Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Curtain LogTrace File Activity Monitoring Reviews & Ratings
    4 Ratings
    Company Website
  • SOCRadar Extended Threat Intelligence Reviews & Ratings
    104 Ratings
    Company Website
  • Curtain MonGuard Screen Watermark Reviews & Ratings
    7 Ratings
    Company Website
  • LogicalDOC Reviews & Ratings
    142 Ratings
    Company Website
  • Safetica Reviews & Ratings
    414 Ratings
    Company Website
  • UnForm Reviews & Ratings
    19 Ratings
    Company Website
  • Interfacing Integrated Management System (IMS) Reviews & Ratings
    66 Ratings
    Company Website
  • isoTracker Quality Management Reviews & Ratings
    19 Ratings
    Company Website
  • SBS Quality Management Software Reviews & Ratings
    7 Ratings
    Company Website
  • Intelex Reviews & Ratings
    165 Ratings
    Company Website

What is LeaksID?

Protect your most sensitive documents with an undetectable fingerprint to thwart unauthorized access during printing or photography. This groundbreaking method facilitates quick identification of where the leak originated. LeaksID is a cloud-based service that utilizes a unique algorithm to incorporate an unseen marker into documents when securely sharing them with external entities. If a printout or photo of a confidential document is made public, you will be able to identify the individual accountable for the leak. Determining the source of a leak can be challenging, especially when sharing with trusted friends or family members. Even with rigorous user permissions or password-secured files, there is always the risk that someone might take a snapshot of your screen inadvertently. With LeaksID, you can seamlessly continue your regular workflow while improving your document oversight, allowing for precise leak detection within minutes. This enhanced level of oversight delivers reassurance, ensuring your delicate information is significantly more safeguarded against possible breaches, while also allowing for a more proactive approach to information security.

What is GAT?

Implementing robust security solutions is crucial for countering threats arising from technological advances, personnel issues, and operational processes. By diligently managing your Security Program, you can significantly reduce the risk of falling prey to attacks, ransomware, data breaches, and challenges linked to third-party partnerships. These cohesive solutions aim to facilitate the creation and continuous oversight of an Information Security Management System (SGSI), maintaining alignment with core business objectives. Moreover, they allow for the automated identification of vulnerabilities within cloud infrastructures, thus decreasing the chances of ransomware incidents, data leaks, intrusions, and other cyber risks. It's essential to evaluate not only your own vulnerabilities but also those of your external collaborators to grasp the full scope of risk exposure. Risk assessments are integral, providing insights into potential leaks and weaknesses across various applications, networks, and infrastructure, which are essential for making well-informed decisions. Additionally, these collaborative strategies encompass detailed reports and dashboards that convey information clearly, promoting effective communication and knowledge sharing throughout the organization. By improving visibility and comprehension of security statuses, companies can enhance their strategic decision-making processes and strengthen their overall security posture. Ultimately, a proactive approach to security can lead to a more resilient and secure operational environment.

Media

Media

Integrations Supported

Arachni
Burp Suite
Jira Service Management
Nessus
OpenVAS
Qualys TruRisk Platform
Strobes RBVM
Tenable One

Integrations Supported

Arachni
Burp Suite
Jira Service Management
Nessus
OpenVAS
Qualys TruRisk Platform
Strobes RBVM
Tenable One

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

G-71

Company Location

United States

Company Website

leaksid.com

Company Facts

Organization Name

GAT InfoSec

Date Founded

2011

Company Location

Brazil

Company Website

www.gat.digital/

Categories and Features

Document Control

Archiving & Retention
Automated Routing
Change Management
Compliance Management
Electronic Signature
Escalation Management
Periodic Review
Version Control

Categories and Features

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Popular Alternatives

Imatag Reviews & Ratings

Imatag

IMATAG

Popular Alternatives

Code42 Incydr Reviews & Ratings

Code42 Incydr

Mimecast
BitSight Reviews & Ratings

BitSight

Bitsight