Diversify, diversify, diversify!  That’s what most financial planners will recommend when managing your financial assets.  Why would you do anything different when it comes to managing your firm’s technology portfolio?  The appetite for adoption of the cloud continues to grow, and more and more large firms, boutique practices and corporate legal departments are realizing the…

Read More

Like many things in a secure world, restoring deleted/corrupted files to an Azure VM with encrypted disks is not as straight forward as restoring unencrypted files. File and folder stores are not available and even though you can download the entire virtual hard drive from backup, it is unusable due to the encryption. The encrypted…

Read More

As many firms continue to receive increased security demands from their clients, iManage has created a governance suite of products to help satisfy and surpass these requirements. Security Policy Manager, Threat Manager and Records Manager make up this suite of new products. Today we will take a high-level look at Threat Manager and why it…

Read More

In 2010, I had my first experience working with iManage. I was working for a large Am Law 200 firm that was going through a large multi-office database consolidation and matter centric roll out. Since then, I have continued working with iManage with my most recent experience focusing on new implementations and upgrades. The most…

Read More

Project Impresario A Project Manager understands all the moving parts within a project. From Initiating to Closure, the Project Manager is responsible for disseminating updates to the team and stakeholders. Their ability to identify when tasks should occur and how various pieces fit together is a core necessity for any project. Whether it be resources,…

Read More

I recently had the opportunity to speak at iManage Connect Live 2018.  The presentation called “iManage Work Security 101: What you Need to Know Before Moving to Work 10 or the Cloud” provided a fundamental understanding of iManage security considerations. Here, I will focus on Work 10 best practices in 3 areas: Authentication Communication Encryption…

Read More