iManage Threat Manager
Detect and neutralize insider data leaks and cyber threats early
Clients entrust professional services firms with their most privileged information including intellectual property, M&A due diligence, privileged personal information and patents. Many firms have been the targets of high profile phishing attacks, or insider malfeasance, which render the traditional security stack that protects the network perimeter ineffective. This new risk, has increased the focus and urgency around information security and governance at both professional services firms and their clients.
iManage Threat Manager — Protect your sensitive data
iManage Threat Manager is designed to meet the needs of CIOs, CSOs and compliance officers looking for advanced solutions to protect sensitive data. Threat Manager, leverages historical and contextual information in the iManage system to provide faster identification of both external and internal threats, and avoids pitfalls such as “false positives” that plague many other approaches. iManage Threat Manager delivers threat detection, monitoring, investigative capabilities, alerts and reporting to protect sensitive information in your iManage system 24/7 across any device, anywhere.
Comply with client regulations
Clients now contractually require firms to demonstrate proper controls to protect sensitive information. It’s not uncommon for clients to audit systems and require notification when malicious behavioral patterns are detected. Regulations now mandate that affected parties be notified from breach discovery. iManage Threat Manager gives you the capabilities to exceed the demands of even the most challenging clients.
Detect threats with the highest levels of accuracy
Traditional approaches attempt to identify threats by analyzing data such as firewall logs, network traffic, endpoint device activity, and files downloaded. These generic approaches lead to high false positive rates and investigation cost. iManage Threat Manager understands the unique context in which professionals operate — practice areas, clients, projects and applies state-ofthe-art machine learning against data with highest value, such as engagements accessed where no time is billed, or matters accessed outside a practitioner’s area of expertise. This ensures that overburdened resources investigate alerts that have the highest probability of being malicious.
Comprehensive forensics, reports and process automation reduce investigation time
Threat Manager provides advanced forensics and granular event reconstruction to ensure rapid detection and investigation of an alert. Rich contextual information like clients, matters, documents… allow you to quickly access the scope of a breach.
Neutralize threats and prevent data loss
Working under the assumption of a breach is the new norm. Attackers reside within a network for an average of 90 days before being detected. The ability to detect and neutralize a threat early before it escalates to a full blow attack where terabytes of information is compromised is critical. Threat Manager gives you the ability to limit data loss by automatically disabling an account that exhibits malicious behavioral patterns.
Easy to deploy, support and integrate with — available on the cloud or as an appliance (on premises)
Built using modern cloud architecture, Threat Manager seamlessly connects to iManage databases and, optionally, to your time and billing or matter management system to ingest information. Once data ingestion is complete,
Threat Manager automatically starts scanning for malicious behavior. Threat Manager is easy to integrate with your existing information security stack including SIEM tools. Alerts from Threat Manager can be easily pushed out to a SIEM device.
24/7 Continuous threat protection
Once configured Threat Manager scans for threats 24/7 continuously enabling you to detect and neutralize threats as soon as they manifest themselves.
Deploy in the iManage Cloud or on-premises
iManage Threat Manager is available in the iManage Cloud, the first and only cloud service to bring proven technology relied upon by Internet leaders such as Google, Facebook and Twitter. Cloud users benefit with continuous upgrades, zero downtime for maintenance, extensive scalability and sustainable performance from anywhere, integrated analytics to intelligently monitor and protect all data from unauthorized or malicious access, and data encryption for data at rest and in motion using customer managed encryption keys.