Okta Businesses at Work 2024 – Legal Applications are the Growth Leader

Okta has application usage data which you simply will not find anywhere else. This year’s report draws data from their anonymized 18,800 global customer base. Okta is a leader in identity and access management products. You may download the full “Okta Businesses at Work 2024” report here.

Growth in app categories: Legal software is the leader in customer growth

Source: Okta (My Annotations) – Growth in App Categories

Okta kicks off this year’s report with a spotlight on Legal applications, which was the leading app category in growth of number of customers.

“There’s no time for deals or
contracts to get hung up in legal. So, as we look
across the most popular app categories, it’s no
surprise that legal tools have locked up a win,
claiming by far the highest growth by number
of customers (35% YoY) and substantial 34%
YoY growth by number of unique users.
Apps
including Ironclad, LexisNexis, and LegalZoom
drive this remarkable growth story. (Fun fact:
Ironclad contract management software was
our eighth-fastest-growing app in 2022.)”

-Okta (my bold type)

Let’s look at those three applications:

Ironclad – Offers Contract Management software, which includes moving sales contracts through the processes of review and sign-off to speed the business process.

LexisNexis – Provides legal, regulatory, and business information and analytics, now including Generative AI. LexisNexis is a premier product in legal research.

LegalZoom – Its online platform for business formation helps entrepreneurs by providing legal, tax and compliance products and expertise.

With that promising look at the growth in Legal applications, let’s take a look at four more charts in the Okta report.

Growth of the 50 most popular apps

Source: Okta

There are two leaders here. 1Password is the fastest growing application by number of customers at 39% YoY. Amazon Business with the fastest growing by number of unique users at 89% YoY growth. Law firms are ramping up usage of password managers like 1Password as one of the essential tools to prevent phishing and social engineering exploits.

Not to be missed by law firms is the growth of KnowBe4 at over 20%. KnowBe4 is a Security Awareness Training product, with a focus on phishing awareness. In 2022 I cited that KnowBe4 was the leading Security Awareness solution used by 62% of law firms surveyed in the International Legal Technology Association’s 2022 Technology Survey.

Most popular apps

Source: Okta

It’s easy to see the trend of law firms in the “Overall” ranking. Microsoft 365 is rapidly being adopted, as firms migrate from other Microsoft on-prem products. Number five, Zoom, and number eight, DocuSign, are nearly ubiquitous at law firms. Number ten is KnowBe4, the Security Awareness training SaaS application.

Fastest-growing apps by number of customers

Source: Okta

Data compliance applications make a first time appearance in the fastest growing app ranking by number of customers. Vanta holds the number one position with 338% YoY growth. Drata ranks number six, with 91% YoY growth. Data compliance software is growing at law firms as firms are subject to regulatory and client requirements.

Most popular security tool categories

Source: Okta

Okta entitles this section: “The perimeter shifts.”

They observe that VPN/firewall continues to lead the security tool category, as it has since 2020. However, deployment of VPN/firewall grew 12% last year versus 31% in the prior year. 57% of customers have deployed VPN/firewall tools.

The second fastest growing category in security tools is Endpoint Management and Security, deployed by 43% of customers. This category has grown consistently since the emergence of work-from-home.

For those interested in legal or enterprise technology there is much more in the Okta report worth looking at in detail. You may find the report here.

– Maureen

Protect Your Data in a Remote Work Environment – ILTA Educational Webinar

Working remotely became a neccessity almost overnight. But were firm architectures ready? Two common entry points to system hacks, social engineering and network vulnerabilities, threaten the security of remote working. In this session, Mobile Helix CEO and Chief Architect, Seth Hallem, will describe these vulnerabilities and propose practical and actionable ways to address these weaknesses using safe browsing, network proxies, authentication, authorization, and DLP. These mitigations apply to both desktop and mobile devices.

This is an ILTA Educational Webinar. It is free to members as well as to non-members as part of ILTA’s COVID-19 content. Non-members may register for a free login-in.

WATCH THE RECORDED WEBINAR HERE

Outline:

I. Social engineering: Phishing, “Water Hole,” SIM card swaps

   Mitigations including:

    A. Safe browsing

    B. No SMS

    C. Web filtering via proxying

    D. Data Loss Prevention (DLP): printing, recipient checking, metadata filtering

II. Network vulnerabilities

    Mitigations including:

    A. Layered security

    B. Filter – proxy

    C. Authenticate the source – certificates, IP fencing, DoS defense

    D. Authenticate the user – AD credentials, complex passwords, SSO

    E. Authorize – manage email attachments

III. Example of a secure architecture

We welcome you and your questions on June 10th.

Write to us at: contact@mobilehelix dot com.

-Maureen

ILTA Webinar, Dec. 10th: Data Loss Prevention on Mobile with Seth Hallem

Mobile devices are constantly transacting with sensitive corporate data. Historically, most of that traffic is emails and email attachments. Increasingly, attorneys want to do more on their mobile devices, including annotating and editing documents. Much time and energy has been invested in DLP on the desktop, but what is the state of the art in mobile?

Continue reading

Secure Email is Cracked; What Now?

cracked pixabay rotated broken-glass-2208593__480

By Seth Hallem, Moble Helix CEO, Co-founder, & Chief Architect

Secure email using S/MIME and OpenPGP is fundamentally broken. Our CEO explains the EFAIL vulnerability and why our LINK Email is not susceptible to EFAIL. What do we do next to protect email? 

On Sunday night, a team of researchers from Germany and Belgium dropped a major bomb on the world of encrypted email by describing a simple, widely applicable, and wildly effective technique for coercing email clients to release encrypted email contents through “Exfiltration channels.”[1] The concept is simple – by using a combination of known manipulation techniques against the encryption algorithms specified in the S/MIME and OpenPGP standards and lax security choices in a wide variety of email clients, the research team was able to intercept and manipulate encrypted emails such that large blocks of the encrypted text are revealed to a malicious server.

What is most brilliant (and most dangerous) about this attack, is that the attack does not require decrypting the email messages or stealing encryption keys. Hence, the attack can be deployed as a man-in-the-middle attack on the infrastructure of the internet itself, rather than requiring that a specific email server or email client is compromised.

The essential idea behind this attack is simple – HTML emails expose a variety of reasons to query remote servers to load parts of those emails. The simplest (and most common) example of this concept is displaying embedded images. Many marketing emails use tiny embedded images to monitor who has opened an email. This technique is so pervasive that many of us have become desensitized to clicking the “Allow images from this sender” prompt in Outlook. It is common practice for marketing emails to contain embedded images with essential content, which encourages users to allow the client to load all images in that message. However, doing so loads both visible images and tiny, single pixel images that marketing tools use to uniquely determine that we have opened the email message in question.

Continue reading

Hacking is a booming business, and it’s time for a disruption – CSO Online

By Mobile Helix CEO and Co-founder, Seth Hallem

Hackers are siphoning billions from the global economy each year by stealing data for profit. However, in spite of this rising threat, enterprises continue to make the same mistakes over and over again. It is time to change our assumptions and to re-think how we protect sensitive data.

Hacking is a booming business. Business has been good for several years now. Data breaches are at all-time highs. Cyber-attacks are skyrocketing, and ransomware is a growing fad. And the best news of all is that the same old tricks (see XSS, SQL Injection, SPAM ….) are still working just as well as they always have. How is it possible that a business that was estimated to cost the global economy $450 billion dollars is continuing to grow? That is a lot of money diverted to criminals in lieu of legitimate participants in our global economy.

Continue reading

What CISOs must learn from Bitcoin and a research team at Georgia Tech

By Seth Hallem, originally published in HelpNetSecurity, Sept. 16, 2013

It has been an eventful time in the mobile world with two recent breaking stories revealing vulnerabilities in the security infrastructure for Android and iOS respectively. While vastly different in their nature, both point to a fundamental lesson that CISOs in an increasingly mobile world cannot ignore – when it comes to encryption, read the fine print. Otherwise you may find yourself up the proverbial creek without a paddle (i.e., remediation strategy).

Continue reading

Appthority: Top Blacklisted iOS & Android Apps

This brief article from Help Net Security, Top blacklisted Android and iOS apps by enterprises caught my eye this morning. The piece highlights a portion of the data from the new Appthority 3Q ’17 Enterprise Mobile Security Pulse Report, which you can download for free.

The Help Net Security article cites the apps blacklisted by enterprises for iOS and for Android, their “Risk Score” and the “Risk Driver.”  IT professionals should take note, not only of the blacklisted apps but of the associated risks.

Appthority_3Q17_Top_10_BL_iOS_Apps

Continue reading

Mobile Helix Partners with PSPDFKit to Provide Secure PDF Annotation to the LINK App

Lawyers receive, annotate, and share documents using a single encrypted app.

Today at ILTACON 2017 you can see our new in-app annotation in LINK 3.3.

MH-iPad14-Annotation

 

Lawyers can quickly annotate a document receive via email or a document stored in iManage Work® and NetDocuments® DMS. Then email the annotated document or check it into DMS with LINK 3.3.

 

“With the addition of PDF annotation, LINK now provides the industry’s broadest complement of workflows for lawyers on mobile devices,” Seth Hallem, CEO and Co-founder of Mobile Helix. “LINK workflows, whether annotating, editing, or comparing documents, ensure security and control of documents. Clients are imposing tougher security requirements on law firms. Our goal is to provide law firms with stringent security while making it easy for lawyers to get work done with LINK.”

Continue reading

Mobile Helix Announces the Release of LINK 3.3 with Local Edit and Digital Rights Management

We are thrilled to unveil our new LINK 3.3 release at ILTACON 2017.

What’s new in LINK 3.3

  • Local edit using the Microsoft Word app
  • Option to send a document using iOS Mail
  • Ability to read an NRL link in iOS Mail
  • Integration with Azure AD Information Rights Management
  • Secure in-app PDF annotation
  • Lighter, faster User Interface

Continue reading

Mobile Helix LINK App at ILTACON 2017

Mandalay Bary Day_low

Twisting by the pool? Well, maybe on Sunday. Mandalay Bay has an 11 acre sand and surf beach pool. It’s incredible.

We are happy to once again be a Gold Sponsor for ILTACON 2017 at the Mandalay Bay Hotel, August 13th – 17th.

Once you drag yourself away from the pool, stop by and say hi at our booth, 703. 

We will be demonstrating LINK’s two new features:

  • Annotating PDFs within the LINK secure container app
  • Secure editing of a doc with the Microsoft Word for iOS apps using Azure AD IRM

To see a short video demo of LINK in action please click HERE

Visit us in booth 703 to see a demo of the LINK app for lawyers. See you in Las Vegas!

Continue reading