Data Leak Deterrence
G-71 Inc., a cybersecurity company based in Mountain View, CA, created the SaaS solution LeaksID to solve a crucial problem enterprises face: leaks and public disclosure of sensitive documents that are compromised via various methods, including photographs.
What is LeaksID?
LeaksID is a cutting-edge ITM technology aimed at safeguarding sensitive documents from insider threats. Its integration features make it a comprehensive solution to manage and deter data and document leaks. The solution can be utilized in a SaaS format or installed on-premises, giving organizations the option to choose the deployment method that aligns with their specific requirements. LeaksID uses a steganographic approach to add unique, undetectable marks to confidential documents, making it an effective deterrent against data breaches.
Why we developed LeaksID
Every year, businesses lose 2 billion dollars from data breaches and every third company in the world experiences insider attacks. Regarding document leaks, in 45% of all incidents, insiders take photos of screens or hard copies. A single insider incident costs enterprises an average of $15M.
All existing data protection solutions protect and control only file distribution. Unfortunately, no document protection solution can stop insiders from taking photos of documents. The most powerful way is to use watermarks, but they are not so difficult to erase and make the document anonymous.
To deter such leaks, we developed LeaksID, the technology that personalizes documents for each user each time they are displayed on a screen or printed out. LeaksID protects documents by invisible labeling using the steganographic method. From one page of text, LeaksID can make 27,000 copies for every person on Earth – that’s 205 trillion unique combinations.
To create a transparent and safe environment for digital communications by protecting documents that contain confidential or sensitive data ahead of time and thereby to instill a culture of safe handling of information. G‑71 understands the value of information and helps prevent leaks of confidential documents.
- G-71 aims to create a transparent and secure communications environment and to instill a culture of safe information handling.
- G-71 solutions aim to ensure that sensitive documents stay confidential.
- G-71 solutions exist to deter leaks of sensitive documents.
- G-71 helps to investigate the incidents and seek justice for those affected by leaks.
- G-71 solutions are made available on special terms and even for free to those who need them most.
- G-71 solutions serve the public good and help protect the interests of users.
Sergey is a serial entrepreneur in the booming cybersecurity industry and the founder of several successful companies. Sergey has been working in IT since 2001. He started as a consultant and project manager, then worked as a top manager of several large and international companies. Among Sergey’s clients are the world’s largest oil, energy and industrial companies, as well as medical and legal companies that work with sensitive information.
Igor is a skilled CTO with 17+ years of experience in software architecture, development, and deployment. 15+ years of experience working on many enterprise and integration projects, including real-time services and distributed systems, and taking part in creating an integration platform for banks and telecom operators. Eager to leverage the business value and benefits of IT solutions for cybersecurity purposes. Strong information technology professional, graduated from The Bauman Moscow State Technical University, Software for Computers and Automation Systems in 2006.
Yulia is a marketer with more than 7 years of experience in marketing management in tech companies (B2B/B2C SaaS & marketplaces), advertising agencies, and the cybersecurity industry. More than 4 years of experience as a Growth Leader and Head of Marketing in several international startups. Graduated from the Peoples’ Friendship University, Institute of World Economics and Business, Master of Advertising Management, 2018. Formed several times the marketing department from scratch. Participant as a member of the core startup team in several acceleration programs and in several international conferences as Emerge, WebSummit, Slush.
Board of Advisors
Brian DiPietro brings over two decades of experience building and leading global teams of scale, centered on relentless execution and risk mitigation. Previously, as the Managing Director Information Security/CISO at JPMorgan Chase with over 16 years of experience, he was responsible for driving all cyber and technology controls initiatives for the Consumer and Commercial businesses, leading all communications with external regulators and internal auditors and interacting with external clients across industry segments on cyber security facts and industry trends. Brian also is the owner of a CISSP certification, International Information Systems Security Certification Consortium (ISC2).
Eric Seagren brings over 25 years in IT, and as a published author he is well versed in a variety of industries and IT disciplines with multiple publishing credits and technical certifications including CRISC, CISA, CISSP-ISSAP. Eric currently serves as the Chief Information Security Officer at Oceaneering International. Formerly, he was a specialist at Stewart Transaction Solutions and J.P. Morgan Chase & Co., where he managed IT risk for the Central Technology & Operations (CTO) organization by weighing technical risks against the business objectives and educated business stakeholders at various levels. Eric focuses on creating security policies and solutions that respect the business needs and operational requirements of the organization. Eric holds a Bachelor of Science in Business: Information Systems.
Jeff Reich brings over 40 years in the security community, and in building and leading high-performance teams by identifying and developing high potential leaders at all levels of an organization. Jeff currently serves as the Co-Founder and Chief Risk Officer at LexAlign and additionally as Senior Information Security Instructor at the Center for Infrastructure Assurance and Security, delivering executive courses that educate National Guard General Officers and minor business executives to support cybersecurity programs and growth. Building successful programs dealing with challenging problems, delivering prevention, recovery, and turnaround solutions to organizations is what Jeff focuses on. In 2015, he was inducted into the ISSA Hall of Fame. Jeff holds CISSP certification from (ISC) 2, CRISC certification from ISACA. Moreover, he was granted a Foundation Certificate in IT Service Management from The Council for Service Management Education and The Information Systems Examination Board.
LeaksID by G-71 Inc. uses the patented algorithm (US Patent No.11.120.520) that marks every file in a way that is invisible to the naked eye. The end-user receives a unique copy of the document every time the document is opened, emailed, or printed out.
These marks are impossible to remove. In this manner, every person who works with the document knows that if data breaches occur, whoever is responsible for them will be identified, even if the size of the leaked fragment is extremely small.
Document modified by our technology
Our technology has the capability to identify who made a hard copy or took a photo of the document, regardless of the actions taken by the individual.
Can you find who has leaked your data with just a snap of a document or photo? — We can
Our solution guarantees to deter any possible leaks as it can successfully identify and establish the identity of the leaker using any portion of your document.
We provide cloud and on-premise solution.
Safe storage and sharing of documents
Carry on with your document work as usual, while LeaksID provides discreet protection for them. Easily organize and share documents securely. Manage access rules for each person in the LeaksID workspace.
Unique & invisible anti-leak labels
Every time the user sees information on the screen or prints it out, the system’s algorithm creates a unique copy with invisible marks.
User-friendly interface and transparent integration
Visually, the differences between the original and any copy are invisible: there are no watermarks, no visible markers. Users share documents and can read them easily.
Simple leak detection via the investigation module
You can detect the source of a leak by uploading any part of the compromised document if you uncover it in the public domain or as a hard copy.
Press & Blog
LeaksID awarded High Performer in Cloud File Security in G2’s Spring 2023 Report
G-71’s LeaksID is a patented ITM solution recognized by G2 as a High Performer in Cloud File Security. The G2 recognition confirms LeaksID’s credibility, reliability, and efficiency, making it an indispensable tool for businesses dealing with sensitive information.
How to Protect Healthcare Data from Breaches and Leaks
The article discusses the importance of safeguarding sensitive patient information in the healthcare industry. It highlights the potential risks, and offers practical tips and strategies for securing healthcare data.
The Hidden Danger: Insider Threats in the Real Estate Industry
The article discusses insider threats in the real estate industry, including types of threats and real-world examples. It also provides advice on how to protect against and mitigate damage from such threats.
Preventing Insider Risks: Understanding Common Insider Threat Indicators and Effective Solutions
The article offers insights on identifying warning signs of insider threats, including employee profiles, motives, and attack methods. It emphasizes the need for robust security measures and risk assessments to prevent such threats.
How to Stop Documents Leaks: Unmask Anonymous Leakers
The article provides valuable insights and strategies for preventing data breaches caused by leaked documents and identifying anonymous leakers.
13 Essential Cybersecurity Tools Every Company Should Have in 2023
In 2023, businesses face increasing cyber threats and attacks, making cybersecurity tools a necessity. To help, we have prepared a list of 13 essential cybersecurity tools that every company should have.
Get in touch with us to learn more about our solutions:
450 San Antonio Rd #1534
Mountain View, CA 94040
Our sales team can answer your questions, show you LeaksID in action over a live call or create a custom workflow that fits your needs.
For general questions, potential partnerships or media inquiries, click to fill out the form below. We will reply as soon as possible.