile devices, so you can work anywhere, anytime you need it.

Prep FAQ

What does Nextpoint collect?

Nextpoint engineers can crawl Youtube, Tumblr, Flickr, Facebook, Twitter, LinkedIn, websites to collect forensically accurate and complete archives of data. The service includes, crawl deduplication, preserves native formats, captures metadata, linked content, HTML source code, and creates a full-text search index of your evidence, date and time stamped for authentication.

Can Nextpoint capture dynamic or
non-static web content?

Every website is unique and not all web content is created equal. Nextpoint’s crawl engineering technology optimizes your data archive to collect only the information you need and to eliminate unnecessary duplicate and linked content. Our engineers ensure that you can archive content that other solutions often ignore, and do not archive duplicate or unnecessary content that needlessly inflates your archive.

Our engineers will look for: Duplicate Content, Retrieved Content, Linked Content

They will return with a technical analysis of any site along with a technical strategy for capturing the content.

Collect FAQ
One simple login.

One efficient solution to collect, analyze, review, exchange and prep evidence without I.T. 


 View Plans & Pricing