Logo
Sign in
Product Logo
RDocsRPost

RDocs™ Document Security provides an Enterprise Digital Rights Management (EDRM) platform to protect, control, track, and revoke document access post-send.

Dynamic-Settings-for-RPDs.png
Temporarily-Expire-or-Re-Activate-Any-Document-at-Will.png
Capture-Sentiment.png
Security-strict-readers.png
Product details

RDocs™ protection empowers users to protect, control, track, and kill access to documents in-the-ether, even after sending. As the only EDRM platform built on 20 years of leadership in email security and compliance, it offers robust capabilities for managing sensitive content. The system converts any presentation or document into a Rights Protected Document file (RPD™ file), which allows senders to track reader activity or restrict access to specific viewers without requiring any companion software download or logins for readers. This platform enables comprehensive control over content sharing, allowing documents to be set for self-destruction on a timer, after a certain number of views, or to restrict sharing via print, copy, forward, or photo. Furthermore, RDocs™ provides the power to restrict document views by location, defining internet access points by reader domain, IP range, or geographic region. A key feature is the ability to control or 'kill' content even after it has been sent, making a document self-destruct without a trace or temporarily disabling viewing, which is crucial for managing accidental sends or sensitive information. Beyond security, the platform re-invents collaboration by enabling in-document interactivity, allowing users to track who views what, when, where, and for how long, as well as append notes and tally real-time feedback like votes and likes directly within the document. RDocs™ is unique for its user-friendliness, not requiring readers to download or log in, and for its patent-pending technology that preserves the normal flow of email while providing full rights controls. It also uniquely solves leak identification challenges by adding authorized reader visual identity tags (steganography) that traverse each viewed page, making it traceable if a snapshot is shared.

Features & Benefits

  • Control Document Access
    • Converts documents into RPD™ files, enabling senders to track reader activity or restrict access to certain viewers without requiring companion software or logins for readers.
  • Manage Content Sharing
    • Allows documents to self-destruct on a timer or after a number of views, and restricts sharing via print, copy, forward, or photo.
  • Restrict Views by Location
    • Enables senders to restrict the geography where a document can be viewed or define internet access locations by reader domain, IP range, or geographic region.
  • Control or Kill Content After Sent
    • Provides total control over documents even after sending, allowing users to make a document self-destruct without a trace or temporarily disable viewing.
  • Interact In-the-Document
    • Enables tracking of viewer activity (who, what, when, where, how long), appending notes, and tallying real-time feedback like votes, likes, and comments directly within the document.
  • Easy-to-Use DRM
    • Does not require readers to download, log in, or have any special software, ensuring an elegantly easy user experience.
  • Full Rights Controls
    • Offers comprehensive control over viewing access, duration, sharing, and tracking for any document sent to anyone, even after it has been sent.
  • Preserves Email Power
    • Designed to apply controls to any document within the normal flow of email collaboration, without requiring middle storage or companion downloads for readers.
  • Leak Identification (Steganography)
    • Uniquely solves the challenge of identifying who leaked content by adding authorized reader visual identity tags that traverse each viewed page, making leaks traceable.