Auditable, targeted fingerprinting and leak detection.

Other leak detection and fingerprinting software uses metadata, cannot identify leakers, and can easily be removed. With LeakSeek, email and document content is augmented per-user to generate unique fingerprints we can compare to leaks using industry standard fingerprinting algorithms.
With LeakSeek, your content IS the watermark.

Seamless no-touch integration with industry leading software

    • GSuite
    • Microsoft Exchange
    • Microsoft
    • Microsoft Word
    • Google Docs
    • Google Drive

Everything you need to protect your documents and identify leakers.

All without leaving your favorite mail client, or even a single extra click.

Software can be configured to automatically watermark emails, sending unique watermarked version to each recipient without, without any intervention required.

Robust fingerprinting, without the traditional downsides.

Because having document security shouldn't mean compromising your data security model.

Tamperproof Watermarking

LeakSeek fingerprints content by modifying the content itself, not by attaching metadata.

This means that watermarks cannot be removed without mangling the document so severely that it can no longer be considered fair representation.

Fingerprint Without PII

We only store second order metadata, leaving the rest to providers you already use and trust.

LeakSeek doesn't store any PII. We only store document fingerprints and anonymous tokens that can be retroactively tied back to leakers by administrators.

Fingerprint Tracking

Track and analyze trends with powerful analytics

Analyze and identify trends across teams and individuals to trace leaks back to the source and stop them.

Get started today

It's time to take control of your data. Simultaneous identify leakers, lower the market value of leaked data by making it more difficult to verify, and disincentivize future leaks.

Request a demo

Simple pricing, for everyone.

It doesn’t matter what size your business is, our software won’t work well for you.

Starter

Good for anyone who is self-employed and just getting started.

Free for first 60 days, then $15/month, plus per word processing fee

  • Up to 10 recipients/email
  • One administrator account
  • Up to 100 emails/month
  • Leak source identification
  • Document similarity analysis
  • No-touch integration with GSuite and Microsoft Exchange
  • $1.50 per 100k words processed
Get started

Small business

Perfect for small / medium sized businesses.

$30/month

  • Everything in the Starter plan
  • Up to 50 recipients/email
  • Up to 500 emails/month
  • Leak source tracking across multiple email batches
  • PDF Reports
  • $1.00 per 100k words processed
Get started

Enterprise

For even the biggest enterprise companies.

Flexible pricing, contact us for details

  • Everything in the Small business plan
  • Unlimited recipients/email
  • Unlimited emails/month
  • Direct API access
  • Optional on-premises hosting
  • Custom ML/AI model integration
  • Customizable reports
  • Role-based access control
Get started

Frequently asked questions

    • How does LeakSeek watermark documents and emails?

      LeakSeek generates unique copies of content per recipient. LeakSeek uses industry standard fingerprinting and comparison algorithms tested and proven in academic fields for plagiarism detection. The fingerprints themselves are accomplished through state-of-the-art AI/ML text modification that cleanly hides fingerprinting. With LeakSeek, the text of the email IS the fingerprint.

    • What information does LeakSeek store?

      LeakSeek stores only second order metadata and document fingerprints. That boils down to unique document fingerprints that contain none of the original content or structure and anonymized recipient IDs that can only be correlated using data stored by your organization.

    • How do I purchase a copy of LeakSeek?

      LeakSeek is currently available for trial on a per-request basis. Please request a demo if you are interested in participating in the closed beta program.

    • Can watermarks be detected?

      The only way to detect LeakSeek watermarks is by comparing multiple copies of the same document distributed to different participants. Even then, the watermarks are indistinguishable from minor edits and revisions.

    • Can watermarks be removed?

      Without access to the master copy, the only way to ensure the watermark is removed is to completely modify all of the document text to the point where it can no longer be considered fair representation.

    • How does LeakSeek identify leakers?

      Each document recipient receives their own unique copy of the document with a unique watermark. If that copy leaks, it can be traced back to the recipient. Fingerprints can also be compared against multiple other fingerprints, so if multiple leakers pool documents together the result will match all of them.

    • How does LeakSeek differ from existing watermarking software?

      Existing watermarking software relies on embedding metadata in files or inserting space between words. This is not only easy to detect but easy to circumvent as well. LeakSeek makes small and inconsequential but unique modifications to the text of the document itself.

    • Can LeakSeek be hosted on premises?

      Yes, there is a self hosted version of LeakSeek available for enterprise use.

    • How does LeakSeek use AI? Can I use my own AI models?

      LeakSeek uses in-house technology we call SAGE - Syntax Adjustments for Genuine Expression. This ensures that document watermarks do not interrupt the natural flow of the document itself but it does not comprise the watermarking and fingerprinting algorithms themselves, which are deterministic and exist separately from SAGE. SAGE can be configured to use any AI model you like, including your own.