JND’s data security posture and state-of-the-art technology are key differentiators that strengthen and support all areas of our business. Below are just a few examples of how we bring our policy and technology to bear to provide our clients secure, responsive, best-in-class service.

Secure Data Storage and Transfer

JND’s cloud-based platforms are ISO and SOC 2 certified. All web-based solutions transmit data securely over TLS protocols and all information is protected at rest with AES 256-bit SSL encryption – the same encryption standards used by government agencies and financial institutions.

Proprietary eDiscovery Software

JND has developed several patent-pending eDiscovery software applications. These proprietary solutions allow our internal teams and client partners to work more efficiently and have been proven to improve traditional workflows and produce substantial savings.

QR Matrix Barcodes

JND employs QR codes, which store 50 times more data than traditional 1D barcodes. Standard on all forms, postcards and notices produced by JND, QR codes enable us to automate more processes and thereby reduce costs.


Million Claims Processed Since 2016


Billion Dollars in Distribution Since 2016


Matters Won Since 2016


Hour Responsiveness

Data Security

At JND, protecting the confidentiality, integrity, and availability of your data is of the utmost importance and we go to extraordinary lengths to secure it. Our protective measures include:


  • Defense-in-depth (DiD) approach for layered information security and privacy safeguards
  • Systems and services housed in top-tier data centers
  • NIST-based technical, administrative, and physical controls and information security policies independently reviewed by a third-party
  • SOC 2 and ISO certified solutions
  • Intrusion detection and prevention systems that proactively and automatically block suspicious traffic
  • A security information and event management (SIEM) solution that aggregates data from across the enterprise to deliver security analytics and threat intelligence
  • Advanced threat protection and behavioral analysis software deployed on all endpoints
  • Mature vulnerability and patch management programs
  • Penetration testing and application scanning performed by reputable, independent security firms
  • An awareness program that includes security and privacy training for all staff
  • Compliance with the Gramm-Leach-Bliley Act (GLBA), Health Insurance Portability and Accountability Act (HIPAA), and Federal Information Security Modernization Act (FISMA)
  • Data loss prevention (DLP) tools and role-based access controls (RBAC) to prevent unauthorized access to or disclosure of data, and to maintain strict data integrity and confidentiality
  • Redundant and fault-tolerant systems to provide maximum availability

Development Capabilities

Our development team is well-versed in both web and traditional software development and can utilize open and proprietary source technologies depending on the specific needs of the project.


  • Specializing in ASP .NET, PHP, MVC and JavaScript frameworks
  • Experts in UI and UX design
  • State-of-the-art mobile and responsive technologies
  • Skilled in database optimization and application security
  • Adherence to OWASP and SDLC best practices
  • Peer reviewed code and web application scanning
  • Experience with a wide range of CMS Implementations
  • Managed high availability hosting solutions
  • Best-in-class Cloud implementation and content delivery services

Forensic Acquisition & Analysis

Our solutions enable data acquisition and analysis of hundreds of types of electronic devices including:


  • Mobile devices/smartphones/tablets
  • Email (cloud-based or on-premise)
  • Servers, desktops and laptops
  • Network shares and similar logical storage structures
  • Websites and social media platforms
  • Slack, other short message formats, and collaboration platforms
  • Cloud-based solutions
  • Portable media (USC/CD/DVD) and GPS devices



Request a Proposal

If you are interested in any of our services, you can request a proposal by filling out the fields in this section.