The Pocket Law Firm
Your firm is rapidly adopting mobility to allow your legal professionals to stay productive wherever they are. From courthouses and virtual offices, legal professionals are communicating with clients, filing motions, and commenting on sensitive documents using their iPads, iPhones, BlackBerrys, and Android devices over which your IT department has little control.
We call this the “pocket law firm” because it aptly communicates what’s at stake: your legal professionals gain access to your entire law firm – the corporate network, litigation support and case management systems, and sensitive data – from a device small enough to fit in their pocket.
As IT and security professionals know all too well, the risks associated with the pocket law firm are legion. Lost or stolen devices that may not be passcode-protected, data leaks, mobile threats and malware, and forwarding confidential documents to personal email accounts are just a few of the issues that keep security professionals up at night.
Productivity Without the Loss of Security and Compliance
Fortunately, Citrix XenMobile MDM lets you mobilize your practice without sacrificing compliance or security. Citrix XenMobile MDM offers end-to-end protection for the mobile enterprise, across mobile devices, apps, network, and data. Citrix XenMobile MDM goes beyond the basic remote lock and wipe capabilities of most MDM solutions to:
- Protect M&A, IPO, financial and other client data. Your firm needs to protect attorney-client privileged information and other nonpublic data. A security breach could damage the reputation of your firm, and also have significant consequences for the client whose information was compromised. Prevent employees from using their mobile device to forward confidential data to personal accounts, download it to their home computer, or synch it to cloud storage services like Dropbox.
- Control access to sensitive mobile apps. With customer contact records, intellectual property filings or other case management information being accessed from mobile devices or tablets, privacy concerns and secure application access are important to your firm. Segregate sensitive business apps from all other apps running on your employees’ devices. Mobile App Tunnels provide dedicated, fully-encrypted, fully-auditable, VPN-like connections to secure your mobile apps and data. Mobile App Tunnels also let you rollout access to backend data in a granular, policy-based way.
- Manage, secure and support any mobile device. Configure and set static and dynamic, context-aware polices on mobile devices accessing your firm’s network based on employee role, device type, and whether the device is personally owned by an employee. Prevent lost devices or tablets from compromising your firm’s key data. Maintain a complete inventory of all authorized devices, discover and block all rogue devices.