Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

IMATAG protects your online visual content such as brand images, product images, licensed content, and sensitive files. Based on a patented technology of Invisible Watermark (or Forensic Watermark), it comes in two flavors: - IMATAG Leaks is the first online tool to identify photo or video leaks. - and IMATAG MONITOR - the most reliable visual search tool to track the usage of your content online. How it works The software places an invisible identifier at each pixel of images and videos. This invisible watermark allows you to identify your content online, regardless of whether it has been resized or cropped, trimmed, posted on social networks, or copied via screenshots. It can also be used as a tracker to trace the source of a leak. Supports images (photos and renders, design), videos and PDF. Available as SaaS via API or Web UI, or as on-premise software.

Description

Device Control Plus Enterprise Software is designed to manage file access and device control. It features an intuitive interface that allows admins to classify USB and other peripheral devices in a way that is easy to use. It also has many data security capabilities, including the ability to restrict file copying and block unauthorized file transfers, as well as read-only file access. File shadowing and file tracing reports will also be generated to provide extensive visibility into device actions and forensic analysis on policy efficacy, network performance, and policy effectiveness.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Scrile Connect
Wedia

Integrations

Scrile Connect
Wedia

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$5.95 per user per year
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

IMATAG

Founded

2015

Country

France

Website

www.imatag.com

Vendor Details

Company Name

Zoho

Founded

1996

Country

India

Website

www.manageengine.com/device-control/

Product Features

Brand Protection

Case Management
Domain Monitoring
Investigation Management
Marketplace Monitoring
Mobile App Monitoring
Paid Search Monitoring
Prioritization
Social Media Monitoring

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Digital Rights Management

Access Revocation
Audio / Video Protection
Distribution Management
Expiration Management
Image Protection
License Management
Location Control
PDF Protection
Software Application Protection
Subscription Management
Usage Tracking / Analytics
Watermarking

Public Relations

Article Author Database
Auto-Update Media Lists
Campaign Management
Clippings Management
Communications Calendar
Contact Management
Digital Asset Management
Direct Mail Management
Email Distribution
Press Monitoring
Press Release Builder

Reputation Management

Campaign Management
Gamification
Response Management
Review Generation
Review Monitoring
Sentiment Analysis
Social Media Metrics
Social Media Monitoring
White Label

Visual Search

Barcode Recognition
Catalog Management
Customer Activity Tracking
Filtering
IP Protection
Image Tagging
Mobile App
Optical Character Recognition
Product Recommendations
Product Search
Reverse Image Search
Video Search

Product Features

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Alternatives

Alternatives

AccessPatrol Reviews

AccessPatrol

CurrentWare Inc.
LEAKBLOCK Reviews

LEAKBLOCK

LeakBlock.io