Planning your timeline for Threat Manager

Planning your timeline for Threat Manager

Threat Manager is an extremely useful tool for administrators to gain insight into how their iManage content is being used. It allows them to run on-demand reporting targeting individual users, specific groups, or an entire database of users. If you have recently adopted the iManage system, it’s understandable that you’re excited to start utilizing Threat…

Read More

Configuring MFA for applications using Intune

If you want to require your users to use MFA when logging on to an application that uses Azure AD for authentication you can set up an Intune policy. Intune is Microsoft’s mobile device management (MDM) platform, but it also can be used to manage desktops and applications. For instance, if you have iManage Work…

Read More

Don’t Forget Threat Manager When Moving to the iManage Cloud

Many law firms and in-house legal departments obtain consent to move or implement new Document Management Systems in the iManage Cloud. We often find that customers tend to overlook the added benefits of Threat Manager in haste to get a project off the ground. While it’s essential to encrypt your data in transmission and while…

Read More

Top 7 Reasons to Implement Security Policy Manager

iManage Security Policy Manager manages need-to-know access, content segregation, and ethical walls at scale, required to meet today’s security challenges. Featuring an intuitive role-based UI and anywhere, anytime access, iManage Security Policy Manager provides data protection without sacrificing user productivity and system performance.   Central management of matter security for multiple systems SPM agents can…

Read More

Passwords, Passwords, Passwords

A repair, upgrade, or evaluation. Not a week goes by where an engineer at Adaptive Solutions can’t assist by guessing a password, even with customers without a previous business relationship. This isn’t an iManage problem, indeed, it often stems from old systems that are now being upgraded or moved to the Cloud.

Read More

Why you should configure Single Sign-On for iManage

iManage 10.x allows you to configure sign on using SAML or more commonly known as single sign-on (SSO).  SSO is a newer addition to iManage authentication and allows for more secure connectivity to your iManage installation.  Prior to SSO you had the option of either explicit authentication or Active Directory integration.

Read More

How to A.C.E. Your Firm’s Security

Authentication. Communication. Encryption. Information security is fast moving and effects many parts of an organization. The speed of change can make information security fun but can also make it difficult to manage. Cloud services add to the complexity by dramatically changing the security landscape and breaking down the traditional borders protecting our information. As things…

Read More

Spotlight on iManage’s Threat Manager

As many firms continue to receive increased security demands from their clients, iManage has created a governance suite of products to help satisfy and surpass these requirements. Security Policy Manager, Threat Manager and Records Manager make up this suite of new products. Today we will take a high-level look at Threat Manager and why it…

Read More