Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Curtain MonGuard Screen Watermark Reviews & Ratings
    7 Ratings
    Company Website
  • Air Reviews & Ratings
    576 Ratings
    Company Website
  • Red Points Reviews & Ratings
    44 Ratings
    Company Website
  • Birdeye Reviews & Ratings
    4,121 Ratings
    Company Website
  • Lenso.ai Reviews & Ratings
    2 Ratings
    Company Website
  • Safetica Reviews & Ratings
    356 Ratings
    Company Website
  • Borealis Reviews & Ratings
    8 Ratings
    Company Website
  • Comet Backup Reviews & Ratings
    224 Ratings
    Company Website
  • ThreatLocker Reviews & Ratings
    464 Ratings
    Company Website
  • Guardz Reviews & Ratings
    56 Ratings
    Company Website

What is Imatag?

IMATAG provides robust protection for your visual content online, including brand and product images, licensed materials, and confidential files. Utilizing its patented Invisible Watermark technology, IMATAG offers two distinct solutions: IMATAG Leaks, which is the pioneering tool for detecting photo or video leaks, and IMATAG MONITOR, known for its reliability in tracking the online usage of your visual assets. The software embeds an imperceptible identifier within each pixel of images and videos, enabling you to identify your content regardless of alterations such as resizing, cropping, or sharing on social media. Additionally, it serves as a means to trace the origin of any leaks, ensuring that your content remains secure. IMATAG supports various formats, including photographs, renders, videos, and PDFs, and is available as a Software as a Service (SaaS) via API or Web UI, or as a traditional on-premise installation. With these features, IMATAG not only safeguards your content but also enhances your ability to monitor its use across different platforms effectively.

What is Humming Heads?

To prevent attacks, it is crucial to protect all authorized activities and guarantee that any compromised data stays unreadable, achieving this in a smooth and dependable manner. The Shinobi Defense System (SDS) allows you to focus your endpoint security efforts on manageable areas instead of constantly chasing the latest malware threats or trying to train users on security protocols. For the first time in the United States, SDS presents a unique and integrated suite of proven technologies. It delivers discreet protection against the three primary and prevalent endpoint security issues that can result in financial damage to organizations. By combining DeepWhite, an effective whitelist-based defense technology, with Evolution DLP, a fully automated and seamless data loss prevention system, SDS forms a unified framework driven by our cutting-edge Active Intercept engine and the Shinobi Forensics logging and reporting platform. This holistic strategy guarantees that any leaked or compromised files are automatically made unreadable, eliminating the need for user rules or interactions and streamlining security management. With SDS, businesses can maintain robust data protection while alleviating the pressure on their staff, fostering a secure environment. Additionally, this enables organizations to allocate their resources more efficiently, allowing them to focus on growth and innovation without compromising security.

Media

Media

Integrations Supported

Scrile Connect
Wedia

Integrations Supported

Scrile Connect
Wedia

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

IMATAG

Date Founded

2015

Company Location

France

Company Website

www.imatag.com

Company Facts

Organization Name

Humming Heads

Date Founded

1999

Company Location

Japan

Company Website

www.hummingheads.co.jp/english/index.html

Categories and Features

Brand Protection

Case Management
Domain Monitoring
Investigation Management
Marketplace Monitoring
Mobile App Monitoring
Paid Search Monitoring
Prioritization
Social Media Monitoring

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Digital Rights Management

Access Revocation
Audio / Video Protection
Distribution Management
Expiration Management
Image Protection
License Management
Location Control
PDF Protection
Software Application Protection
Subscription Management
Usage Tracking / Analytics
Watermarking

Public Relations

Article Author Database
Auto-Update Media Lists
Campaign Management
Clippings Management
Communications Calendar
Contact Management
Digital Asset Management
Direct Mail Management
Email Distribution
Press Monitoring
Press Release Builder

Reputation Management

Campaign Management
Gamification
Response Management
Review Generation
Review Monitoring
Sentiment Analysis
Social Media Metrics
Social Media Monitoring
White Label

Visual Search

Barcode Recognition
Catalog Management
Customer Activity Tracking
Filtering
IP Protection
Image Tagging
Mobile App
Optical Character Recognition
Product Recommendations
Product Search
Reverse Image Search
Video Search

Categories and Features

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Popular Alternatives

Popular Alternatives