Seamless Integrations

Easy setup process

Real-time data syncing

Custom integrations

WORKS WITH thousands of TOOLS

Open API

Our platform is designed API-first. Every feature you see in the ThoughtRiver Web Applications is powered by the same public APIs available to you. Whether you're building custom workflows, integrations, or entirely new interfaces, you get full access to a consistent, well-documented API surface. We follow the OpenAPI Specification, so you can explore, test, and generate client libraries with ease. Build faster, integrate deeper, and unlock the full power of our platform, your way.

INTEGRATION

Microsoft 365

For a smoother contract review process right in your familiar Office apps.

INTEGRATION

Power BI

Unlock powerful analytics and insights on your contract data.

api

HighQ

Enhance collaboration and contract review within your legal project environment.

api

iManage

Integrate contract review directly in your document workflow.

Your security is our priority

From authentication to data protection, we've got your back. Rest easy with our security infrastructure and policies that keep your contract data secure.

Fully compliant with data security standards

ThoughtRiver is committed to keeping your data secure at all times.

We are ISO27001 certified, which means we adhere to the international standards for information security governance.

Certificate Number 21188-ISMS-001

Data encryption at rest and in transit

All data is encrypted at rest using strong methods. Contract documents and derived data are segregated from other customers and encrypted with a unique key specific to your account.

Data is encrypted in transit using TLS1.2 both for transmission across the internet and internally within our network. A web application firewall protects the services and data with all unnecessary ports blocked.

Data sovereignty

Your data resides within Azure data centers managed and secured by ThoughtRiver, in a single specified region.

We do not use external processors for your data.

Secure authentication

We use a secure Auth0 service for secure authentication, single-sign on and multi-factor authentication.

Only your users’ email addresses are passed to Auth0.

24x7 monitoring

Our security operations center operates 24x7 to monitor the environment and intercept threats. We operate a coordinated incident management process with all of our customers.

Consistent, accurate review - every time

See how AI contract review, real-time analytics and seamless integrations accelerate your team.

Start your free 28-day trial today!