Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Leah, formerly ContractPodAi, provides agentic AI solutions that harmonize workflows, empower teams, and unleash enterprise potential through automation and domain expertise across legal, procurement, finance, and beyond.
Leah Legal streamlines legal processes with: AI-driven drafting, guided review, redlining, multi-document data extraction, intelligent repository search, real-time analytics, and an always-available legal helpdesk.
Teams get processing efficiencies, clearer insights, and immediate access to accurate legal information, reducing effort, improving consistency, and enabling smarter, more efficient decision-making across the organization.
Leah Agentic CLM unifies the entire contract lifecycle into one intelligent solution bringing together AI-powered authoring, automated workflows, advanced search, dynamic analytics, smart repository management, and conversational legal assistance.
Teams gain end-to-end visibility, faster creation and review cycles, structured governance, and real-time insights. With integrated dashboards, automated redlining, intelligent task management, and centralized data, organizations work more efficiently, reduce risk, and make decisions with clarity and confidence.
Leah Agentic OS is an enterprise operating system that enables organizations to design, deploy, and govern intelligent AI agents across the business. Leah Agentic OS gives enterprises the infrastructure to move beyond basic automation by powering agents that reason, decide, and act across departments like Legal, Finance, Procurement, HR, IT, and more.
Description
WikiLocks works in the same way as you do. It works within your most used applications. Select the data you wish protect, then assign access to individuals and groups. Finally, distribute the newly protected document. No matter how the document is accessed, copied or pasted, protection will continue to follow it throughout its lifecycle.
API Access
Has API
API Access
Has API
Screenshots View All
No images available
Integrations
Adobe Marketo Engage
Asana
Docusign
Google Calendar
Google Docs
Lever
Mailchimp
Microsoft OneDrive
Microsoft Power BI
Microsoft Teams
Integrations
Adobe Marketo Engage
Asana
Docusign
Google Calendar
Google Docs
Lever
Mailchimp
Microsoft OneDrive
Microsoft Power BI
Microsoft Teams
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$40
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Leah
Founded
2015
Country
United Kingdom
Website
leahai.com
Vendor Details
Company Name
WikiLocks
Founded
2013
Country
United States
Website
www.wikilocks.com
Product Features
Contract Management
Buy Side (Suppliers)
Completion Tracking
Compliance Tracking
Contract Lifecycle Management
Electronic Signature
Full Text Search
Government Contracts
Pre-built Templates
Sell Side (Customers)
Specialty Contracts
Version Control
Workflow Management
Digital Signature
Audit Trail
Authentication
Auto Reminders
Customizable Templates
Document Analytics
Mobile Signature
Multi-Party Signing
Progress Tracking
Task Progress Tracking
eDiscovery
Case Analytics
Compliance Management
Discussion Threads
Document Indexing
Document Tracking
Full Text Extraction
Keyword Search
Metadata Extraction
Topic Clustering
Legal Document Management
Access Controls
Archiving & Retention
Collaboration
Contract Management
Document Assembly
Document Indexing
Document Tagging
Full Text Search
Version Control
Product Features
Court Management
Administrative Hearings
Appeal Boards
Calendar Management
Case History
Collections Management
Court Cost Records
Defendant Records
Docket Management
Document Imaging
Fines Management
Jury Management
Subpoena Tracking
Warrant Tracking
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Data Management
Customer Data
Data Analysis
Data Capture
Data Integration
Data Migration
Data Quality Control
Data Security
Information Governance
Master Data Management
Match & Merge
Digital Rights Management
Access Revocation
Audio / Video Protection
Distribution Management
Expiration Management
Image Protection
License Management
Location Control
PDF Protection
Software Application Protection
Subscription Management
Usage Tracking / Analytics
Watermarking
eDiscovery
Case Analytics
Compliance Management
Discussion Threads
Document Indexing
Document Tracking
Full Text Extraction
Keyword Search
Metadata Extraction
Topic Clustering
Email Security
Anti Spam
Anti Virus
Email Attachment Protection
Encryption
Policy Management
Quarantine
Reporting/Analytics
Whitelisting / Blacklisting
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Legal Case Management
Billing Management
Calendar Management
Case Notes
Client Management
Communication Tracking
Conflict Management
Corporations
Court Management
Discovery Management
Docket Management
Document Management
Expense Tracking
Government
Law Firms
Records Management
Task Management
Time Tracking
Trust Accounting
Legal Document Management
Access Controls
Archiving & Retention
Collaboration
Contract Management
Document Assembly
Document Indexing
Document Tagging
Full Text Search
Version Control
Privileged Access Management
Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring