Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated iManage Threat Manager Alternatives

iManage Threat Manager Reviews & Product Details

iManage Threat Manager Overview

What is iManage Threat Manager?

iManage Threat Manager helps organizations protect sensitive information from internal and external threat vectors using innovative technology including adaptive behavior modeling and machine learning to continuously monitor, alert and secure critical knowledge work. Threat Manager leverages historical and contextual information in the iManage system to provide faster identification of both external and internal threats, and avoids “false positives” that plague many other approaches. iManage Threat Manager delivers threat detection, monitoring, investigative capabilities, alerts, and reporting to protect sensitive information in your iManage system 24/7 across any device, anywhere. Key Benefits - Advanced technologies detect and neutralize sophisticated attacks - Identify outliers, reduce the risk of a data breach - Streamline forensic Investigation, drive efficiencies - Manage information with better visibility and control - Accelerate compliance by detecting non-filers - Integrates with enterprise IT security stack

iManage Threat Manager Details
Show LessShow More

Seller Details
Seller
iManage
Year Founded
2015
HQ Location
Chicago, Illinois
Twitter
@imanageinc
2,751 Twitter followers
LinkedIn® Page
www.linkedin.com
1,168 employees on LinkedIn®
Description

iManage is the company dedicated to Making Knowledge Work™. Its intelligent, cloud-enabled, secure knowledge work platform enables organizations to uncover and activate the knowledge that exists inside their business content and communications.


KJ
Overview Provided by:

Recent iManage Threat Manager Reviews

Dean M.
DM
Dean M.Mid-Market (51-1000 emp.)
3.5 out of 5
"IManage Security Risk Review"
Being able monitor user's activity as well as anomaly activity
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

iManage Threat Manager Media

Answer a few questions to help the iManage Threat Manager community
Have you used iManage Threat Manager before?
Yes

1 iManage Threat Manager Reviews

3.5 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
1 iManage Threat Manager Reviews
3.5 out of 5
1 iManage Threat Manager Reviews
3.5 out of 5
G2 reviews are authentic and verified.
Dean M.
DM
Senior Application Analyst
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 Gives Campaign
Incentivized Review
What do you like best about iManage Threat Manager?

Being able monitor user's activity as well as anomaly activity Review collected by and hosted on G2.com.

What do you dislike about iManage Threat Manager?

I don't have any dislikes at the moment regarding this software Review collected by and hosted on G2.com.

What problems is iManage Threat Manager solving and how is that benefiting you?

If users are going outside their normal activities we can then be alerted and take appropriate action Review collected by and hosted on G2.com.

There are not enough reviews of iManage Threat Manager for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Cloudflare Application Security and Performance Logo
Cloudflare Application Security and Performance
4.5
(530)
Cloudflare Application Security and Performance solutions provide performance, reliability, and security for all of your web applications and APIs, wherever they are hosted and wherever your users are.
2
Microsoft Defender for Cloud Logo
Microsoft Defender for Cloud
4.4
(302)
Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.
3
Mimecast Advanced Email Security Logo
Mimecast Advanced Email Security
4.4
(296)
Mimecast Email Security with Targeted Threat Protection solution that offers comprehensive, multi-layered email security and content controls.
4
CrowdStrike Falcon Endpoint Protection Platform Logo
CrowdStrike Falcon Endpoint Protection Platform
4.7
(288)
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.
5
Intezer Logo
Intezer
4.5
(192)
Automate your malware analysis. Get answers quickly about any suspicious file, URL, endpoint or memory dump.
6
FortiGate NGFW Logo
FortiGate NGFW
4.7
(175)
FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.
7
ThreatLocker Logo
ThreatLocker
4.8
(255)
Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Schedule a free product demonstration and ThreatLocker will show you how.
8
Resolver Logo
Resolver
4.3
(160)
All implementations include training and advice on the most effective way to manage your processes within the application.
9
Pentera Logo
Pentera
4.5
(137)
Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. For more info visit: pentera.io.
10
Recorded Future Logo
Recorded Future
4.6
(127)
Recorded Future Intelligence Cloud elevates your existing security defenses by enhancing the depth and breadth of protection by giving you insights into threats and attacks before they impact, so you can stay ahead of attackers, at the speed and scale of today’s threat environment.
Show More