Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Curtain LogTrace File Activity Monitoring Reviews & Ratings
    4 Ratings
    Company Website
  • SOCRadar Extended Threat Intelligence Reviews & Ratings
    104 Ratings
    Company Website
  • Curtain MonGuard Screen Watermark Reviews & Ratings
    7 Ratings
    Company Website
  • LogicalDOC Reviews & Ratings
    142 Ratings
    Company Website
  • Safetica Reviews & Ratings
    414 Ratings
    Company Website
  • UnForm Reviews & Ratings
    19 Ratings
    Company Website
  • Interfacing Integrated Management System (IMS) Reviews & Ratings
    66 Ratings
    Company Website
  • isoTracker Quality Management Reviews & Ratings
    19 Ratings
    Company Website
  • SBS Quality Management Software Reviews & Ratings
    7 Ratings
    Company Website
  • Intelex Reviews & Ratings
    165 Ratings
    Company Website

What is LeaksID?

Protect your most sensitive documents with an undetectable fingerprint to thwart unauthorized access during printing or photography. This groundbreaking method facilitates quick identification of where the leak originated. LeaksID is a cloud-based service that utilizes a unique algorithm to incorporate an unseen marker into documents when securely sharing them with external entities. If a printout or photo of a confidential document is made public, you will be able to identify the individual accountable for the leak. Determining the source of a leak can be challenging, especially when sharing with trusted friends or family members. Even with rigorous user permissions or password-secured files, there is always the risk that someone might take a snapshot of your screen inadvertently. With LeaksID, you can seamlessly continue your regular workflow while improving your document oversight, allowing for precise leak detection within minutes. This enhanced level of oversight delivers reassurance, ensuring your delicate information is significantly more safeguarded against possible breaches, while also allowing for a more proactive approach to information security.

What is Imatag?

IMATAG provides robust protection for your visual content online, including brand and product images, licensed materials, and confidential files. Utilizing its patented Invisible Watermark technology, IMATAG offers two distinct solutions: IMATAG Leaks, which is the pioneering tool for detecting photo or video leaks, and IMATAG MONITOR, known for its reliability in tracking the online usage of your visual assets. The software embeds an imperceptible identifier within each pixel of images and videos, enabling you to identify your content regardless of alterations such as resizing, cropping, or sharing on social media. Additionally, it serves as a means to trace the origin of any leaks, ensuring that your content remains secure. IMATAG supports various formats, including photographs, renders, videos, and PDFs, and is available as a Software as a Service (SaaS) via API or Web UI, or as a traditional on-premise installation. With these features, IMATAG not only safeguards your content but also enhances your ability to monitor its use across different platforms effectively.

Media

Media

Integrations Supported

Scrile Connect
Strobes RBVM
Wedia

Integrations Supported

Scrile Connect
Strobes RBVM
Wedia

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

G-71

Company Location

United States

Company Website

leaksid.com

Company Facts

Organization Name

IMATAG

Date Founded

2015

Company Location

France

Company Website

www.imatag.com

Categories and Features

Document Control

Archiving & Retention
Automated Routing
Change Management
Compliance Management
Electronic Signature
Escalation Management
Periodic Review
Version Control

Categories and Features

Brand Protection

Case Management
Domain Monitoring
Investigation Management
Marketplace Monitoring
Mobile App Monitoring
Paid Search Monitoring
Prioritization
Social Media Monitoring

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Digital Rights Management

Access Revocation
Audio / Video Protection
Distribution Management
Expiration Management
Image Protection
License Management
Location Control
PDF Protection
Software Application Protection
Subscription Management
Usage Tracking / Analytics
Watermarking

Public Relations

Article Author Database
Auto-Update Media Lists
Campaign Management
Clippings Management
Communications Calendar
Contact Management
Digital Asset Management
Direct Mail Management
Email Distribution
Press Monitoring
Press Release Builder

Reputation Management

Campaign Management
Gamification
Response Management
Review Generation
Review Monitoring
Sentiment Analysis
Social Media Metrics
Social Media Monitoring
White Label

Visual Search

Barcode Recognition
Catalog Management
Customer Activity Tracking
Filtering
IP Protection
Image Tagging
Mobile App
Optical Character Recognition
Product Recommendations
Product Search
Reverse Image Search
Video Search

Popular Alternatives

Imatag Reviews & Ratings

Imatag

IMATAG

Popular Alternatives

Code42 Incydr Reviews & Ratings

Code42 Incydr

Mimecast