logo

Document Sharing Reimagined.

Share your documents with security, control, and visibility at all times.

hero img

Start taking control of your documents.

Share your documents from any source with security, control, and visibility. Keep them under your control at all times while sharing.

Security

With end-to-end encryption, rest assured your documents will only be visibile to intended recipients.

Control

You control who can see what, where, when, and how. Combine controls for sophisticated scenarios.

Visibility

Monitor in realtime who is reading what, when, where, and for how long, at all times down to the page level.

Security

With end-to-end encryption, rest assured your documents will only be visibile to intended recipients.

Conditions affecting information access, who needs it, and the controls that determine who gets it are complex and ever-changing. Regardless of the complexity of your security requirements, Documi makes it easy to revoke access to any document from any user even if they were previously approved in real time.

Making sure that the information that you are sending out is going to the intended recipients is at the heart of what Documi does. Our system gives you end-to-end security and peace of mind at its core.

Fat fingering is one of the most common ways to have a data breach, and happens every day. A user can mistakenly share the most important information in an organization with a simple cache of the wrong name in an Outlook email. In Documi, you have complete control over who can open the document before and after the document is shared.

Transmitting documents to and through cloud service providers today uses encrypted tunnels to protect documents in transit through the internet, but inside of the cloud, your information is vulnerable to insider threats and breaches at the provider. With Documi, your documents are encrypted from the moment they leave your device until just before they are visible on screen on the devices of only those you choose to allow. In transit, in our servers, and in our storage, your documents are encrypted, and we do not have access to the keys.
Security

Control

You control who can see what, where, when, and how. Combine controls for sophisticated scenarios.

Control

Information access is contextual in nature which is why Documi allows you to create controls that specify exactly how a user can access your data, allowing you to customize the exact context and time that your information can be viewed.

In Documi, each condition is controlled via a cryptographic process using unique keys per document and controlled sections of each document. As an example, a control could be a time window of when the file is allowed to be accessed for embargo or exportation purposes. When the document is retrieved, the key will only be released if it is within the defined window. If the file is not within the time window, the request will not be approved, and the key will not be retrieved by the system.

By their very nature documents contain a multitude of data, not all of which should be available to the same people or at the same time. Today, when you share a file you have limited capabilities to control access to the document with no way to control specific parts of the document. Due to the lack of control, organizations try to solve this by using cumbersome security tools to limit what the recipient can print or save using legacy Digital Rights Management approaches.

Documi has reimagined what can be shared securely. As an example, when sharing the same document with three external partners, you can limit each partner to seeing only what they are allowed to see by role or function. What if you could share an agreement to acquire a company with finance and legal? In this case, the financial terms will be cryptographically protected from anyone viewing this outside of finance, so the legal team will not be able to access the financial terms of the contract.

CSP’s limit file access with basic controls such as password protection and/or number of times accessed. The sharing controls are typically blunt versus prescriptive in nature. Let’s say you have an office in Switzerland and the organization wants to ensure the data can only be accessed within the country.

Since Documi knows from where information is being accessed, we will use the device’s geolocation to determine if the external party is in Switzerland to release the key to the device to allow the file to be opened. If the user is not currently located in Switzerland, the file can not be accessed.

Visibility

Monitor in realtime who is reading what, when, where, and for how long, at all times down to the page level.

When sharing information, there are many questions that we need to answer to ensure the productivity, security and controls are working without creating business friction. Everytime a document is accessed or attempted to be accessed, Documi informs the user of the what, why, how, and for how long the document was accessed.
Today, the users sharing information have limited controls and even less information to understand their effects. Enterprises often try to recreate this data with system-wide log files, but this information is never passed down to the end user. Using Documi, the user has complete visibility to understand what decision was made, what controls affected the decision, and what conditions triggered those controls to cause access to be denied.
Imagine if you have a critical meeting and you would like to ensure your team had access to the content and not only read the document but you could verify they read each section of the document in its entirety prior to the meeting.
Visibility