Many law firms and in-house legal departments obtain consent to move or implement new Document Management Systems in the iManage Cloud. We often find that customers tend to overlook the added benefits of Threat Manager in haste to get a project off the ground. While it’s essential to encrypt your data in transmission and while at rest, iManage includes Threat Manager as a core component in both their Professional and Enterprise Cloud subscriptions. Threat Manager is a powerful tool and should not be overlooked at the time of Cloud implementation.

Threat Manager (frequently referred to as TM) elevates security to an entirely new level. By leveraging the long-standing document history built-in to iManage, and marrying this to modern machine learning technologies, TM establishes a behavior pattern for each user and functions as a 24x7x365 real-time security guard against the threat of intellectual property or data breach. Here’s a perfect example. Let’s assume that Joe is a commercial litigation attorney. His normal caseload includes 15-20 matters, and from time to time, Joe will flex outside of his primary practice area to assist other teams. Leveraging document history, Threat Manager establishes a baseline fingerprint for Joe’s behavior and is continuously comparing Joe’s activity against this baseline. Should Joe begin to deviate from his normal work habits, this could indicate that Joe is accessing information in preparation to leave the firm, or worse, perhaps Joe’s user credentials have been compromised and Joe is not Joe, and what’s happening is actually a data breach. Here comes Threat Manager to the rescue! Upon commencement of these types of changes in behavior, TM will detect that Joe is an outlier and will initiate a notification to the appropriate people who can quickly engage and terminate the unwanted access. TM also includes real-time reporting for customers to monitor system access before an event such as above becomes a real issue.

Given that Threat Manage is core to most iManage Cloud subscriptions, it’s truly a no brainer to activate TM as a day-one Cloud component. While Cloud migrations may be classified as significant projects, the time required to activate, configure, and train on the proper use of Threat Manager can often be completed in just a couple of days. And finally, if you’re already in the Cloud and not currently protected by TM, make it a New Year’s resolution to activate Threat Manager to bump up your data system security at little to no cost.