TRUSTED DATA SECURITY

Rest easy with the strictest data security standards and patented infrastructure.

Keeping your data secure, confidential and accessible

An AWS technology partner since 2005, our data security provisioning is long-proven and without peer.

DESKTOP & MOBILE

AWS DATA CENTERS

Amazon Web Services offers the strictest standards of security and compliance.

DATA ENCRYPTION

Best in class SSL data encryption enforced at all times, in motion or at rest.

SOC II Compliant

Auditing procedure ensures we securely manage data to protect the privacy of our clients.

CONTROLLED ACCESS

Access to all data is permissions based at the case, folder and document level.

AUDIT TRAILS

Comprehensive reporting of data access, views, edits, deletions and downloads.

TWO FACTOR AUTHENTICATION

Forced authentication of all users and devices ensures utmost confidentiality of data.

TABLET LANDSCAPE  PORTRAIT

AWS DATA CENTERS

Amazon Web Services offers the strictest standards of security and compliance.

DATA ENCRYPTION

Best in class SSL data encryption enforced at all times, in motion or at rest.

SOC II Compliant

Auditing procedure ensures we securely manage data to protect the privacy of clients.

CONTROLLED ACCESS

Access to all data is permissions based at the case, folder and document level.

AUDIT TRAILS

Comprehensive reporting of data access, views, edits, deletions and downloads.

TWO FACTOR AUTHENTICATION

Forced authentication of all users and devices ensures utmost confidentiality.

DESKTOP & TABLET LANDSCAPE

AWS Data Centers

For more than 13 years Nextpoint has been hosted by Amazon Web Services. The AWS global cloud-computing infrastructure is managed according to the strictest standards of security and compliance, and trusted by NASA, the CIA and many leading corporations.

Read the 2010 Nextpoint Case Study written by AWS. (Yeah, we’ve been doing this best-in-class security thing a long time!)

TABLET PORTRAIT & MOBILE

AWS Data Centers

For more than 13 years Nextpoint has been hosted by Amazon Web Services. The AWS global cloud-computing infrastructure is managed according to the strictest standards of security and compliance, and trusted by NASA, the CIA and many leading corporations.

Read the 2010 Nextpoint Case Study written by AWS. (Yeah, we’ve been doing this best-in-class security thing a long time!)

DESKTOP & TABLET LANDSCAPE

Always Encrypted

Whether in motion or at rest, our best in class SSL encryption (SHA-256, 256-bit keys) keeps your data unreadable to unauthorized parties—even in the unlikely event that physical access to the data was somehow gained.

Comprehensive Audit Trails

Comprehensive audit trails and reporting features ensure you know who has accessed each and every document.

TABLET PORTRAIT & MOBILE

Always Encrypted

Whether in motion or at rest, our best in class SSL encryption (SHA-256, 256-bit keys) keeps your data unreadable to unauthorized parties—even in the unlikely event that physical access to the data was somehow gained.

Comprehensive Audit Trails

Comprehensive audit trails and reporting features ensure you know who has accessed each and every document.

DESKTOP & TABLET LANDSCAPE

You control access

Access to data is permissions-based. Four distinct “clearance” levels assigned to users based on role—mean you control who can access data at the case, folder and document level.

Forced two-factor user authentication

Just one more level of protection Nextpoint demands to ensure the privacy of your confidential data.

TABLET PORTRAIT & MOBILE

You control access

Access to data is permissions-based. Four distinct “clearance” levels assigned to users based on role—mean you control who can access data at the case, folder and document level.

Forced two-factor user authentication

Just one more level of protection Nextpoint demands to ensure the privacy of your confidential data.

DESKTOP & TABLET LANDSCAPE

Legal cloud security standards

Cloud data security in legal

As a founding member of the Legal Cloud Computing Association, we take cloud data security very seriously. More seriously than other cloud services—and in fact—more seriously than most law firms do.

That’s why we co-authored the industry’s first set of cloud security standards crafted specifically for the legal industry.

TABLET PORTRAIT & MOBILE

Legal cloud security standards

Cloud data security in legal

As a founding member of the Legal Cloud Computing Association, we take cloud data security very seriously. More seriously than other cloud services—and in fact—more seriously than most law firms do.

That’s why we co-authored the industry’s first set of cloud security standards crafted specifically for the legal industry.

Why customers love Nextpoint security


UPGRADE TO UNMATCHED SECURITY FOR YOU & YOUR CLIENTS

Trusted by some of the world’s smartest law firms

Jones Day
McDermott Will & Emery
Clyde & Co
Winston Strawn