Best Legal Software for Linux of 2024

Find and compare the best Legal software for Linux in 2024

Use the comparison tool below to compare the top Legal software for Linux on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    IBM InfoSphere Optim Data Privacy Reviews
    IBM InfoSphere®, Optim™, Data Privacy offers extensive capabilities to mask sensitive data in non-production environments such as development, testing, QA, or training. This single offering offers a variety transformation techniques that can replace sensitive information with fully functional, functionally masked data. Substrings, arithmetic, sequential or random number generation, date ageing, and concatenation are all examples of masking techniques. The context-aware masking capabilities allow data to be retained in a similar format as the original. Apply a range of masking techniques on-demand to transform personally-identifying information and confidential corporate data in applications, databases and reports. Data masking tools can be used to prevent misuse of information. They allow you to mask, obfuscate, and privatize personal information that is distributed across non-production environments.
  • 2
    SeaCat Reviews
    Cyber-security and data privacy platform to protect mobile and IoT apps. The app can be built and operated without any cyber-security incidents. SeaCat is a cyber security platform that was developed by experts. It includes all the data privacy and cyber-security must-haves. SeaCat deployment is easy and straightforward. SeaCat instantly increases your security level without the need for custom development. The user experience should not be compromised by cyber-security. SeaCat does not require any complicated configurations or procedures from the user. SeaCat uses all the latest cyber-security features such as biometrical authorization and hardware security modules. SeaCat's cyber-security platform consists a SeaCat SDK, which is to be added into a mobile or IoT app, the SeaCat Gateway, which is to be installed in the demilitarized area (DMZ) in front the application backend server, and SeaCat PKI, which is a service that provides access, enrolment, and identity management.
  • 3
    Tumult Analytics Reviews
    Built and maintained by a group of differential privacy experts and used in production at institutions such as the U.S. Census Bureau. Spark-based and supports input tables with billions of rows. Supports an ever-growing number of aggregation operators, data transformation operators and privacy definitions. Perform public and privacy joins, filters or user-defined function on your data. Calculate counts, sums and quantiles under multiple privacy models. Our simple tutorials and extensive documentation make it easy to differentiate privacy. Tumult Analytics was built on Tumult Core - our sophisticated privacy foundation. Tumult Core mediates access to sensitive information and means that each program and application has an embedded proof of security. Composed of small, easily-reviewable components. Stability tracking and floating point primitives that are proven to be safe. Generic framework based on peer reviewed research.
  • 4
    NMTY Enterprise Reviews
    NMTY Enterprise protects all privacy-sensitive data in your organization, whether it is stored on databases or files. NMTY Enterprise can be integrated into your IT environment to anonymize data sources. NMTY Enterprise allows you to anonymize data, regardless of the format it is stored in. This includes databases and individual files. Anonymize data in a database, or in files such as CSV or XML. Data is anonymized at the source. This prevents duplicates of non-anonymized information. The connections to your data sources are encrypted and support integrated authentication. It is possible to directly anonymize images and documents. Our solutions are based on the most recent innovations and can be integrated directly into your processes. We can always expect the best results.
  • 5
    PK Protect Reviews
    Automate the DSAR response to meet requirements faster, and within budget. Find data that should be archived, or deleted legally due to age or inactivity. Create rules to delete or redact sensitive information as soon as they are found. Monitoring allows you to detect and confirm breaches, and then accurately estimate the impact of the breach. Enable pseudonymization and anonymization of private personal information. Monitor endpoints, enterprise solutions, and servers for privacy data. Organizations must keep up with the constantly changing privacy landscape and protect any personally identifiable information that they interact with. PK Privacy allows organizations to automate data discovery, reporting and other mechanisms to reduce the operational complexity of privacy legislation. Once PK Privacy has discovered data, it can automatically encrypt or mask personal information, redact it, delete it, or perform other remedial actions.
  • 6
    PermitCity Reviews

    PermitCity

    PermitSoft

    $10000.00/one-time
    PermitSoft has developed web-based software solutions that allow municipalities to better manage their operations. Our software offers essential tools to improve productivity and manage administrative operations, from licensing and permitting to inspections and work-orders. PermitSoft applications, built on solid technology, are not only the most advanced of their kind, but are also extremely secure, compatible, easy-to-use, and simple to use. PermitSoft is proud that PermitCity Enterprise offers a complete suite of products, and PermitCity ONE is an entry-level software with full expandability. PermitSoft is constantly innovating and incorporating innovative technologies that improve products and wisely adapt to future needs.
  • 7
    Aderant BillBlast Reviews
    BillBlast, Aderant's legal billing software, is the best choice for top international law firms. You can take control of outside council compliance and legal electronic billing submissions by centralizing multiple client spend management platforms and simplifying them into one legal eBilling system. BillBlast empowers law companies to increase productivity, profitability, and speed up the process of acceptance and payment.
  • 8
    Aderant Drive Reviews
    Aderant Drive allows data-rich law firms to create client portals that allow them and their clients to interact with information in a secure environment. Drive uses existing technology from the firm and the security protocols offered by Office 365 to manage extranets. This removes the technical hurdles of creating and managing extranets for law firms and improves client service with greater responsiveness, transparency and value.
  • 9
    Aderant Handshake Reviews
    Aderant Handshake has over 40 business system integrations. This eliminates the need for you to search through multiple locations and systems for data. Handshake simplifies collaboration and sharing within your company by providing both fully customizable and pre-built platforms that aggregate data into a single, easy-to use and searchable application. You can create personalized dashboards wherever your users want to work, including SharePoint, Expert Assistant Professional and Microsoft Teams.
  • 10
    Aderant Expert Case Reviews
    Aderant Expert Case, a web-based Case Management Solution, is fully adaptable and flexible. It centralizes all of your cases and matters into one place so that your users have access to the relevant information. Case provides a central workspace that allows your users to work efficiently and automates other tasks such as document creation. This reduces the risk for your company missing an important deadline.