LeaksID at Alchemists Demo Day

Since August 2020, G-71 has been participating in class 26 of Alchemist Accelerator, one of the world’s largest accelerators. The six-month program is almost over, and on January 21, we present our LeaksID solution on Demo Day. Here is why we decided to join Alchemist and what we have achieved during the acceleration program.

About Alchemist Accelerator

Alchemist Accelerator is a venture accelerator focused on the B2B business and aimed at accelerating seed-stage startup development. The accelerator was founded in 2012. Since then, more than 300 companies have completed the program. The backers include some of the leading US corporate and venture capital funds, such as Khosla Ventures, Cisco, Siemens, General Electric, and Salesforce. There are well-known entrepreneurs among the mentors, and the community includes more than 23,000 people.

The accelerator’s screening criteria are very rigorous. Experts and mentors give preference only to products with the highest development potential. On the day of our presentation, over 152 companies were reviewed, and only 8 of us entered the program. Alchemist experts believed in our product, fully appreciated our business capability, and saw great market prospects. Therefore, our application was approved in less than a day.

Why we decided to join the program

Currently, in cybersecurity, the topic of insider leaks is quite critical. Over the past two years, the number of incidents has increased by 47%. The average damage to one company has risen by a third, costing $11.45 million. In almost half of the cases, cybercriminals use photographs of documents or their printed copies. Generally, such threats are not covered by traditional security systems such as DLP (Data Loss Prevention) and VDR (Virtual Data Room).

Fortunately, our LeaksID solution successfully solves this problem. It automatically marks any file with unique tags that are invisible to the human eye. Each time the file is accessed, a new copy of the document with different tags is created. Using these marks, LeaksID can accurately determine who worked on a particular copy and when, and in case of a data leak, it can identify its source. Each part of the document is marked, so even if a violator gets a small fragment of the document, our system will accurately determine the copy’s owner. Presently, LeaksID is the only technology that can effectively resist a new generation of insiders who use screenshots and take pictures of computer screens or printouts with a smartphone.

Our corporate customers have confirmed the efficiency of the LeaksID system. Most companies have completely stopped data leaks, while others have minimized them.

We entered the acceleration program to expand our presence in the US market. Besides, Alchemist top managers and experienced mentors inspired us to add new useful features to our product functionality. In general, the accelerator program has become an excellent opportunity for us to extend communication, strengthen ties with partners and potential investors, and make new useful contacts.

After six months of hard work, we have made significant progress, and we plan to present our achievements on Demo Day. We invite everyone to join the Demo Day online broadcast on January 21.

Stay tuned!

Try out LeaksID, our cloud solution to store documents, collaborate on them, and securely share them.

You may also find this interesting

LeaksID Awarded High Performer in G2’s Spring 2023 Report

G-71’s LeaksID is a patented ITM solution recognized by G2 as a High Performer in Cloud File Security. The G2 recognition confirms LeaksID’s credibility, reliability, and efficiency, making it an indispensable tool for businesses dealing with sensitive information.

How to Protect Healthcare Data from Breaches and Leaks

The article discusses the importance of safeguarding sensitive patient information in the healthcare industry. It highlights the potential risks, and offers practical tips and strategies for securing healthcare data.

Data and Document Leak Investigation

If you suspect that your company has suffered a data leak, it’s important to investigate the situation immediately so that you can take action and mitigate any potential damage.

How Classified Information Walks Out the Door

The article examines various scenarios that can lead to this situation, including unintentional or deliberate actions by employees, as well as cyber threats and vulnerabilities.


What is an Insider Threat?

How can companies counter insider threat? What types of insider leaks exist? How to reduce insider risk with invisible labeling?

Confidential Data Leaks: Who Steals and Why?

The motives for hacking, especially virtual hacking through penetration into the secret infrastructure of a company, are very diverse, as are the methods used for such purposes. Here are some examples of the most common reasons for theft.