Nextpoint provides High-grade SSL Encryption Certificate (AES-256, 256-bit keys) in all stages of transmission and storage. Nextpoint employs two-factor authentication, advanced encryption, and other security measures to ensure database security.
Nextpoint provides high-grade SSL Encryption Certificate (AES-256, 256-bit keys) in all stages of transmission and storage. The Amazon Incident Management team employs industry-standard diagnostic procedures to drive resolution during business-impacting events. Staff operators provide 24 x 7 x 365 coverage to detect incidents and to manage the impact and resolution.
In addition, Nextpoint employs extensive monitoring – a mix of basic services provided by external services and complex monitors developed internally. We prefer not to reveal specific measures and tactics with sources outside of the company in order to maintain the integrity of our solutions. Amazon also regularly verifies the integrity of Nextpoint data using checksums.
Our data is hosted in data centers where critical facilities have extensive setback and military grade perimeter control berms as well as other natural boundary protection.
Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, state of the art intrusion detection systems, and other electronic means.
Authorized staff must pass two-factor authentication no fewer than three times to access data center floors. All visitors and contractors are required to present ID and are signed in and escorted by authorized staff.
Data is stored in Amazon Web Services facilities, in data centers where critical facilities have extensive setback and military grade perimeter control berms as well as other natural boundary protection.
As mentioned, physical access is strictly controlled both at the perimeter and building ingress points by professional security staff utilizing video surveillance, state of the art intrusion detection systems, and other electronic means.
We test our systems on an ongoing basis, including daily penetration testing of the technology platform. Audits are performed to the standards required for maintenance.
We insist on the strongest passwords, two-factor authentication, and device authentication. Administrators can set up differentiated access levels for unique users, providing control over what individual users can do in the application. Every use of the application is authenticated and logged, providing an audit trail of user activities and modifications.
Nextpoint uses hosting providers that follow protocols identified in to DoD 5220.22-M (“National Industrial Security Program Operating Manual “) or NIST 800-88 (“Guidelines for Media Sanitization”) to destroy data as part of the decommissioning process. If a hardware device is unable to be decommissioned using these procedures, the device will be degaussed or physically destroyed in accordance with industry-standard practices.
You need a computer or device with an up-to-date web browser. (Chrome, Safari, Explorer 9 or later recommended.)
The Nextpoint platform has powerful user controls built in. In addition, the Analytic dashboard tracks reviewer productivity and helps move reviews forward.
There is no such thing as a Nextpoint security patch or out-of-date software. Because our software is cloud-based, when we deploy an update, it is instantly available for all of our users. There is no installation, no maintenance, and and no security patches for you to manage.
Upload times vary depending on the data. But because Nextpoint is a cloud-based platform, we can bring more computing resources online as needed to process your data faster than any in-house solution can hope to match.
You can begin your review as soon as your data has finished processing.
Nextpoint’s Client Success team is experienced in culling even the biggest and most complicated data sets down to size. There is probably no complication they haven’t seen before. In addition, the hosted software scales to manage any sized matter. We can bring as much computing power online as needed (all at the same low price.)
Nextpoint’s expert Client Success team will upload your data, identify it all, eliminate the unnecessary stuff, and then organize it into a usable archive. As part of the Nextpoint Early Case Assessment, we will even give you a convenient web portal with advanced reporting tools to break it all down. Your clients will love knowing what they’re up against, and you can get started faster while providing them with more informed legal advice. Nextpoint’s client success team will also use duplicate and near duplicate detection technology to eliminate redundant or unneeded data.
The Nextpoint platform is integrated with Backstop LLP’s advanced machine learning search capabilities to assist in the review process. The software is a class of automatic document-classification software. Using artificial intelligence, Nextpoint software learns from attorney classifications of documents for large-scale document reviews in legal cases.
We’ve got powerful search tools that offer full Boolean controls and numerous filtering criteria. Saved search. Filters. Highlighting tools to find important words faster. Advanced search tools can help you find your smoking gun documents while reviewer tools quickly classify and code it all. Bulk tagging, coding, and all sorts of features designed just for eDiscovery reviewers.
Of course not. You have custom redaction stamping, labeling, tagging, and codes quickly and effectively identify responsive, privileged, and confidential documents.
Nextpoint’s Grid View layout is a streamlined interface for quickly browsing documents. And it is totally customizable.
Nextpoint has powerful tools for administrators to set user access and monitor reviews. They can set subreview assignments through user management and assignment controls. In addition, the Enhanced Review Metrics window gives administrators detailed graphical reports tracking the progress of any review project based for individual reviewers or review teams.
Nextpoint is accessible anywhere phone, ipad, or any device with a browser. Work wherever the day takes you.
Nextpoint exchange is completely secure, completely electronic, and is included in our litigation services.
Step 1: Create a single, secure database for producing and exchanging evidence in litigation.
Step 2: Send an email to clients, co-counsel, judges or opposing counsel, allowing them to enter the secure sign in process.
It’s that simple.
Of course. You can always download data to disk if necessary.
Nextpoint Privilege Protect uses layers of technologies to detect documents that may be privileged before producing to outside parties. We scan your production database with powerful computer algorithms to identify confidential material that’s for your eyes only.
The Privilege Protect workflow is a simple, step-by-step process that walks you through the steps necessary to check your document collection for confidential information. Near duplicate detection spots content in your dataset that looks like documents that have been marked privileged or confidential. You can quickly review these documents and prevent any inadvertent disclosure of privilege.
Nextpoint is a litigation database. Upload all of your data, depositions, transcripts, email, and other electronically stored information (ESI) is in a single, integrated environment. You can securely share documents, treatments, and evidence with clients, co-counsel, judges, and other parties.
All key evidence types – documents, depositions, and transcripts – are instantly available through the powerful search engine. Stream video, create designations, create document call-out treatments, and prep your entire case in the Nextpoint platform.
The single online repository means you can always work remotely, even on an iPad or phone. Review documents, treatments, and deposition designations from anywhere. Data never leaves the database, so you can collaborate and share documents without creating multiple copies or ever losing data. Give your clients, co-counsel, or anyone who needs to see your work secure access to the database with a simple but powerful authentication protocol.
Built-in streaming video playback gives you immediate access to designated testimony. Hyperlinked deposition exhibits and transcripts make it easy to review, research, and find and manage all of your key testimony and evidence.
Also, you can manage your deposition designation exchange process by using our label or issue-coding. And like everything Nextpoint does, it’s all accessible on mobile devices, so you can work anywhere, anytime you need it.
Nextpoint engineers can crawl Youtube, Tumblr, Flickr, Facebook, Twitter, LinkedIn, websites to collect forensically accurate and complete archives of data. The service includes, crawl deduplication, preserves native formats, captures metadata, linked content, HTML source code, and creates a full-text search index of your evidence, date and time stamped for authentication.
Every website is unique and not all web content is created equal. Nextpoint’s crawl engineering technology optimizes your data archive to collect only the information you need and to eliminate unnecessary duplicate and linked content. Our engineers ensure that you can archive content that other solutions often ignore, and do not archive duplicate or unnecessary content that needlessly inflates your archive.
Our engineers will look for: Duplicate Content, Retrieved Content, Linked Content
They will return with a technical analysis of any site along with a technical strategy for capturing the content.