Reward for good Nextpoint reviews

Nextpoint Q&A

How do I exchange evidence with third parties, like clients or co-counsel?

Nextpoint exchange is completely secure, completely electronic, and is included in our litigation services. Step 1: Create a single, secure database for producing and exchanging evidence in litigation. Step 2: Send an email to clients, co-counsel...

G2 User in Computer Software asked almost 3 years ago
How do I update the application?

There's no need. Because our software is cloud-based, when we deploy an update, it's instantly available for all users at no additional cost.

G2 User in Computer Software asked almost 3 years ago
Can I limit what users can see and do?

The Nextpoint platform has powerful user controls built in. In addition, the Analytics dashboard tracks reviewer productivity and helps move reviews forward.

G2 User in Computer Software asked almost 3 years ago
Are there any system requirements?

You need a computer or device with an up-to-date web browser. (Chrome, Safari, Explorer 9 or later recommended.)

G2 User in Computer Software asked almost 3 years ago
How can I control who is able to access sensitive data in Nextpoint?

We insist on the strongest passwords, two-factor authentication, and device authentication. Administrators can set up differentiated access levels for unique users, providing control over what individual users can do in the application. Every use of th...

G2 User in Computer Software asked almost 3 years ago
How do I know my data is secure?

Nextpoint provides high-grade SSL encryption certificates (AES-256, 256-bit keys) in all stages of transmission and storage. The Amazon Incident Management team employs industry-standard diagnostic procedures to drive resolution during business-impacti...

G2 User in Computer Software asked almost 3 years ago
Where are my documents stored?

Data is stored inside Amazon Web Services facilities, the same data centers trusted by the NSA and all 17 agencies of the U.S. intelligence community. Physical access is strictly controlled both at the perimeter and building ingress points by profes...

G2 User in Computer Software asked almost 3 years ago