As our customers know, security and data protection are core priorities of the LINK App. Designed to handle highly sensitive documents and emails, the LINK App ensures the highest level of data security—whether for high-stakes M&A, litigation, or healthcare matters.
We are proud to announce that Mobile Helix has successfully achieved SOC 2 Type 1 compliance. This rigorous security framework evaluates an organization’s policies and controls to ensure robust data protection.
We view earning SOC 2 Type 1 compliance as a significant milestone in our ongoing commitment to designing secure products and maintaining strict operational controls to safeguard data confidentiality and privacy. This achievement required the dedication of our entire team, and I am grateful for their hard work.
As we continue to strengthen our security practices and regulatory compliance, protecting our customers’ data remains our highest priority.
Okta has application usage data which you simply will not find anywhere else. This year’s report draws data from their anonymized 18,800 global customer base. Okta is a leader in identity and access management products. You may download the full “Okta Businesses at Work 2024” report here.
Growth in app categories: Legal software is the leader in customer growth
Source: Okta (My Annotations) – Growth in App Categories
Okta kicks off this year’s report with a spotlight on Legal applications, which was the leading app category in growth of number of customers.
“There’s no time for deals or contracts to get hung up in legal. So, as we look across the most popular app categories, it’s no surprise that legal tools have locked up a win, claiming by far the highest growth by number of customers (35% YoY) and substantial 34% YoY growth by number of unique users. Apps including Ironclad, LexisNexis, and LegalZoom drive this remarkable growth story. (Fun fact: Ironclad contract management software was our eighth-fastest-growing app in 2022.)”
-Okta (my bold type)
Let’s look at those three applications:
Ironclad – Offers Contract Management software, which includes moving sales contracts through the processes of review and sign-off to speed the business process.
LexisNexis – Provides legal, regulatory, and business information and analytics, now including Generative AI. LexisNexis is a premier product in legal research.
LegalZoom – Its online platform for business formation helps entrepreneurs by providing legal, tax and compliance products and expertise.
With that promising look at the growth in Legal applications, let’s take a look at four more charts in the Okta report.
Growth of the 50 most popular apps
Source: Okta
There are two leaders here. 1Password is the fastest growing application by number of customers at 39% YoY. Amazon Business with the fastest growing by number of unique users at 89% YoY growth. Law firms are ramping up usage of password managers like 1Password as one of the essential tools to prevent phishing and social engineering exploits.
Not to be missed by law firms is the growth of KnowBe4 at over 20%. KnowBe4 is a Security Awareness Training product, with a focus on phishing awareness. In 2022 I cited that KnowBe4 was the leading Security Awareness solution used by 62% of law firms surveyed in the International Legal Technology Association’s 2022 Technology Survey.
Most popular apps
Source: Okta
It’s easy to see the trend of law firms in the “Overall” ranking. Microsoft 365 is rapidly being adopted, as firms migrate from other Microsoft on-prem products. Number five, Zoom, and number eight, DocuSign, are nearly ubiquitous at law firms. Number ten is KnowBe4, the Security Awareness training SaaS application.
Fastest-growing apps by number of customers
Source: Okta
Data compliance applications make a first time appearance in the fastest growing app ranking by number of customers. Vanta holds the number one position with 338% YoY growth. Drata ranks number six, with 91% YoY growth. Data compliance software is growing at law firms as firms are subject to regulatory and client requirements.
Most popular security tool categories
Source: Okta
Okta entitles this section: “The perimeter shifts.”
They observe that VPN/firewall continues to lead the security tool category, as it has since 2020. However, deployment of VPN/firewall grew 12% last year versus 31% in the prior year. 57% of customers have deployed VPN/firewall tools.
The second fastest growing category in security tools is Endpoint Management and Security, deployed by 43% of customers. This category has grown consistently since the emergence of work-from-home.
For those interested in legal or enterprise technology there is much more in the Okta report worth looking at in detail. You may find the report here.
Working remotely became a neccessity almost overnight. But were firm architectures ready? Two common entry points to system hacks, social engineering and network vulnerabilities, threaten the security of remote working. In this session, Mobile Helix CEO and Chief Architect, Seth Hallem, will describe these vulnerabilities and propose practical and actionable ways to address these weaknesses using safe browsing, network proxies, authentication, authorization, and DLP. These mitigations apply to both desktop and mobile devices.
This is an ILTA Educational Webinar. It is free to members as well as to non-members as part of ILTA’s COVID-19 content. Non-members may register for a free login-in.
Mobile devices are constantly transacting with sensitive corporate data. Historically, most of that traffic is emails and email attachments. Increasingly, attorneys want to do more on their mobile devices, including annotating and editing documents. Much time and energy has been invested in DLP on the desktop, but what is the state of the art in mobile?
By Seth Hallem, Moble Helix CEO, Co-founder, & Chief Architect
Secure email using S/MIME and OpenPGP is fundamentally broken. Our CEO explains the EFAIL vulnerability and why our LINK Email is not susceptible to EFAIL. What do we do next to protect email?
On Sunday night, a team of researchers from Germany and Belgium dropped a major bomb on the world of encrypted email by describing a simple, widely applicable, and wildly effective technique for coercing email clients to release encrypted email contents through “Exfiltration channels.”[1] The concept is simple – by using a combination of known manipulation techniques against the encryption algorithms specified in the S/MIME and OpenPGP standards and lax security choices in a wide variety of email clients, the research team was able to intercept and manipulate encrypted emails such that large blocks of the encrypted text are revealed to a malicious server.
What is most brilliant (and most dangerous) about this attack, is that the attack does not require decrypting the email messages or stealing encryption keys. Hence, the attack can be deployed as a man-in-the-middle attack on the infrastructure of the internet itself, rather than requiring that a specific email server or email client is compromised.
The essential idea behind this attack is simple – HTML emails expose a variety of reasons to query remote servers to load parts of those emails. The simplest (and most common) example of this concept is displaying embedded images. Many marketing emails use tiny embedded images to monitor who has opened an email. This technique is so pervasive that many of us have become desensitized to clicking the “Allow images from this sender” prompt in Outlook. It is common practice for marketing emails to contain embedded images with essential content, which encourages users to allow the client to load all images in that message. However, doing so loads both visible images and tiny, single pixel images that marketing tools use to uniquely determine that we have opened the email message in question.
Hackers are siphoning billions from the global economy each year by stealing data for profit. However, in spite of this rising threat, enterprises continue to make the same mistakes over and over again. It is time to change our assumptions and to re-think how we protect sensitive data.
Hacking is a booming business. Business has been good for several years now. Data breaches are at all-time highs. Cyber-attacks are skyrocketing, and ransomware is a growing fad. And the best news of all is that the same old tricks (see XSS, SQL Injection, SPAM ….) are still working just as well as they always have. How is it possible that a business that was estimated to cost the global economy $450 billion dollars is continuing to grow? That is a lot of money diverted to criminals in lieu of legitimate participants in our global economy.
By Seth Hallem, originally published in HelpNetSecurity, Sept. 16, 2013
It has been an eventful time in the mobile world with two recent breaking stories revealing vulnerabilities in the security infrastructure for Android and iOS respectively. While vastly different in their nature, both point to a fundamental lesson that CISOs in an increasingly mobile world cannot ignore – when it comes to encryption, read the fine print. Otherwise you may find yourself up the proverbial creek without a paddle (i.e., remediation strategy).
The Help Net Security article cites the apps blacklisted by enterprises for iOS and for Android, their “Risk Score” and the “Risk Driver.” IT professionals should take note, not only of the blacklisted apps but of the associated risks.
Lawyers receive, annotate, and share documents using a single encrypted app.
Today at ILTACON 2017 you can see our new in-app annotation in LINK 3.3.
Lawyers can quickly annotate a document receive via email or a document stored in iManage Work® and NetDocuments® DMS. Then email the annotated document or check it into DMS with LINK 3.3.
“With the addition of PDF annotation, LINK now provides the industry’s broadest complement of workflows for lawyers on mobile devices,” Seth Hallem, CEO and Co-founder of Mobile Helix. “LINK workflows, whether annotating, editing, or comparing documents, ensure security and control of documents. Clients are imposing tougher security requirements on law firms. Our goal is to provide law firms with stringent security while making it easy for lawyers to get work done with LINK.”