Mobile Apps – User Experience and Security
Can your lawyers work with iManage®, NetDocuments, SharePoint and the firm intranet from smartphones and tablets? Mobility for lawyers lives at the challenging crossroads of ease-of-use and security. We’ll look at top solutions used in legal today, covering topics including:
- Trade-offs of mobile device management, secure container apps, virtual desktop infrastructure, virtual private network and browser access to SaaS applications
- Top mobile workflows for lawyers (open an NRL file, check-in a doc to DMS, edit)
- Demo of secure container mobile app designed for lawyers
Education, demo, lunch & networking. We hope to see you on the 13th.
Sterne, Kessler, Goldstein & Fox P.L.L.C.
1110 New York Ave., NW
Washington, DC 20005
Where will you be on August 28th? 1,600 legal technology professionals know exactly where they will be – at the Gaylord National Harbor Hotel for ILTACON 2016.
ILTACON offers a unique opportunity for members to learn from Legal IT peers and to see the latest in legal technology. We will be demonstrating our LINK mobile app for lawyers.
Stop by booth 820 to see how easy it is to:
- View an NRL, with redlines and comments, in LINK Email
- Send and file-to DMS
- Check a doc into DMS
- Search DMS and email a doc
And LINK’s two new features:
- Open an NRL from iOS email
- Edit a doc with the Microsoft Word for iOS apps
LINK is integrated with iManage®, NetDocuments, Outlook, SharePoint, Handshake, OneDrive for Business, and the firm intranet. Worldox – coming soon. LINK is an encrypted container app which can be remotely wiped.
See you at the Gaylord!
Have you ever noticed that sometimes something very small can get in the way of completing something big and meaningful?
Like when you open a new Lego set and later discover that there are 1119 / 1120 pieces there, and of course the missing piece is the little tiny one that goes right in the middle, so you already spent two hours building half of the Star Wars set – but now you need to stop everything and drive 30 minutes each way to the Lego store to get that one tiny 2×2 block.
That’s what it must feel like when your delicious freshly made lunch arrives at the table, and you receive a critical must-review email with an iManage® Work NRL attachment on your phone. Suddenly, instead of enjoying the still-steaming soup you are moving it aside so you can fit your laptop and your hot spot, waiting for the PC to start up, opening up the remote access app, logging into your work computer, waiting for Outlook to start and then finally bringing up the document to review – just to make sure that one word was properly changed on the second page! By the time you accept the change and reply to confirm it’s a go, your soup is cold and lunch is ruined. Continue reading
Whaling, hacking, Panama Papers. Security exploits targeted at law firms are front page news this year.
Toronto, Mobile Helix and MicroAgility are thrilled to be headed to your beautiful city for our ILTA Roadshow on April 28th at Davies Ward Phillips & Vineberg LLP. Mobile Helix and Toronto company, MacroAgility, are sponsoring, “Make the Most of iManage – New Features in Work 9.3 and Secure Mobility.”
Join us to learn about Work 9.3 features from MacroAgility and about secure mobility for Work from Mobile Helix. We will show a demo of our LINK encrypted app for lawyers which integrates with Work, Outlook, SharePoint and the firm intranet. Enjoy lunch, education, and networking with peers. Registration is required. Details and registration here.
By Seth Hallem, Mobile Helix CEO and co-founder
On March 28th, the Department of Justice confirmed that it had successfully unlocked the San Bernardino shooter’s iPhone 5C without Apple’s assistance. On that same day, the US government moved to vacate a California court order that had attempted to force Apple to assist in the decryption of the device. While the legal maneuverings are fascinating in their own right, the conclusion leads to an even more fascinating technology discussion – how did the FBI crack the iPhone, and what are the implications of this successful hack? Continue reading