Easy setup process
Real-time data syncing
Custom integrations
Open API
Our platform is designed API-first. Every feature you see in the ThoughtRiver Web Applications is powered by the same public APIs available to you. Whether you're building custom workflows, integrations, or entirely new interfaces, you get full access to a consistent, well-documented API surface. We follow the OpenAPI Specification, so you can explore, test, and generate client libraries with ease. Build faster, integrate deeper, and unlock the full power of our platform, your way.
Microsoft 365
For a smoother contract review process right in your familiar Office apps.
INTEGRATION
Power BI
Unlock powerful analytics and insights on your contract data.
HighQ
Enhance collaboration and contract review within your legal project environment.
iManage
Integrate contract review directly in your document workflow.
From authentication to data protection, we've got your back. Rest easy with our security infrastructure and policies that keep your contract data secure.
Fully compliant with data security standards
ThoughtRiver is committed to keeping your data secure at all times.
We are ISO27001 certified, which means we adhere to the international standards for information security governance.
Certificate Number 21188-ISMS-001
Data encryption at rest and in transit
All data is encrypted at rest using strong methods. Contract documents and derived data are segregated from other customers and encrypted with a unique key specific to your account.
Data is encrypted in transit using TLS1.2 both for transmission across the internet and internally within our network. A web application firewall protects the services and data with all unnecessary ports blocked.
Data sovereignty
Your data resides within Azure data centers managed and secured by ThoughtRiver, in a single specified region.
We do not use external processors for your data.
Secure authentication
We use a secure Auth0 service for secure authentication, single-sign on and multi-factor authentication.
Only your users’ email addresses are passed to Auth0.
24x7 monitoring
Our security operations center operates 24x7 to monitor the environment and intercept threats. We operate a coordinated incident management process with all of our customers.