Customer story

The world's largest law firm maintains the confidentiality of client documents

Why
Kirkland and Ellis

uses Cyberhaven

Kirkland and Ellis
Challenges
As a law firm, most of the data Kirkland manages is sensitive in nature, detailed context is required to understand which pieces of sensitive data are of the utmost importance to secure.
Cyberhaven's Benefits
1
Protect client documents that don't contain any text pattern or file tag/label
2
Understand the flow of data within the firm and the unknown risks
3
Put in place controls to protect customer data and the firm's reputation
4

Executive Summary

With Cyberhaven, the security team at Kirkland had more granular analysis about the types of sensitive data within their environments and could create detailed remediation responses around the behaviors they didn't want occurring in their environments.

Cyberhaven beat everyone else in security to the punch with data lineage. Being able to surface critical content without having to painstakingly configure alerts has turned me into a zealot for this technology.

Arlan McMillan
CSO, Kirkland and Ellis

The challenge

How to classify data that contains no keyword or RegEx pattern

As the world's largest law firm, Kirkland & Ellis handles countless confidential documents for its corporate clients. These documents, distinct in nature, cannot be easily classified using standard keywords or RegEx patterns. This uniqueness posed a challenge as most content-based classification tools yielded high false positive rates when trying to secure these files.

The sheer volume of files processed by Kirkland & Ellis made manual tagging by employees a non-viable solution. Not only was this method time-consuming, but it was also prone to human error, and posed a considerable risk to the security and integrity of the documents. Kirkland & Ellis faced a complex challenge: how could they ensure robust protection of their unique and sensitive client documents without falling into the pitfalls of false classifications or the unreliability of manual file tagging?

The solution

Cyberhaven changes how the firm protects data, starting with how it classifies it

With Cyberhaven, the security team at Kirkland had more granular analysis about the types of sensitive data within their environments and could create detailed remediation responses around the behaviors they didn't want occurring in their environments.

Cyberhaven was able to deliver results in the following key areas:

Accurately classify client documents

Cyberhaven leverages data lineage, going beyond mere content analysis, to accurately classify client documents. This advanced approach reduces misclassifications, ensuring that sensitive information is consistently recognized and adequately protected, setting a new standard in data security.

Quickly resolve internal investigations

Kirkland employs Cyberhaven to expedite internal investigations. Utilizing complete data histories, they ascertain user actions prior to incidents and trace the data's origin. This clarity streamlines resolutions and illuminates data access pathways, enhancing overall security measures.

Achieve better data lifecycle management

Kirkland harnesses Cyberhaven's data classification to enhance data lifecycle management. By understanding data origins and interactions, they streamline storage, access, and archival processes, ensuring information is effectively managed and protected throughout its entire lifecycle.

Gain visibility into where data flows

Cyberhaven provides Kirkland unparalleled visibility into unknown data realms. It uncovers "unknown unknowns," illuminating concealed storage spots and erratic data flows, revealing latent risks, and enabling a comprehensive understanding of data movement and vulnerabilities within the firm.

Data lineage is understanding how the data came into your environment and when it came in, and then how it changed, and where it traveled once it was inside your environment.

Dan Walsh
Chief Information Security Officer (CISO), VillageMD

Our DLP solutions were never really told us exactly what was there. Everything was a credit card number. Everything was a Social Security number. And so it just wasn't great. And it was a lot of work to manage.

Zack Willis
Senior VP of Technology, IVP

I've used traditional DLP technologies in the past and sometimes the noise-to-signal ratio can be a lot. The context Cyberhaven gives us has significantly improved our data protection, monitoring of data movement, and insider risk.

Prabhath Karanth
VP and Global Head of Security & Trust, Navan

False positives have been the gating factor for our data protection policies and every one of them makes users angry and creates extra work for our team. Cyberhaven has changed that completely with blocking that is accurate and reliable, and we have a built-in trace of every event so we can validate each decision.

Lance Wright
CISO, Bazaarvoice

The key challenge with insider threat tools is that they alert you to threats but don’t stop them. And they don’t detect actual threats, many of their alerts turn out to be false positives. Cyberhaven can take action to stop data exfiltration while an insider threat is happening.

John Harris
VP of IT Ops, Day & Zimmermann

Cyberhaven is not only the best tool for tracking data movement and exfiltration, the team clearly cares about your data. Their unique design makes everything very easy to comprehend and quick to take action on.

Donald Strand
Security Systems Administrator, BLT Communications

We've been with Cyberhaven for almost a year, and it's been a cornerstone of our DLP strategy. Their support team is always there for us, addressing any issues or requests we have.

Brad Gasser
Solutions Architect Cybersecurity, West Pharmaceutical Services

Cyberhaven beat everyone else in security to the punch with data lineage. Being able to surface critical content without having to painstakingly configure alerts has turned me into a zealot for this technology.

Arlan McMillan
CSO, Kirkland and Ellis

Staying ahead of the competition means guarding against insider threats. Cyberhaven gives us visibility into how data flows within our company and stops insider threats in real time.

Richard Rushing
CISO, Motorola

When you have a traditional system and you’re just looking at all the blocked actions, there’s just a lot of noise. Cyberhaven helps identify things that you don’t usually see with traditional DLP.

Mike Santos
Head of Security, Cooley
Live demo

See our product in action

The best way to understand the magic of Cyberhaven is to see a live product demo.
Request a demo