Imatag

Imatag

IMATAG
Vera

Vera

Fortra
+
+

Related Products

  • Curtain MonGuard Screen Watermark
    7 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    104 Ratings
    Visit Website
  • Birdeye
    4,950 Ratings
    Visit Website
  • Curtain LogTrace File Activity Monitoring
    4 Ratings
    Visit Website
  • Lenso.ai
    2 Ratings
    Visit Website
  • Air
    845 Ratings
    Visit Website
  • ThreatLocker
    681 Ratings
    Visit Website
  • Picsart Enterprise
    27 Ratings
    Visit Website
  • ManageEngine Log360
    163 Ratings
    Visit Website
  • Safetica
    409 Ratings
    Visit Website

About

IMATAG protects your visual content online, such as product images, brand visuals, licensed content, or sensitive files. Based on a patented technology of Invisible Watermark (or Forensic Watermark), it comes in two flavors: - IMATAG LEAKS, the first online solution for the identification of photo or video leaks, - and IMATAG MONITOR, the most reliable visual search solution to track the use of your content on the internet. How it works: The software discreetly places an imperceptible identifier at the pixel level of images or videos. This invisible watermark allows to identify your content on the web regardless if it has been resized, cropped or trimmed, posted on social media or copied via a screenshot. Used as a tracker, it is also able to trace the origin of a leak. Supports images (photos, renders, design), videos, and PDF. Available as SaaS via Web UI or API, or on premise software.

About

Your data will travel. Shouldn’t your security? Vera is powerful digital rights management software for ultimate data protection. Prevent costly intellectual property exposure and data breaches. Our leading digital rights management solution protects crown jewels, from design files to investor reports, everywhere they go. In today’s highly collaborative, cloud-based and mobile-centric work environment, Vera provides simple, flexible, transparent data security, enabling businesses of all sizes to protect any file, on any device, anywhere it travels. Automatically secure your sensitive data as it's shared internally, or externally with suppliers, partners and customers. Track every successful and unsuccessful access to sensitive data. Mitigate compliance risk with a full audit trail. Revoke access to sensitive data kept internally or externally at any point.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Brands, newswires, photo agencies, corporates

Audience

Companies and teams searching for a solution to securely share sensitive files and data

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

IMATAG
Founded: 2015
France
www.imatag.com

Company Information

Fortra
Founded: 1982
United States
www.vera.com

Alternatives

Alternatives

EaseFilter

EaseFilter

EaseFilter Technologies
Vaultize DRM

Vaultize DRM

Vaultize Technologies
xSecuritas

xSecuritas

xSecuritas, Inc
SkyDRM

SkyDRM

NextLabs

Categories

Categories

Digital Rights Management Features

Access Revocation
Audio / Video Protection
Distribution Management
Expiration Management
Image Protection
License Management
Location Control
PDF Protection
Software Application Protection
Subscription Management
Usage Tracking / Analytics
Watermarking

Brand Protection Features

Case Management
Domain Monitoring
Investigation Management
Marketplace Monitoring
Mobile App Monitoring
Paid Search Monitoring
Prioritization
Social Media Monitoring

Data Loss Prevention Features

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Public Relations Features

Article Author Database
Auto-Update Media Lists
Campaign Management
Clippings Management
Communications Calendar
Contact Management
Digital Asset Management
Direct Mail Management
Email Distribution
Press Monitoring
Press Release Builder

Reputation Management Features

Campaign Management
Gamification
Response Management
Review Generation
Review Monitoring
Sentiment Analysis
Social Media Metrics
Social Media Monitoring
White Label

Visual Search Features

Barcode Recognition
Catalog Management
Customer Activity Tracking
Filtering
Image Tagging
IP Protection
Mobile App
Optical Character Recognition
Product Recommendations
Product Search
Reverse Image Search
Video Search

Integrations

Lynx
Scrile Connect
Wedia
beSOURCE

Integrations

Lynx
Scrile Connect
Wedia
beSOURCE
Claim Imatag and update features and information
Claim Imatag and update features and information
Claim Vera and update features and information
Claim Vera and update features and information