Imatag
IMATAG protects your online visual content such as brand images, product images, licensed content, and sensitive files.
Based on a patented technology of Invisible Watermark (or Forensic Watermark), it comes in two flavors:
- IMATAG Leaks is the first online tool to identify photo or video leaks.
- and IMATAG MONITOR - the most reliable visual search tool to track the usage of your content online.
How it works
The software places an invisible identifier at each pixel of images and videos. This invisible watermark allows you to identify your content online, regardless of whether it has been resized or cropped, trimmed, posted on social networks, or copied via screenshots. It can also be used as a tracker to trace the source of a leak.
Supports images (photos and renders, design), videos and PDF.
Available as SaaS via API or Web UI, or as on-premise software.
Learn more
Fasoo Enterprise DRM
- File-centric Protection and Granular Permission Control : Fasoo EDRM supports file encryption and applies granular permission controls. This feature allows organizations to limit editing, printing, and sharing of sensitive content by unauthorized users, ensuring that sensitive documents are protected and controlled throughout their lifecycle, regardless of their location or the device being used.
- Centralized Policy Management : The solution simplifies security management by allowing centralized deployment and management of security policies. This ensures that documents are protected immediately upon creation or download, without disrupting user workflows. It also supports dynamic access control, exception policies, and offline policies to minimize change management risks.
- Enhanced Monitoring and Compliance : Fasoo EDRM includes features for continuous monitoring and auditing, such as usage tracking, audit trails, and file tracking. These capabilities support zero-trust security and regulatory compliance (such as GDPR, CCPA, HIPAA, and PDPA, etc.) by providing data visibility and insights into user interactions and data movements.
Learn more
Vaultize DRM
You can ensure security and governance throughout the file's lifecycle, both within and outside your network. Vaultize allows your team to securely store, access, and share files easily. You can also protect and manage them with digital rights management (DRM), file sharing security, and continuous data protection. Vaultize is designed to protect enterprise data from all types of threats, including accidental or intentional data loss and exposure. Vaultize is a secure and user-friendly solution that allows teams to share files on any device. IT and auditors have complete control and visibility over the files. DRM protection - View, edit, print and share files. Copy/paste is possible. Administrator and user-level sharing controls. You have full control over who, what, where, when and how you share your data.
Learn more
Tresorit
End-to-end encrypted file sharing & sync
Tresorit is the secure cloud storage and sync place to store, sync, and share files from anywhere, anytime. Tresorit uses end-to-end encryption to protect your files from hackers and internal data breaches. All data is stored in accordance with the GDPR in Europe in Microsoft Azure Datacenters.
You can manage who can edit, add, or view the data you share. Securely access the updated files from your browser, desktop or mobile device.
Files can also be shared securely outside of your company. Securely share files instead of unsecured attachments to email. End-to-end encryption ensures that nothing leaves your device unencrypted. This means that only you and the recipient can access the files.
To ensure collaboration with external parties, use the Content Shield features to protect your Business. Read more here: https://tresorit.com/tresorit-content-shield
Learn more