Our blog

About us

  • Security Boulevard
    Going beyond watermarks to protect sensitive documents from illegal access
    Cyber threats continue to gain momentum and there are still not enough ways to counter it.
  • TechCrunch
    These are the 20 companies presenting at Alchemist Accelerator's 26th Demo Day today
    The enterprise-focused Alchemist Accelerator is hosting its 26th Demo Day today, with 20 companies expected to debut.
  • AiThority.com
    LeaksID Announced Collaboration With Microsoft, Providing OneDrive Users Sensitive Information Protection
    LeaksID, the cloud-based IT solution by G-71, announced its integration with Microsoft OneDrive for business, enabling its users to protect valuable data from leakage through screenshots and pictures of the screen, printed-out documents, and documents shared via email.
  • Medium
    How We Decided to Launch a Complex B2B Product on Product Hunt and Got Into The TOP-5
    Almost all articles about Product Hunt launches are dedicated to mobile applications, website builders, and entertainment portals. This article will share how we decided to go out with our complicated cloud-based B2B platform LeaksID. In addition, in the end, we added bonus templates that can help you.
  • Business Wire Inc.
    G-71 Launches LeaksID, an IT Solution to Protect Sensitive Data from Leakage
    LeaksID protects documents that contain sensitive information from leakage through email, being printed out, and taking screenshots or pictures of the screen. The solution is designed for both personal and corporate use.
  • G-71 Launches LeaksID, an IT Solution to Protect Sensitive Data from Leakage
    LeaksID protects documents that contain sensitive information from leakage through email, being printed out, and taking screenshots or pictures of the screen. The solution is designed for both personal and corporate use.
  • G-71 Launches LeaksID, an IT Solution to Protect Sensitive Data from Leakage
    G-71 launched a cloud-based IT solution with proprietary technology at its core that protects valuable data from leakage through screenshots, pictures of the screen, printed-out documents, and documents shared via email. LeaksID uses its patented algorithm that logs every file in a way that is invisible to the human eye.