fbpx

Guard Your Law Firm's Data

Legal data is vastly important yet markedly unprotected.

Send files securely and safely store them using powerful AI-powered security.  Maintain GDPR & CCPA compliance.

Free Trial

Background

Windows Ransomware Protection

Legal Data Secured

Confidential Means Confidential

Protect your client's data wherever it goes.


Protect communications for absolute confidentiality

Defend Attorney – Client Privilege

The rise of cyberthreats and general loss of control over data has led to the disintegration of attorney-client privilege as confidentiality is eroded. Legal Data Guard reinstates the sanctity of this key privilege by offering legal professionals the ability to advise clients and share sensitive legal documents with absolute confidentiality.

Defend Attorney – Client Privilege
Background

Auditable File Tracking

Secure a Chain of Data Custody

Chain of data custody should be maintained to ensure admissibility and evidence integrity. Legal professionals utilizing Legal Data Guard are able to fulfill chain of custody requirements with complete transparency and auditability of file activity. AI-powered sensors capture and log events such as who accessed a file, at what time, and whether a file was modified, downloaded and/or shared.

Secure a Chain of Data Custody
Background


Secure data wherever it goes.

Secure File Share

Use Legal Data Guard to track and protect your files even after they are emailed. 1) Record timestamp when file was opened. 2) Log time spent on each page. 3) Know location of every file via IP geolocation.

Secure File Share
Background

Should files be shared forever?

Limit Duration of Access

With link expiration, you can limit how long a file remains viewable. Shared files can be recalled instantaneously. Access to shared files can be revoked at any time, whether in an inbox or opened on a web browser.

Limit Duration of Access
Background

No learning curve.

Easy To Use

Data Guard offers a fast and intuitive interface supported by sophisticated technology working for you behind the scenes. As soon as you install, all your folders and files will be protected. Sharing files securely is only a right click away.

See all advanced anti-ransomware features.
Easy To Use
Background

Law Firm's Are Treasure Troves For Hackers

Avoid reputational loss from the inadvertent sending of files, ransomware attacks, and other cyberthreats.

Get A 14-Day Risk Free Trial


Background


Use Cases

Security and compliance quagmires resolved.


An international law firm benefited using Legal Data Guard by being able to share confidential client data with outside subject experts using the view-only mode and revoke access to these 3rd parties once the case was complete.

Active Cypher helped a major law firm, with 600 employees (now forced to work from home), deal with the challenge to secure data off site and maintain the integrity of the firm’s file sharing and data access policies for their remote users.  The solution was to install Active Cypher’s Legal Data Guard paired with the File Fortress add-on into their virtual desktop environment.

A law firm approached Active Cypher to ensure that its own client data would be fully encrypted in compliance with new regulations defined by CCPA.

This was easily accomplished by installing Legal Data Guard with the File Fortress add-on onto their file servers, thus starting their compliance with CCPA in just over 3 hours.

Especially sensitive of client data surrounding M&A and IPOs, a Silicon Valley-based corporate law practice utilized Legal Data Guard to give partners full control and transparency over who was accessing data and enforce stringent Chinese walls.

A DC-based law firm installed Legal Data Guard to proactively counter ransomware attacks it was facing and avoid the complete shutdowns other law firms unfortunately experienced.

Deployment was completed quickly and pain-free with no disruption to regular business.

FAQs

Legal Data Guard takes a proactive approach to defending against ransomware by ensuring that your data always remains safe.  Unlike other solutions, Data Guard does not operate “after the hack” nor require user interaction / IT oversight.

Documents can be shared with any platform such as Windows, Mac OS, Linux, iOS and Android. Data Guard will also have clients on Mac OS, iOS and Android by the end of this summer.

Ransomware is a form of malware (trojan or other virus) utilized by malicious actors to extort money from individuals, businesses, and governments.  While many types of ransomware exist, a typical attack encrypts a victim’s data and displaying instructions how to pay a ransom payment – usually in the form of cryptocurrencies like Bitcoin.  Ransomware is not cheap and there is no guarantee for success in decryption.

In fact, while cybercriminals promise to provide a decryption key upon payment of the ransom – 40% of victims who pay unfortunately never regain access to their data.

Ransomware has become an enormous business perpetrated by both organized crime and nation-state actors.

Organized criminals are motivated by extorting as much money as possible. Increasingly they distribute their malware as ransomware kits that anyone can use – even if they don’t have much technical expertise. The ransomware as a service (RaaS) model sadly has been very effective at spreading their malicious software. The criminals facilitate the payments and decryptions while taking a percentage of the collected ransom.

Nation-states have utilized ransomware as a revenue source and as a manner to disrupt the economic and governmental well-being of their rivals.  The large resources a nation-state has at its disposal to mount such attacks is especially disruptive.

The majority of popular ransomware strains utilize such strong encryption that decrypting files is unfortunately not possible.  In limited cases, older ransomware families (Rakhni, Agent.iih, Aura, and a few others) have decryptor’s available.

With Data Guard, you don’t need to worry about ransomware even taking a hold in your computer, let alone encrypting your data.  Protection is automated and far-reaching.  Ransomware is deflected.

The simple answer is no.  While some anti-virus solutions protect against older versions of ransomware, this protection is done “after the hack”.  The only way to defeat ransomware is to not allow it to take hold of your files in the first place.

Send any questions via our Support Form.  Our team will reach back ASAP!

File Cloaking


Make your files invisible to ransomware using proprietary security algorithms. Hackers can’t take, what they can’t see.
 
close-link
Cloud Backup & Restore

Create a secure backup of your files on the cloud allowing for seamless restoration of your data in case of disruption.
close-link
Secure Email Share

Share your files securely with friends, family, colleagues, and clients. No password sharing is required – we do everything on our end to provide you with the most convenient and secure solution for file sharing. View only and editable modes allow you to customize the level of access.
close-link
Automated Data Restoration

Should your system be attacked, Active Cypher automatically restores your files from the cloud backup or cache – immediately reversing the effects of any attack.
close-link
A.I. Threat Learning

Using artificial intelligence, Active Cypher monitors your computer in real-time – examining the process stack to identify activities that exhibit behavior patterns that are typically seen in ransomware attacks. Artificial Intelligence-powered sensors are deployed with aggressive anomaly detection models to proactively identify suspicious executables.
close-link
One-Click Cloud Restore

One-Click Cloud Restore allows you to revert your computer back in time and remove all known and unknown malware programs from your computer while maintaining the sanctity of data.
close-link
Lightweight yet powerful

With an extremely small client engine using limited memory, Active Cypher makes decisions about critical files with virtually no CPU or disk (IOPS) overhead.
close-link
Document Collaboration

Work securely together on projects. Collaborate with coworkers while maintaining the ultimate security of your files.
close-link
Large File Support

From heavy movie files to engineering renderings, Active Cypher provides protection to many unprotected classes of files.
close-link
Zero Day Threat Updates

Receive the latest updates on zero-day threats that take advantage of previously unknown vulnerabilities.
close-link
Automatic Threat Analysis

Automatically analyses possible activity done by a suspicious software in your system. If there is potential ransomware running, you will be notified as the file is removed.
close-link
End-to-End Encryption*

Secure data wherever it goes with advanced end-to-end encryption. Available with AES 256 or proprietary Quantum Encryption Standard (QES). Native support for thousands of file types.
close-link
GDPR/CCPA Compliance*

Governments have made it clear: encrypt your data or be penalized. Active Cypher helps clients achieve auditable compliance within an afternoon.
close-link
Behavioral Detection

Using artificial intelligence, Active Cypher monitors your computer in real-time – examining the process stack to identify activities that exhibit behavior patterns that are typically seen in ransomware attacks.
close-link
Remote Worker Security*

On a corporate network, IT teams can easily secure employee computers and company data. This becomes harder to accomplish when an employee retrieves and shares information from outside the network – where devices (company and personal) are exposed to cyberattacks that can steal login credentials or encrypt company data with ransomware.
close-link
Quantum-Resilient Encryption*

Using proprietary, innovative technologies that leverage new approaches and unique performance accelerants, Active Cypher developed the most powerful quantum-resilient encryption. Our bit-shifting/bit-stream cipher algorithms were designed to be impervious to brute force attacks based on integer-based prime factorization techniques which have been documented quantum computer infosec world.
close-link
Secure Private Cloud*

Leveraging a deep integration with Azure and Active Directory, Active Cypher deploys your own secure private cloud. Synchronizes with Office 365 and Azure Active Directory cloud services. Requires no additional management or programs, nor the knowledge and exchange of keys, certificates, passwords, or secrets.
close-link
Hybrid/Multi-Cloud Support*

Real-time data security. No dilution of file governance across cloud storage endpoints. Remote work protected.
close-link
Intelligent Threat Response*

Artificial Intelligence (AI) driven threat protection and incident response prevent the spread of breaches inside any data center and cloud.
close-link
Automated Zero-Trust Architecture*

Never trust, always verify. Identity-centric attributes obtained from Azure Active Directory metadata and evaluated with risk-based escalations.
close-link
Crypto-Agility*

Runs native with AES 256 or proprietary Quantum Encryption Standard (QES). Newer encryption library standards available to be added.
close-link
IT/Compliance Oversight Tools

Single pane of glass compliance measures and risk management in support of the client’s requirements.
close-link
close-link