Security Policy Manager

Secure critical content across multiple repositories with need-to-know security access, without affecting productivity or performance.

Secure and protect sensitive information

iManage Security Policy Manager allows organizations to enforce need-to-know security and information barriers at scale to meet the growing needs of client, regulatory, and company obligations without sacrificing user productivity and system performance from an intuitive, role-based interface with anywhere, anytime access.

icon

Minimize organizational risk

Segmenting critical content helps minimize the impact of a cyber breach by limiting data exposure.

icon

Eliminate performance issues

Security updates applied efficiently to remove challenges associated with administrating policies at scale.

 

icon

Easy to understand

Client, project, or matter centricity removes the need to interpret overlapping information barriers.

icon

Control access, anywhere and anytime

The intuitive role-based interface ensures security policies can be managed and monitored on any device from any location.

icon

Secure knowledge curation

Granular and flexible policy models foster knowledge innovation whilst respecting company security mandates.

icon

Remove process bottlenecks

Reduce the burden on IT and risk teams by delegating security policy management to authorized users.

Learn more

Read more about how your organization can implement secure access controls with Security Policy Manager. 

Key Features

  • Security and governance built into the fabric of the knowledge platform to protect all content.

  • Extensible REST API and agent framework broadens the reach of Security Policy Manager to support new systems.

  • Options allow assistants to follow timekeepers to enable automatic enforcement of access rights and exclusions.

  • Visual cues in iManage Work and Records Manager clients clearly indicate security policies, eliminating access ambiguity.

  • The end-user console allows knowledge workers an "at-a-glance" view of the highly sensitive projects they are authorized to work on.

  • Email policies defined in Security Policy Manager can be enforced by partner products.

Benefits 

Seamless platform integration

Single vendor solution that delivers comprehensive security to meet increasing demands:

  • Establish, adjust, and remove security policies without access control cascades, document re-files, or content re-indexing.
  • Search large workspaces without impacting performance.

Adaptable access requests

Granular and flexible access controls to suit any request:

  • Configurable to follow Outside Counsel Guidelines (OCG) or company mandates.
  • Access after reviewing by authorized users.
  • Break-Glass – instant access granted for a limited time.

Comprehensive security framework

Deploy “need-to-know” policies to secure information by department, function, project, or matter

  • Delegation removes central IT and service desk bottlenecks.
  • Self-maintaining rules help automate processes.
  • Collections allow grouping using descriptive metadata tags.

Powerful reporting drives compliance

Extensive auditing and reporting capability to satisfy the most stringent request

  • Automatically generated for any given date range.
  • Removes uncertainty with no back-door unaudited access to content.
  • Market Abuse Regulation (MAR) compatible insider reports.

Learn more

Watch this video series showing how to handle a new lateral, securing a client, and securing a highly sensitive matter using iManage Security Policy Manager.

Back Next

Using iManage Security Policy Manager

1. Departmental Security

2. Securing a Client

3. Securing a Highly Sensitive Matter

4. Handling a new lateral

Using iManage Security Policy Manager

1. Departmental Security

2. Securing a Client

3. Securing a Highly Sensitive Matter

4. Handling a new lateral

Using iManage Security Policy Manager

1. Departmental Security

2. Securing a Client

3. Securing a Highly Sensitive Matter

4. Handling a new lateral

Using iManage Security Policy Manager

1. Departmental Security

2. Securing a Client

3. Securing a Highly Sensitive Matter

4. Handling a new lateral

Let us show you how

Request a demo to let us show you how iManage can help you create a secure central place for collaboration so you can activate your knowledge with confidence.  

Related Content

Press Release

Texas law firm improves governance with iManage Cloud

Ease of use, industry leading uptime and integrated platform key factors in iManage choice.

20 August 2020
Press Release

iManage introduces iManage tracker, the industry's first matter-centric task and checklist management system

Tracker enhances visibility into and coordination across knowledge work.

23 June 2020
Press Release

Fast-growing UK law firm Thirsk Winton uses iManage platform to enhance governance and security

Rollout of cutting-edge products from iManage allows firm to continue building on the advantages of iManage Cloud.

22 June 2020