DRM Copy Protection Software for Documents, Files, Ebooks
Safeguard PDF Security stops unauthorized access & distribution of your PDF documents and files, controls what users can do with them, and how long they can be used. More...
PDF document protection with PDF DRM control for total document security
Safeguard PDF Security is PDF DRM software that controls access to and use of your PDF documents. Stop copying, modifying, printing (or limit the number of prints), and screen shots. Stop PDF files from being shared and distributed across the Internet. Control PDF expiry and revoke access to your secure PDF documents at any time. Lock PDFs to specific computers or USB devices, or enable Web Viewer use (no installation). Apply dynamic watermarks to prints and/or views.
Incorporate Safeguard PDF DRM security into your ecommerce system for secure 24×7 management of your protected PDF documents. Batch protect PDF files without user intervention for completely automated PDF protection. Less…
Enterprise rights management for large publishers & corporates who additionally need to log document usage, restrict location usage (IP access), make batch changes, customize & run reports. More...
Enterprise PDF DRM – control and audit PDF document use
Enterprise PDF Security is enterprise rights management software for larger publishers and corporate enterprises who need to administer a very large number of secure PDF documents, users, and publications.
Enterprise rights management has all the features of Safeguard PDF DRM Security plus a host of additional security and customization options for protecting PDF documents. The administration system additionally provides user and document auditing, reports, backups, license transfer, IP restriction, batch changes, etc. Less…
Automates the management of users and document access. Simple integration with your web sales process (payment, CMS, file management system, etc.). Learn more.
Command Line Encryption
Automates PDF DRM encryption without manual input or user intervention via a GUI. Commands can be run from the DOS prompt or a batch file. Learn more.
Make protected PDF documents available to users in a browser without installing a Viewer. Learn more.
Make protected PDF documents available on a USB stick without users installing a Viewer. Learn more.
Present your overall electronic image in the same way as your print image by branding our Secure PDF Viewer with your own logo. Learn more.
Custom Registration Email
Customize the License Registration email with your own logo, images, text, & user’s name for a more personal touch. Learn more.
Document Security Features
Our document security products stop your PDF files from being shared with unauthorized users, and control how they are used and how long they are used by authorized users. They protect your documents no matter where they reside ensuring you have full control over their use both inside and outside your organization.
Stop Document Sharing
Our document security software uses encryption, DRM and licensing controls to stop unauthorized sharing of your documents.
We do not use passwords to protect documents since they can be easily shared with others or simply removed using freely available password removal software. Documents are protected using unique encryption keys that are securely and transparently relayed to authorized devices from a cloud server and stored encrypted in a keystore on the local device. The keystore is locked to individual devices and will not function if it is copied and moved elsewhere. So if users try to share your protected documents with others the recipients won’t be able to open them as they do not have access to the decryption keys.
Protected documents can only be opened using our secure Viewer software which decrypts content in memory (using decryption keys from the keystore) and applies the appropriate DRM controls. Our secure Viewer software can either be installed on a device (Windows, Mac, iOS, Android), run from a USB stick (completely offline zero installation solution), or accessed via a web browser (zero installation).
Stop Document Printing
Our document security software stops printing by default. You can enable unlimited printing or limit the number of prints available.
You can stop printing for a document (for all users) when protecting it, and enable printing for individual users at a later date. Document watermarking is recommended if you allow printing to discourage photocopies of printed materials being made.
Safeguard stops ‘print to file’ so that if printing is allowed, users cannot print to PDF files, XPS, or any other unprotected file format.
Our secure document viewers stop screenshots being taken by Windows print screen and common third party applications.
No DRM product however can stop all screenshots (and of course users can just take photographs of the screen) so it is recommended that document publishers apply dynamic watermarks as a copying deterrent. If a user’s name and email are displayed on a screen shot they will probably be less likely to share it with others (this is especially true when uploading it to the Internet where they can be easily identified).
Lock documents to devices, domains, IPs
Our document security software locks documents to authorized devices so they cannot be used on other unauthorized devices.
You can also lock documents to a domain or an IP address range in order to restrict use to a specific location (e.g. an office) so that protected documents (stored for example on a laptop) will not open outside this location.
Secure Document Hosting & Distribution
Locklizard provides secure document hosting with Web Publisher (protected PDF files are stored on a cloud server either hosted by Locklizard or yourselves) or you can distribute protected documents as you would any other file.
Many providers offering secure document hosting protect your documents online so unprotected files are available on a server for a length of time before they are protected. Our secure cloud storage system (Web Publisher) protects documents locally (encryption and DRM controls applied) and then uploads them securely to a cloud server so they can never be compromised by server vulnerabilities.
If you prefer to host your protected documents then you distribute them like any other file (email, USB, web site download, etc.). Locklizard protected documents can only be opened by authorized users using our secure document Viewers. It does not matter who gets hold of your secure documents – unauthorized users won’t be able to open them – so you can make them freely available via a web site for download without worrying about password access controls.
For completely offline secure document distribution you can use Safeguard PDF Portable to distribute our secure Viewer and documents on USB sticks. Users can start using protected documents as soon as they receive their USB sticks without having to install any software. Additional protected documents can be added at a later date by authorized users when they become available without the USB stick having to be returned to you.
The administration system (where you create users and authorize document usage) can be hosted by Locklizard or on your own servers. This is separate from generating your secure documents (locally on your computer) so you have greater control over secure distribution of your documents and who has access to them.
You can automatically expire documents so they can no longer be used after a certain amount of time:
expire documents on a fixed date
expire documents after a number of days
expire documents after a number of views
expire documents after a number of prints
These options can also be used together – e.g. you can enter say a number of days/views/prints and a fixed date and whatever occurs first causes the document to expire.
Expiry dates can be changed on the administration system at any time and publishers can increase the number of views/prints available for each user.
Stop Copying, Editing, Saving
Our document security software stops users from saving documents in unprotected formats – there is no ‘Save As’ option or ability to convert to other file formats using third party software – so only copies of protected files can be made. A copy of a protected file is of no use to another user without the decryption key to open it. And decryption keys are stored encrypted in a keystore which is locked to the device it was registered on – so only authorized users can open protected documents.
There is no option that can be enabled in our secure document Viewers for users to edit or copy/paste content – there is no editing facility or copy paste option available and text cannot be highlighted for selection so it cannot be copied and pasted into other applications.
Revoke Documents & Users
Being able to revoke documents is an important part of any document security solution. There may be times when the wrong document was published, a user has left your company, a payment has been revoked, or you think a specific document has been compromised.
Our document security software enables you to revoke documents and/or users instantly. Documents can be revoked no matter where they reside.
Log PDF usage
With our Enterprise Rights Management solution you can log document usage and see when users have viewed and/or printed your documents.
This is useful if you want to check whether a particular user has viewed a document especially if they claim to have not received it.
No DRM system is fool-proof. Even if screenshots are prevented, users can take photographs of the screen using a camera. Similarly, if printing is allowed, users can print and scan back in printed documents.
To discourage users making copies of protected documents, you can apply dynamic watermarks to viewed and/or printed documents. By using dynamic variables, you only have to protect a document once for all users (rather than watermarking and protecting each document individually for each user) as user data (name, company, email, date/time, etc.) is inserted at view/print time.
Remote File Deletion
Some document security, PDF DRM, and Enterprise Rights Management products claim to be able to remotely delete files. However this is nothing more than a mere marketing ploy.
If a user has backed up the files before they were deleted then only the original file is deleted and not the backup. So the ‘deleted’ files will still exist. The important point is making sure a document is no longer usable and this can be achieved using expiry and revocation. If a secure document expires or is revoked it can no longer be used so any copy of the original is worthless to the user.
So while we do not provide remote file deletion in our document security products we do ensure access will cease when you decide.