iManage Threat Manager

Detect and neutralize insider data leaks and cyber threats early

Clients entrust professional services firms with their most privileged information including intellectual property, M&A due diligence, privileged personal information and patents. Many firms have been the targets of high profile phishing attacks, or insider malfeasance, which render the traditional security stack that protects the network perimeter ineffective. This new risk, has increased the focus and urgency around information security and governance at both professional services firms and their clients.

iManage Threat Manager — Protect your sensitive data

iManage Threat Manager is designed to meet the needs of CIOs, CSOs and compliance officers looking for advanced solutions to protect sensitive data. Threat Manager, leverages historical and contextual information in the iManage system to provide faster identification of both external and internal threats, and avoids pitfalls such as “false positives” that plague many other approaches. iManage Threat Manager delivers threat detection, monitoring, investigative capabilities, alerts and reporting to protect sensitive information in your iManage system 24/7 across any device, anywhere.

Threat Manager provides 24/7 continuous threat protection enabling you to
detect and neutralize threats as soon as they manifest themselves

Comply with client regulations

Clients now contractually require firms to demonstrate proper controls to protect sensitive information. It’s not uncommon for clients to audit systems and require notification when malicious behavioral patterns are detected. Regulations now mandate that affected parties be notified from breach discovery. iManage Threat Manager gives you the capabilities to exceed the demands of even the most challenging clients.

Detect threats with the highest levels of accuracy

Traditional approaches attempt to identify threats by analyzing data such as firewall logs, network traffic, endpoint device activity, and files downloaded. These generic approaches lead to high false positive rates and investigation cost. iManage Threat Manager understands the unique context in which professionals operate — practice areas, clients, projects and applies state-ofthe-art machine learning against data with highest value, such as engagements accessed where no time is billed, or matters accessed outside a practitioner’s area of expertise. This ensures that overburdened resources investigate alerts that have the highest probability of being malicious.

Comprehensive forensics, reports and process automation reduce investigation time

Threat Manager provides advanced forensics and granular event reconstruction to ensure rapid detection and investigation of an alert. Rich contextual information like clients, matters, documents… allow you to quickly access the scope of a breach.

Quickly investigate and neutralize threats with built in reports, advanced forensics
and granular event reconstruction

Neutralize threats and prevent data loss

Working under the assumption of a breach is the new norm. Attackers reside within a network for an average of 90 days before being detected. The ability to detect and neutralize a threat early before it escalates to a full blow attack where terabytes of information is compromised is critical. Threat Manager gives you the ability to limit data loss by automatically disabling an account that exhibits malicious behavioral patterns.

Easy to deploy, support and integrate with — available on the cloud or as an appliance (on premises)

Built using modern cloud architecture, Threat Manager seamlessly connects to iManage databases and, optionally, to your time and billing or matter management system to ingest information. Once data ingestion is complete,

Threat Manager automatically starts scanning for malicious behavior. Threat Manager is easy to integrate with your existing information security stack including SIEM tools. Alerts from Threat Manager can be easily pushed out to a SIEM device.

24/7 Continuous threat protection

Once configured Threat Manager scans for threats 24/7 continuously enabling you to detect and neutralize threats as soon as they manifest themselves.

Deploy in the iManage Cloud or on-premises

iManage Threat Manager is available in the iManage Cloud, the first and only cloud service to bring proven technology relied upon by Internet leaders such as Google, Facebook and Twitter. Cloud users benefit with continuous upgrades, zero downtime for maintenance, extensive scalability and sustainable performance from anywhere, integrated analytics to intelligently monitor and protect all data from unauthorized or malicious access, and data encryption for data at rest and in motion using customer managed encryption keys.

Talk to an Expert Download PDF

KEY BENEFITS

  • Detect sophisticated threats from internal or external actors
  • Reduce the risk of data breaches
  • Accelerate time to investigate fraudulent behavior
  • Reduce false positives, ensuring that precious resources are spent on the alerts that are most likely to be fraudulent

SUPPORTED SYSTEMS:

  • iManage Work
  • iManage Records Manager
  • Network file shares
  • Time entry systems
  • Agent framework is available for third party integrators

IMANAGE WORK PRODUCT MANAGEMENT

Document + Email Management

RAVN Artificial Intelligence

  • iManage Extract: Automatic extraction of critical business information from large volumes of documents and unstructured data sets
  • iManage Insight: Enterprise content search and analysis
  • iManage Classify: Intelligent categorization of large volumes of business data

Security + Information Governance