What is LeaksiD?

Data leakage identification platform for conducting significant contracts and sharing confidential documents. You can detect the source of a leak by uploading any piece of the document if you uncover it in the public domain or as a hard copy.

Pricing

LeaksiD Starting Price

Awards
LeaksiD Award

Our Awards and Recognition

More Awards
Need a Little Help?

Talk with a software expert for free. Get a list of software that's great for you in less than 10 minutes.

Key Features of LeaksiD

Here are the powerful features that make LeaksiD stand out from the competition. Packed with innovative tools and advanced functionalities, this software offers a range of benefits.

  • Anonymity Management
  • Auditing
  • Collaboration
  • Data Protection
  • Data storage management
  • Document Tagging
  • Due Diligence Management
  • Procurement Management
  • Project Management
  • Role-Based Permissions
  • Secure Preview
  • Activity Log
  • AI / Machine Learning
  • AI Security
  • Anti Virus
  • Anti-Spyware
  • Antivirus
  • Application Security
  • Asset Discovery
  • Asset Tagging
  • Audit Trail
  • Behavioral Analytics
  • Biometric
  • Blue Team Tools
  • Compliance Management
  • Compliance Reporting
  • Content Caching
  • Content Disarm & Reconstruction (CDR)
  • Content Routing
  • Credential Management
  • Cyber Insurance
  • Cyber Risk Management
  • Cybersecurity
  • Dark Web Monitoring
  • Data Classification
  • Data Compression
  • Data Discovery
  • Data Governance
  • Data Security
  • Data Security Posture Management (DSPM)
  • Database Security Audit
  • Device management
  • Employee Identity Theft Protection
  • Encryption
  • Endpoint Management
  • Endpoint protection
  • Event Logs
  • Event-Based Notifications
  • Extended Detection and Response (XDR)
  • File Access Control
  • Financial Data Protection
  • Forensic Analysis
  • Health Monitoring
  • Incident Management
  • Incident Response
  • Insider Threat Management
  • Intrusion detection and prevention
  • Intrusion Detection System
  • IOC Verification
  • IoT Security
  • Log Management
  • Malware Analysis
  • Mobile Authentication
  • Mobile Data Security
  • Multifactor Authentication
  • Network Detection and Response (NDR)
  • Network Scanning
  • Network security
  • Network Traffic Analysis (NTA)
  • Out-of-Band Authentication
  • Password Management
  • Patch Management
  • Policy Management
  • Prioritization
  • Real Time Monitoring
  • Redundancy Checking
  • Reverse Proxy
  • Risk Management
  • Security Event Log
  • Security Orchestration
  • Automation and Response (SOAR)
  • Self Service Portal
  • Sensitive Data Identification
  • SIEM
  • Signature Matching
  • Threat Intelligence
  • Threat Modeling
  • Tokenization
  • Transaction Monitoring
  • User Activity Monitoring
  • User and Entity Behavior Analytics (UEBA)
  • VPN
  • Vulnerability Assessment
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Scanning
  • Web Threat Management
  • Whitelisting / Blacklisting
Show More
  • Cloud Protection
  • Compliance Reporting
  • Cybersecurity
  • Dashboard
  • Data Classification
  • Data Containerization
  • Data Discovery
  • Data loss prevention
  • Device Control
  • Device management
  • Email Security
  • Endpoint Detection and Response (EDR)
  • Endpoint protection
  • False Positive Remediation
  • Incident Management
  • Insider Threat Management
  • Insider Threats
  • Intuitive Reports
  • Reporting/Analytics
  • Sensitive Data Identification
  • Vulnerability Management
  • Web Threat Management
Show More
  • Access control and identity management
  • API Security
  • API security and management
  • Application security and firewalling
  • Attack Surface Management
  • Cloud access governance
  • Cloud Compliance
  • Cloud compliance management
  • Cloud Detection and Response (CDR)
  • Cloud Infrastructure Entitlement Management (CIEM)
  • Cloud security
  • Cloud Security Posture Management (CSPM)
  • Cloud workload protection
  • Cloud-Native Application Protection Platforms (CNAPP)
  • Computer Security
  • Container security
  • Continuous security monitoring
  • Cybersecurity
  • Data backup and disaster recovery
  • Data Governance
  • Data loss prevention
  • Data Security Posture Management (DSPM)
  • Encryption and data protection
  • Endpoint Detection and Response (EDR)
  • Endpoint protection
  • Entitlement Management
  • Exposure Management
  • GDPR Compliance
  • Identity Management
  • Incident response and forensics
  • Intrusion detection and prevention
  • IT Security
  • Malware detection and prevention
  • MSP
  • Multi-factor authentication
  • Network security
  • Network security and segmentation
  • Patch Management
  • Secure Access Service Edge (SASE)
  • Secure email and messaging
  • Secure file storage and sharing
  • Secure remote access and VPN
  • Security analytics and threat intelligence
  • Security awareness training
  • Security Compliance
  • Security compliance and reporting
  • Security configuration management
  • Security incident response
  • Security information and event management (SIEM)
  • Security policy enforcement
  • Security risk assessment and mitigation
  • Software Asset Management (SAM)
  • Software-Defined Perimeter (SDP)
  • Threat detection and prevention
  • User activity monitoring and auditing
  • Vulnerability assessment and management
  • Vulnerability Management
  • Vulnerability Scanners
  • Web application scanning and protection
  • Zero Trust Security
Show More

LeaksiD Specifications

Get a closer look at the technical specifications and system requirements for LeaksiD. Find out if it's compatible with your operating system and other software.

Deployment :
Cloud Based
Subscription Plan :
Monthly, Onetime(Perpetual license)
Accessibility :
API
Customization
Mobile Support
Desktop Platforms :
Web app
MacOs
Windows
Language Support :
English
Business :
Freelancers
StartUps
SMBs
Agencies
Enterprises
Available Support :
Email
Phone
Training
Tickets
Integrations :
  • GMail
  • dropbox
  • google drive
Company Details :
Company Name : LeakID
Headquarter : New York
Website : Visit Website
Full Address : D318, 184 Kent Avenue, Brooklyn, NY, 11249

LeaksiD Description

Here's the comprehensive description of LeaksiD. Gain a brief understanding of its unique features and exceptional benefits.

Every single time the document is opened, emailed, or printed out, it is imperceptibly marked, and the end-user receives a unique copy of the document that is visually indistinguishable from the original.

The LeaksID algorithm will accurately identify the originator of the leak by the unique, invisible document marks.

LeaksID is a cloud-based app built with our proprietary technology at its core — the best solution to prevent valuable data leaks via physical copying, such as taking snapshots or printing.
US patented technology

No other security system is able to deter the leakage of information on paper.

LeaksiD Reviews (0)

Ask a question

No reviews yet. Rate this app or be the first to review.

Write a Review

Alternatives of LeaksiD

Explore alternative software options that can fulfill similar requirements as LeaksiD. Evaluate their features, pricing, and user feedback to find the perfect fit for your needs.

LeaksiD FAQs

What apps do LeaksiD integrate with?

LeaksiD integrates with various apps:

  • GMail
  • dropbox
  • google drive

What are the top 5 features for LeaksiD?

The top 5 features for LeaksiD are:

  • Role-Based Permissions
  • Data storage management
  • Data Protection
  • Secure Preview
  • Sensitive Data Identification

What type of customer support is available from LeaksiD?

The available support which LeaksiD provides is:

  • Phone
  • Email
  • Tickets
  • Training
Free Demo Get Pricing
Free Demo