Security

The cyber security landscape is changing every day and Filevine is well-positioned to aid law firms and other professionals with best in class compliance, privacy and security programs to protect your data. We can help your business protect your customer's data from some of the most potentially damaging hacks today such as ransomware. Take a look at our new Security page or updated Security White Paper to learn more.

Filevine takes information security, privacy, and compliance very seriously. That’s why we use a wide variety of industry-recognized, best-of-breed information security tools and technology to safeguard your data.

Ongoing Security Efforts

We are working continuously to improve Filevine’s security posture. As a part of our cyber security maturity model, we run multiple tests, audits, penetration tests and third party assessments to ensure our platform is safe and protected from cyber criminals.

Audits

Filevine services are engineered in a Multi-Cloud environment that leverages the power and security of AWS, Microsoft Azure and Google Cloud

Penetration Testing

Your data is encrypted at rest and in transit using FIPS 140-2, FIPS 197, and FIPS 199 Compliant encryption and encryption systems

Privacy Assessments

We conduct regular audits and third-party penetration tests to maintain compliance and improve Filevine’s overall security posture

Vulnerability Assessments

Filevine’s security team performs Incident Response (IR) and SOC services to identify and quickly respond to security incidents to prevent them from becoming serious security threats

Security Training

Filevine utilized best of breed enterprise grade vulnerability management tools to detect code defects, missing patches, misconfigurations and other system vulnerabilities

Certifications

Filevine utilizes self-healing services including regional redundancy, multiple availability zone, data center and service level redundancies to provide robust and highly available services

Backups

Filevine utilizes self-healing services including regional redundancy, multiple availability zone, data center and service level redundancies to provide robust and highly available services

Disaster Recovery / Business Continuity

Filevine’s security team performs Incident Response (IR) and SOC services to identify and quickly respond to security incidents to prevent them from becoming serious security threats

Incident Response

Filevine utilized best of breed enterprise grade vulnerability management tools to detect code defects, missing patches, misconfigurations and other system vulnerabilities

Our Team Certifications

Compliance

Filevine’s compliance program adheres to the following compliance frameworks:

CJIS Icon

CJIS compliance efforts:

Filevine performs regular audits and adheres to the CJIS security policy 5.9
HIPAA Icon

HIPAA compliance efforts:

Filevine performs regular audits and adheres to the CJIS security policy 5.9

Guidance We Follow

Filevine performs regular audits and adheres to the CJIS security policy 5.9

ABA compliance efforts:

Filevine performs regular audits and adheres to the CJIS security policy 5.9

Where We’re Going

Filevine is continuously monitoring, auditing, pentesting and improving our security posture so we can meet rigorous compliance requirements in the future.

StateRAMP Icon

StateRAMP compliance efforts:

Filevine performs regular audits and adheres to the CJIS security policy 5.9

Why Filevine?

High Availability / System Redundancy

Filevine utilizes self-healing services including regional redundancy, multiple availability zone, data center and service level redundancies to provide robust and highly available services

Multi-Cloud Strong

Filevine services are engineered in a Multi-Cloud environment that leverages the power and security of AWS, Microsoft Azure and Google Cloud

Data Encryption

Your data is encrypted at rest and in transit using FIPS 140-2, FIPS 197, and FIPS 199 Compliant encryption and encryption systems

Regular Security Audits and Penetration Tests

We conduct regular audits and third-party penetration tests to maintain compliance and improve Filevine’s overall security posture

Security Operations Center (SOC)

Filevine’s security team performs Incident Response (IR) and SOC services to identify and quickly respond to security incidents to prevent them from becoming serious security threats

Vulnerability Management

Filevine utilized best of breed enterprise grade vulnerability management tools to detect code defects, missing patches, misconfigurations and other system vulnerabilities

FAQ

Filevine has built a industry leading information security program that adheres to industry standard security frameworks such as the NIST CSF, CJIS and the CIS 20/18. Our program is documented in our information security policies, procedures and operational security practices. We do not share copies of these documents but we do allow customers to review them under NDA.

Talk to one of our awesome reps and learn what we can do together

Get a Demo