Data and IP protection for legal and professional services
Every day, professional services firms are trusted with some of their clients’ most sensitive data. Legal advice, financial information, trade secrets, design drawings, PII, and a wide range of sensitive communications must remain protected at all times. At the same time, staff must remain highly efficient and free to work without being unencumbered by security policies.
Cyberhaven lets professional services firms protect any form of data across any business workflow without the friction and false positives of traditional DLP. Security staff can automatically see and control where all of their sensitive data is located, even in locations that they didn’t know to look - all without the need for tagging or complex rules. When problems are detected, security staff have full control over balancing risk and productivity with the option to automatically block, engage users, or provide real-time coaching.
Problems We Solve
-
Automatically find sensitive internal or customer data
Signatures and tagging only work for a few types of data, and only cover the risks you already know about. Cyberhaven automatically finds any type of sensitive data, including all the copies and derivatives in places you didn’t know to look.
Learn how it works -
Control risk across any business workflow
Important data often flows across laptops, applications, and cloud services as users work and collaborate. Cyberhaven tracks and controls every action across these resources even when data is encrypted or obscured.
Learn how it works -
Balance protection and productivity
Even the simplest user mistakes can lead to big problems. Cyberhaven provides simple, fine-grained controls that can protect data and educate users without disrupting business.
Learn how it works
Sample data flow

The Scenario
Ellen is a junior associate at a law firm with privileged access to customer data within the iManage application, but she is dissatisfied with her current role and has applied for a position with a competing firm. To illustrate her work, she is planning to present a customer document that she helped prepare. Although she previously had sanctioned access to the customer document in prior months, she now takes a copy from her local disk, renames it, and transfers it to an unsanctioned removable drive.
The Solution
Cyberhaven detected exfiltration of a sensitive customer document to an unsanctioned removable drive. Cyberhaven traced the entire data journey from when Ellen downloaded the document file from the iManage, through all the intermediate steps. When Ellen tried to copy the file to her unsanctioned removable drive, Cyberhaven knew it contained sensitive data and raised an alert.
Intellectual Property Loss Comes in Many Forms
Whether due to malicious actions or a moment of carelessness, data loss can have devastating impacts on your business.
Extortion Against Law Firm
Attackers stole data from a law firm serving the entertainment industry and threatened to leak them online unless payment was made.
-
-
- Read More