Security Consulting

How to A.C.E. Your Firm’s Security

Authentication. Communication. Encryption. Information security is fast moving and effects many parts of an organization. The speed of change can make information security fun but can also make it difficult to manage. Cloud services add to the complexity by dramatically changing the security landscape and breaking down the traditional borders protecting our information. As things…

Read More

Spotlight on iManage’s Threat Manager

As many firms continue to receive increased security demands from their clients, iManage has created a governance suite of products to help satisfy and surpass these requirements. Security Policy Manager, Threat Manager and Records Manager make up this suite of new products. Today we will take a high-level look at Threat Manager and why it…

Read More

How to "ACE" Your Migration to iManage Work 10

I recently had the opportunity to speak at iManage Connect Live 2018.  The presentation called “iManage Work Security 101: What you Need to Know Before Moving to Work 10 or the Cloud” provided a fundamental understanding of iManage security considerations. Here, I will focus on Work 10 best practices in 3 areas: Authentication Communication Encryption…

Read More