“Easy to use, simple to implement. End users can find their way around it without needing much if any training.”
Encryption that Ensures Privacy
Ensure that only your intended parties are able to access your files with Cerberus FTP-Server’s enterprise-grade file transfer encryption for law firms.
Flexible Encryption Key Management
Cerberus FTP Server offers numerous key management tools, including SSH2 public key authentication; support for RSA, DSA, and Elliptical Curve public and private keys; and support for Ephemeral Diffie-Hellman key exchange.
Easily Manage Compliance and Security
Cerberus FTP Server’s powerful tools support the most stringent internal compliance and security policies to ensure that files shared by your lawyers don’t fall into the wrong hands.
Eliminate Insecure Email File Transfer
Cerberus FTP Server’s ad-hoc file transfer option is the ideal file sharing tool for lawyers looking to provide unique, time-limited public links via HTTPS.
Have questions about using Cerberus FTP Server for law firm file transfer?
Requirements for Secure File Sharing at Law Firms
The legal industry largely self-regulates its cybersecurity policies in compliance with the jurisdiction or industry in which a firm may operate. This section provides an overview of the major industry requirements that apply to secure file sharing for law firms.
E.U. - Council of Bars and Law Societies of Europe (CCBE)
The E.U.’s General Data Protection Regulation provides the core framework for European file transfer security. However, the Council of Bars and Law Societies of Europe (CCBE) also provides guidance for law firms operating within the E.U.’s jurisdiction.
U.S. - American Bar Association
The ABA provides guidance for lawyers in Formal Opinion 477R*, which states “A lawyer should understand and use electronic security measures to safeguard client communications and information….if client information is of sufficient sensitivity, a lawyer should encrypt the transmission.”
U.S. - Legal Cloud Computing Association
The LCCA encourages its members and legal service providers to adopt the following data security practices:
- Standard 5: Encrypt all transmitted data
- Standard 8: Ensure that data retention policies are in effect to properly delete access to client data
- Standard 9: Use strong end user authentication
- Standard 11: Be able to track user activity within the firm’s system
- Standard 21: Have a disaster recovery plan in place
Learn more here: The Legal Cloud Computing Association’s Security Standards