Press Announcement | 29th January 2026
Leading legal technology provider Tiger Eye, dedicated to Harnessing Knowledge and Unleashing Potential, has announced a new security feature for Tiger Eye Blueprint, the firm’s flagship knowledge management platform. This platform enhancement enables law firms and corporate legal departments to provide advanced protection for sensitive knowledge assets, supporting organisation-wide knowledge governance.
The new development enables users of the Tiger Eye Blueprint platform to extend existing security policies set within iManage to their knowledge database. Using the feature, access policies set and managed by either iManage’s Security Policy Manager product (or default security or Access-control lists) can be expanded to protect assets stored within the independent Tiger Eye Blueprint knowledge library, ensuring robust, consistent knowledge access limits across systems.
Knowledge resources can be restricted for a wide range of purposes, including to ensure compliance with company policies and client requirements. Equally, knowledge access can be restricted to address common challenges within law firms or corporate legal teams, such as managing conflicts of interest, or limiting knowledge access beyond specific user groups (or departments).
Sam Hudson, Chief Growth Officer at Tiger Eye, added:
“Tiger Eye Blueprint was first launched nearly ten years ago and over the last decade, the way knowledge is managed, accessed and governed has changed significantly – and it continues to constantly evolve. Because of this, we continue to adapt and enhance our knowledge platform to meet the needs of law firms and knowledge teams.
Although Blueprint was built with the ethos of enabling open, company-wide knowledge sharing, we acknowledge that with increasing client demands and security measures, some firms are now looking to lock down sensitive content across all systems, including their knowledge databases. Blueprint’s new legal knowledge governance feature is specifically designed to support this process and help firms to find the right balance between knowledge access and information security.”