BLACKBERRY
Appurity attends the BlackBerry Legal Advisory Forum hosted by Clifford Chance LLP
15 July 2019
Mobile security in the enterprise
On the 11th of July, the Appurity team headed over to Canary Wharf to take part in an exclusive workshop hosted by one of the world’s leading law firms, Clifford Chance LLP.
We were delighted to be invited to take part in this prestigious event. The key focus was mobile security in the enterprise, along with password-less security and critical communications.
Steve Whiter, Appurity Director, delivered an interesting and highly topical session on harnessing the power of iManage and BlackBerry Workspaces, which was very well-received.
The audience was interested to learn how the Appurity team can enhance an iManage infrastructure to increase a fee earners’ billable hours and enable secure file sharing to external Counsel, other law firms and clients.
Appurity’s partner, IDENprotect was on hand to discuss their ‘authentication without compromise’ approach to password-less security. While Blackberry’s experts spoke about their rich technological heritage from a security perspective.
During the workshop, global law firm Skadden, Arps, Slate, Meagher & Flom LLP also presented from New York to explain how they are harnessing BlackBerry Workspaces to securely send their data externally.
Appurity can enhance an iManage infrastructure to increase a fee earners’ billable hours and enable secure file sharing to external Counsel, other law firms and clients.
Products we discussed
With Workspaces, all stakeholders can safely access, share and collaborate on even the most sensitive files, using any device. Combining a synchronisation and sharing experience that’s intuitive with a unique data-centric architecture (which embeds protection right in your files), Workspaces is designed to meet the needs of your organisation, IT team, and users.
iDENprotect is a single, standards based, future proof, cost effective identity and access management (IAM) platform. With iDENprotect, you get hardware-backed security requiring no additional devices. Importantly, you get levels of scalability, cost-effectiveness and usability normally restricted to software-only solutions.