Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Privacy & Compliance

“Meaning-Based” Risk Management Platform for Law Firms Automates Security Functions

Autonomy today unveiled a new, end-to-end, “meaning-based” platform designed to automate many time-consuming tasks law firms must deal with in order to manage documents in electronic form. The Autonomy Risk Management platform leverages Autonomy’s Intelligent Data Operating Layer (IDOL), already deployed today in over 2,000 law firms.

Autonomy today unveiled a new, end-to-end, “meaning-based” platform designed to automate many time-consuming tasks law firms must deal with in order to manage documents in electronic form. The Autonomy Risk Management platform leverages Autonomy’s Intelligent Data Operating Layer (IDOL), already deployed today in over 2,000 law firms.

While the platform’s primary function is related to uncovering conflicts of interest, many of its functions have important implications for security. For example, the platform enables law firms to apply intelligent policies to all forms of communications, including email, social media conversations, and phone and voice recordings, either between attorneys and clients, or between attorneys in the same firm. These policies can be applied in real-time, either at the point of send or when they are archived as part of a comprehensive retention and disposition strategy.

According to Neil Araujo, CEO of Autonomy Protect Legal Systems, the platform can be used to ensure HIPPA compliance by locating and earmarking all the documents related to a particular medical case for encryption. It can also redact specific information, such as social security numbers, from non-structured documents such as memos, reports, e-mail messages and the like.

The firm holds over 170 patents connect with its meaning-based approach to search, which is designed to solve the problem of irrelevant search results by supplying context, so that lawyers looking for information about suits (the legal actions) won’t get results about fashion trends or various types of wool.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...