Security

Proactive Security to Safeguard What Matters Most

Your clients trust you with some of their most important matters and data. As your practice management platform, our responsibility is to keep this information secure, but our work doesn’t end there. As an end-to-end solution, complete with robust timekeeping, accounting and reporting features, we’re also protecting your bottom line.

As stewards of your data, your reputation and your financial success, we are fanatical about proactive security. Our experienced security team employs state-of-the-art technology to detect, investigate and stop threats before they can impact your firm’s operations.

Here are just a few ways we keep your practice safe 24/7/365:

External Security Audit 

We use automated probing services provided by external security companies to scan every 24 hours for potential vulnerabilities in our applications, systems and networks. We supplement these automated scans with human security experts that employ manual penetration strategies to identify and address latent hazards within both the application and infrastructure layers.

Advanced Encryption

All documents, as well as critical data, is encrypted at rest using a multi-iteration 2048-bit process.  Certain data such as passwords are also protected with a randomly generated cryptographic salt. 

Secure Data Transmission

All data is transmitted from Zola Suite’s servers to your devices via bank-grade TLS encryption that prevents digital eavesdropping by unauthorized parties.

Brute Force Attack Countermeasures

A brute force attack is a trial and error method of guessing different letters and numbers and cycling through them via automated means to gain access to an account. For example, a simple brute-force attack may utilize a dictionary of all words or commonly used passwords and continuously attempt to login with those terms until it successfully guesses the correct password and obtains access. Zola Suite identifies abnormal activities indicative of a brute force attack and undertakes a variety of measures, both at the firewall and application level to prevent unauthorized access to data.

Data Redundancy and Backup

Zola Suite is deployed on the Amazon Web Services (AWS) platform. Documents and data are protected by Identity and Access Management roles within an AWS Region and replicated across Availability Zones (located in different geographic locations within the US) for backup on a daily basis. This means that if some servers go down, the other connecting servers will auto-rollover and your access to your data will be uninterrupted.

Security Policies

We maintain a number of policies designed to protect the integrity and privacy of your data including two-factor authentication for sharing access to new external users, stringent password strength requirements and detailed logging of activities both from infrastructure level as well as within an account.

Infrastructure Certifications

Our infrastructure resides at AWS facilities in the United States which have achieved compliance with an extensive list of global quality and security standards, including ISO 9001, ISO 27001, SOC 1/ISAE 3402, SOC 2, and SOC 3, PCI DSS and HIPAA via Box.com integration.

Ready to supercharge your law practice?