Ryan discovers a problem: someone who had legal access to the document posted a photo of this document on social media.
Ryan wants to find out who is the leaker. This becomes not only his problem, but also the problem of the whole team.
Start to find leaker
Ryan logs into the system and enters the investigation section and creates a new investigation.
Ryan takes a sample document from social media and uploads it to investigate.
If the sample presented in social networks is heavily distorted or the angle of inclination of the text is changed, then this is not a problem. Leaksid has a built-in editor for adjusting samples.
Find original document
The system automatically detects the required document and the required page by sample
Ready to start
Ryan launches an investigation on this sample.
The examination is carried out automatically. For complex samples, advanced configuration of the investigation parameters and carrying it out in manual mode is possible
Ryan gets the results of the investigation and understands who is the leaker.
Ryan shows the team how easily LeaksID can identify an intruder. Now every team member knows that they cannot remain unidentified in the event of sensitive information being published. This stops the employee from sharing documents.