Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

IMATAG protects your online visual content such as brand images, product images, licensed content, and sensitive files. Based on a patented technology of Invisible Watermark (or Forensic Watermark), it comes in two flavors: - IMATAG Leaks is the first online tool to identify photo or video leaks. - and IMATAG MONITOR - the most reliable visual search tool to track the usage of your content online. How it works The software places an invisible identifier at each pixel of images and videos. This invisible watermark allows you to identify your content online, regardless of whether it has been resized or cropped, trimmed, posted on social networks, or copied via screenshots. It can also be used as a tracker to trace the source of a leak. Supports images (photos and renders, design), videos and PDF. Available as SaaS via API or Web UI, or as on-premise software.

Description

Safeguard your most confidential documents with an invisible fingerprint to prevent unauthorized disclosure during printing or photography. This innovative approach allows for rapid identification of the leak's origin. LeaksID is a cloud-based solution that employs a proprietary algorithm to embed an imperceptible markup into documents when sharing them securely with external parties. If a printout or an image of a sensitive document is exposed publicly, you will be able to pinpoint the individual responsible for the breach. It can be difficult to ascertain who has leaked your private information, particularly when sharing with trusted friends or family members. Even with strict user permissions or password-protected files, the risk remains that someone could capture an image of your screen in passing. With LeaksID, you can maintain your usual workflow while enhancing your oversight of document handling, enabling accurate leak detection in mere minutes. This level of control provides peace of mind, knowing that your sensitive information is better protected against potential breaches.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Scrile Connect
Strobes RBVM
Wedia

Integrations

Scrile Connect
Strobes RBVM
Wedia

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

IMATAG

Founded

2015

Country

France

Website

www.imatag.com

Vendor Details

Company Name

G-71

Country

United States

Website

leaksid.com

Product Features

Brand Protection

Case Management
Domain Monitoring
Investigation Management
Marketplace Monitoring
Mobile App Monitoring
Paid Search Monitoring
Prioritization
Social Media Monitoring

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Digital Rights Management

Access Revocation
Audio / Video Protection
Distribution Management
Expiration Management
Image Protection
License Management
Location Control
PDF Protection
Software Application Protection
Subscription Management
Usage Tracking / Analytics
Watermarking

Public Relations

Article Author Database
Auto-Update Media Lists
Campaign Management
Clippings Management
Communications Calendar
Contact Management
Digital Asset Management
Direct Mail Management
Email Distribution
Press Monitoring
Press Release Builder

Reputation Management

Campaign Management
Gamification
Response Management
Review Generation
Review Monitoring
Sentiment Analysis
Social Media Metrics
Social Media Monitoring
White Label

Visual Search

Barcode Recognition
Catalog Management
Customer Activity Tracking
Filtering
IP Protection
Image Tagging
Mobile App
Optical Character Recognition
Product Recommendations
Product Search
Reverse Image Search
Video Search

Product Features

Document Control

Archiving & Retention
Automated Routing
Change Management
Compliance Management
Electronic Signature
Escalation Management
Periodic Review
Version Control

Alternatives

Alternatives

Imatag Reviews

Imatag

IMATAG
Code42 Incydr Reviews

Code42 Incydr

Mimecast