Bank-Level Security for Legal Professionals
Enterprise-grade security platform with attorney-client privilege protection, comprehensive compliance controls, and flexible deployment options.
Enterprise Self-Hosting
Deploy Jurex on your own infrastructure with complete data sovereignty. Zero access to your data, maximum control for your organization.
- Complete data sovereignty on your infrastructure
- Zero external access to your sensitive legal data
- Full compliance with data residency requirements
- Air-gapped deployment options available
Your Infrastructure
Complete Control
Security Controls
Infrastructure Security
Unique account authentication enforced
The company requires authentication to systems and applications to use unique username and password or authorized Secure Socket Shell (SSH) keys.
Production application access restricted
System access restricted to authorized access only.
Unique network system authentication enforced
The company requires authentication to the "production network" to use unique usernames and passwords or authorized Secure Socket Shell (SSH) keys.
Remote access encrypted enforced
The company's production systems can only be remotely accessed by authorized employees via an approved encrypted connection.
Compliance Certifications & Documentation
Download compliance documents and security assessments for your procurement and legal review processes.
ISO 27001
Information Security
Privacy Framework
Data Protection
Legal Industry Standards
Bar Association Compliance
Security Assessment Report
Latest security controls assessment and compliance documentation
Security Questionnaire
Pre-filled vendor security assessment responses
Security Questions?
Our security team is available to address your specific compliance requirements and provide additional documentation for enterprise procurement processes.