Curtain LogTrace File Activity Monitoring
In the daily work environment, companies often need to authorize their employees to access and use sensitive company data. However, most companies lack visibility into how their employees are actually utilizing this data, and whether any misuse is occurring. At the same time, companies have to meet internal audit requirements and comply with various data security regulations and policies. This creates a need for the IT department to find ways to effectively monitor and record how employees are accessing and using the company’s data resources.
Curtain LogTrace provides enterprise-wide file activity monitoring. It tracks user actions: create, copy, move, delete, rename, print, open, close, save. Includes source/destination paths and disk type. Perfect for monitoring user file activities.
Key Features:
- File log (create & delete file)
- File log (copy & move file)
- File log (print & rename file)
- App log (save, open & close file)
- Support MySQL & MS SQL
- Watermark for printout
- Central administration
- Integration with Active Directory
- Uninstall password for client
- Password management
- Admin delegation
- Self protection for the software
Learn more
Curtain MonGuard Screen Watermark
Curtain MonGuard Screen Watermark is an enterprise solution for displaying screen watermarks that administrators can enable on users' computers. This screen watermark can display various user information, such as the computer name, username, and IP address. The purpose of this watermark is to effectively grab the user's attention and serve as a reminder before they take a screenshot or photograph the screen to share the information with others.
The key benefit of Curtain MonGuard is that it encourages users to "think before sharing" sensitive information. If the content being shared contains confidential company data, the watermark can help trace the source of the leaked information back to the user responsible. This allows organizations to hold users accountable and mitigate the consequences of data breaches or unauthorized information sharing.
Key features:
- On-screen watermark
- Full screen-watermark
- Application screen-watermark
- Supports over 500 Applications
- Self-defined content of watermark
- Screen-watermark by condition
- Central administration
- Integration with Active Directory
- Uninstall password for client
- Password management
- Admin delegation
- Self protection for the software
Learn more
Imatag
IMATAG protects your online visual content such as brand images, product images, licensed content, and sensitive files.
Based on a patented technology of Invisible Watermark (or Forensic Watermark), it comes in two flavors:
- IMATAG Leaks is the first online tool to identify photo or video leaks.
- and IMATAG MONITOR - the most reliable visual search tool to track the usage of your content online.
How it works
The software places an invisible identifier at each pixel of images and videos. This invisible watermark allows you to identify your content online, regardless of whether it has been resized or cropped, trimmed, posted on social networks, or copied via screenshots. It can also be used as a tracker to trace the source of a leak.
Supports images (photos and renders, design), videos and PDF.
Available as SaaS via API or Web UI, or as on-premise software.
Learn more
iStamp
Effortlessly apply watermarks to all your images in a single action! Safeguarding your copyright has never been simpler. You can incorporate text, logos, and images into your photos. Select any font or color for your text, and modify the scale, opacity, font style, color, and angle of your watermark. Save your customized watermarks as templates for quick access in the future. To utilize graphics, create .png files on your computer, send them to your email, access the email on your iOS device, and save them to your photo library. In iStamp, you can design a graphic watermark and select an image from your photo album to use it as a new watermark, ensuring a personalized touch for each photo. With these easy steps, you can efficiently manage and protect your images in style.
Learn more