Webinars

With less than 50% of home movers only obtaining a single conveyancing quote, providing details quickly as possible is key to winning new business. The integration between InfoTrack & Perfect Portal will show you how to harness the power of these two systems to increase your firm's profitability. In this webinar we will discuss how to: 

This Autumn, Perfect Portal will launch the integration with Tikit Partner for Windows (P4W), allowing P4W users to benefit from the below features. Firms can capture their prospective clients using Perfect Portal to generate a quote. When the client has accepted the quote and instructed the firm, the matter then will be automatically created in P4W.

Attend this webinar to learn about our new integration with Tikit P4W and how you can take advantage of the two systems. 

There are two big considerations you need to tackle – one is dealing with the human and operational factors. The other is the nuances of the technology setup. We’re going to show you how to manage both and get your DR where it needs to be.

First, how to get the organisation to agree on the objectives of the project, the recovery goals and what’s in scope. Second, we’ll show you the exact steps to setup your technology, including installation, data transfer and connectivity considerations.

Aderant is hosting a webinar with VP of Knowledge Management, Glenn LaForce, on harnessing KM.

Join us on Tuesday, July 24 at 2PM ET/11AM PT to learn about Handshake Connect and how storing your firm’s data in a singular location can create a more efficient and effective law firm.

Glenn will highlight the following features:

  • Dynamic Centricities (user, client, matter)
  • Persona-driven pages
  • Polished User Experience based around lawyer tasks
  • Full out of the box intranet

If you’re an administrator in charge of iManage; moving to Work 10; or are already using Work 10, please join our webinar on how Workshare Compare is going to be relevant.

There’s lots to cover, and we want to make sure you have time for questions, so we’re running a 45min session.

You will learn:

If you’re an administrator in charge of iManage; moving to Work 10; or are already using Work 10, please join our webinar on how Workshare Compare is going to be relevant.

There’s lots to cover, and we want to make sure you have time for questions, so we’re running two 45min sessions.

In this first session, you will learn:

Law firms remain a top target for cyber-criminals given the wealth of sensitive data stored on their networks. A staggering 62% of top UK law firms reported a security breach according to PWC’s Annual Law Firms’ Survey 2017, putting confidential client and firm data at risk. Such breaches can be highly disruptive to daily business operations and damaging to firm reputation, as client confidence is left shattered.

Expense management technology continues to see major advancements in innovation which both ease the expense submission process for business travelers, as well as providing critical information for businesses to make smarter planning decisions for cost control and business planning.

Invoice processing can be problematic, especially for organizations still using manual processing. Invoices can be lost, approval requests forgotten and vendors paid twice - or not at all. Streamlined invoice processing can strengthen an organization's finances and operations: the most efficient AP teams focus on strategic tasks, eliminate the likelihood of late payment penalties and enable their organizations to take advantage of early payment discounts.

In today's changing regulatory and investor landscape, Information Security Plans are critical for alternative investment management firms to comply with SEC regulations, due diligence requests and state laws.

Please join us on Wednesday, June 6th to hear from Matt Donahue, Business Continuity Consultant and Steve Banda, Senior Product Manager from Eze Castle Integration to learn:

  • What is an Information Security Plan?
  • Why is it necessary to have an Information Security Plan?
  • What are 9 steps to create an Information Security Plan?

 

Syndicate content