Data leaks Deterrence

About us
G-71 Inc. was founded in 2019 by experts in IT & cybersecurity. G-71 Inc. developed the solution LeaksID to deter data leaks. In 2020 we launched a cloud-based solution, and the Alchemist Accelerator invited our company to participate in their program.
To create a transparent and safe environment for digital communications to protect documents containing confidential or sensitive data ahead of time and thereby to instill a culture of safe handling of information.
Our mission
It is a common stereotype that the main threat to sensitive information comes from third parties. However, the number of insider-related breaches rises every year. It has been shown that 51% of organizations lack sufficient data protection strategies to detect and prevent insider threats.

The reason for this is the development of the technological capabilities of personal computers and smartphones. Over the past few years, the number of screenshots, pictures of the screen, and printouts containing sensitive information leaked online has significantly increased. These data breaches happen when documents containing personal data or confidential information are received by people whom users trust the most.
Why we developed LeaksID
Treats:
Insider Leaks Cannels:
The CEO of G-71 Inc. faced a similar problem when he was working as a top manager in a large company. At the time there was no solution on the market to solve this problem. It was then that the idea of creating G-71 Inc. and the product LeaksID was born. LeaksID helps deter people from leaking the most sensitive documents through screenshots, pictures of the screen, printed-out documents, and documents shared via email.
Executive Team
CEO
CTO
CCO
Sergey Voynov
Alexander Korznikov
Sergei Timoshenko
Sergey is our visioner, the father of our main goals and values. He is the voice of our brand.
Alex is the genius behind the code, leader of the programming team.
Sergei is our creative mind, the driver of marketing and sales processes in our company.
And more than 25 high-level specialists
Executive Team
CEO
CTO
CCO
Sergey Voynov
Alexander Korznikov
Sergei Timoshenko
Sergey is our visioner, the father of our main goals and values. He is the voice of our brand.
Alex is the genius behind the code, leader of the programming team.
Sergei is our creative mind, the driver of marketing and sales processes in our company.
And more than 25 high-level specialists
Executive Team
CEO
CTO
CCO
Sergey Voynov
Alexander Korznikov
Sergei Timoshenko
Sergey is our visioner, the father of our main goals and values. He is the voice of our brand.
Alex is the genius behind the code, leader of the programming team.
Sergei is our creative mind, the driver of marketing and sales processes in our company.
And more than 25 high-level specialists
Our Technology
LeaksID uses its patented algorithm that marks every file in a way that is invisible to the naked eye. The end-user receives a unique copy of the document every time the document is opened, emailed, or printed out.

These marks are impossible to remove. In this manner, every person who works with the document knows that if data breaches occur, whoever is responsible for them will be identified, even if the size of the leaked fragment is extremely small.
Original document
Document modified by our technology
Even if a person makes a hard copy or takes a photo of the document. With our technology you will find who did it.
Our solution will stop all potential leaks, because the system will find and establish the identity of the leaker using any piece of your document without fail
Can you find who has leaked your data by a piece of document or photo? — We can
LeaksID supports all major file types and easily integrates with Google Drive and OneDrive for business. We provide cloud and on-premise solution
Every time the user sees information on the screen or prints it out, the system's algorithm displays a unique copy with invisible marks.

Unique marking

Visually, the differences between the original and a copy are invisible: no watermarks, no visible markers. Users share documents and can read them easily.
You can detect the source of a leak by uploading any piece of the document if you uncover it in the public domain or as a hard copy.

User-friendly viewer

Simple leak detection

You can create as many workspaces as you need. Easy organise and share documents. Manage access rules for each person in workspace.

Workspaces

Our blog
D318, 184 Kent Avenue, Brooklyn, NY, 11249
Get in touch with us to learn more about our solutions:
Sales
Our sales team can answer questions, show you LeaksID in action over a live call or create a custom workflow that fits your needs.
Follow us
General inquiries
For general questions, potential partnerships or media inquiries, click to fill out the form below. We will reply as soon as possible.
Sales
Our sales team can answer questions, show you LeaksID in action over a live call or create a custom workflow that fits your needs.
When you click Submit button you agree with our Privacy policy
General inquiries
For general questions, potential partnerships or media inquiries, click to fill out the form below. We will reply as soon as possible.
When you click Submit button you agree with our Privacy policy