G-71 Inc. Strengthens LeaksID Solution with Email and Cloud Storage Integrations for Unmatched Confidential Document Protection

G-71 Inc.’s LeaksID solution, which offers technology to deter leaks of confidential documents and the ability to conduct investigations to determine the source of a leak, has expanded its functionality in terms of integration capabilities, now offering integrations with email servers and external storage such as One Drive or Google Drive.

Previously offered in a SaaS format, LeaksID can now be integrated with email servers such as Microsoft Exchange, functioning as a shadow converter that converts necessary documents into attachments and enriches them with invisible marks. LeaksID can be triggered by various factors, including document classification, keywords in the subject or body of an email, manual indication of confidentiality, or redirecting a task from DLP. Personalized marked attachments will be automatically sent, enriched with LeaksID anti-leak marks for each of the specified recipients. The process is seamless, and for the user (both sender and receiver), nothing will change.

In addition, LeaksID can now be integrated with cloud storage systems, such as One Drive or Google Drive, as well as cloud VDRs through the OpenID Connect Protocol with authentication via OAuth 2.0. The integration process generates a novel workspace inside LeaksID that is linked to the external cloud storage. This connection enables the storage of confidential documents to be more secure. Users can simply upload their documents to LeaksID and relocate them to the new workspace connected to the external storage. This permits users to work with their documents within LeaksID, such as viewing, downloading, or exchanging them with third parties. However, the documents themselves will be stored in the user’s encrypted storage.

In the near future, G-71 plans to implement more native integrations of LeaksID with a range of systems, allowing for completely transparent integration with any cloud solutions in the form of a Web Application Firewall (WAF).

Our expanded integration capabilities will provide our customers with even greater flexibility and security in protecting their confidential documents. This is our top priority, and we believe it will allow us to offer our solution for solving even more business problems across a variety of organizations. It's only the first step towards native integrations, which we plan to implement in the near future. Our technical team is currently working on developing a new roadmap with new updates on integration capabilities. We want our solution to seamlessly integrate into our customers' workflow, with transparency and convenience in implementing our marking process.

About LeaksID Forensic Watermarks

The LeaksID technology is a steganographic approach that uses invisible document markings to provide two functions: deterrence and detective. Whenever a document is interacted with (opened, sent, printed, etc.), it is enriched with a LeaksID marking, which is invisible to the naked eye.

The deterrence function creates a preventive effect by marking the documents, letting potential violators know that any unlawful actions will have consequences.The detective function enables the quick identification of the source of any leaks through the marking, even if the document has been photographed, screenshotted, or printed. The forensic watermarks of LeaksID are distinct from regular watermarks in that they cannot be removed and can be used in investigations.

About G-71

G-71 Inc., a cybersecurity company, created a cutting-edge ITM technology LeaksID to solve a crucial problem enterprises face: leaks and public disclosure of sensitive documents that are compromised via various methods, including photographs.

You may also find this interesting

LeaksID Awarded High Performer in G2’s Spring 2023 Report

G-71’s LeaksID is a patented ITM solution recognized by G2 as a High Performer in Cloud File Security. The G2 recognition confirms LeaksID’s credibility, reliability, and efficiency, making it an indispensable tool for businesses dealing with sensitive information.

How to Protect Healthcare Data from Breaches and Leaks

The article discusses the importance of safeguarding sensitive patient information in the healthcare industry. It highlights the potential risks, and offers practical tips and strategies for securing healthcare data.

Data and Document Leak Investigation

If you suspect that your company has suffered a data leak, it’s important to investigate the situation immediately so that you can take action and mitigate any potential damage.

How Classified Information Walks Out the Door

The article examines various scenarios that can lead to this situation, including unintentional or deliberate actions by employees, as well as cyber threats and vulnerabilities.


What is an Insider Threat?

How can companies counter insider threat? What types of insider leaks exist? How to reduce insider risk with invisible labeling?

Confidential Data Leaks: Who Steals and Why?

The motives for hacking, especially virtual hacking through penetration into the secret infrastructure of a company, are very diverse, as are the methods used for such purposes. Here are some examples of the most common reasons for theft.