Cryptography Applied to DRM
docTrackr’s unique security solution overcomes last-mile challenges to enable document security and control, regardless of where documents are stored. docTrackr uses robust security mechanisms including dynamic access management and a patent pending Digital Rights Management (DRM) system coupled with strong symmetric AES encryption.
With docTrackr, users can proactively and re-actively control who can view confidential documents. The added level of control helps to prevent data loss and ensure your documents are secure with industry standard encryption technologies.
To provide additional document control, users can manage permissions policies on Excel, Word, PowerPoint and Adobe PDF files, after they have been shared. Our advanced DRM technology empowers you to encrypt, set access levels and remotely update document security settings and access permissions.
Powerful Encryption and Authentication
Employ Unique Encryption Keys
docTrackr provides unique encryption keys for every document. These access keys are distributed to individual users over a secured channel. Each key is specific, so if an encryption key is compromised, a user cannot use the key to access multiple documents. This makes each document unique from a security perspective. Read more on our security architecture page.
Add industrial strength authentication to every document so files cannot be compromised. Key delivery and authentication are ensured by Adobe and Microsoft. Both technologies are embedded within Adobe Acrobat, PDF Reader and Microsoft Office file formats.
Decide when you want to protect company financial data, legal and other business documents. In addition to dynamically changing view, print, or edit permissions, users can choose whether files should be limited to specified recipients, or accessible to anyone. Publicly accessible documents can be shared and opened by anyone, but can still be tracked and destroyed.