RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Secret Screen Guard

Product
Developers: Secret Technologies
Branches: Information security
Technology: Information Security - Information Leakage Prevention

White Paper: DLP - Data Loss/Leak Prevention

Screen Guard is a system designed to reduce the risks of information leakage by photographing the screen. The solution implements invisible marking of the image on the user's screen, which allows you to identify the source compromises. data

2025: Inclusion in the register of domestic software

Secret Technologies on July 21, 2025 announced the inclusion of the Screen Guard information leak prevention system in the Register of Domestic Software.

The inclusion of Screen Guard in the Register of Domestic Software gives customers a number of advantages: the solution can be purchased by state institutional institutions of restrictions, as part of the fulfillment of requirements for import substitution and priority purchase of Russian products. In addition, organizations receive confidence in compliance with the product safety standards and the requirements of Russian legislation.

Screen Guard features:

  • Use a stealth mask on a screen image in which identification information is encrypted for subsequent investigation.
  • Detection of the source of information leakage using a special [[

collateral]].

  • Conducting investigations on both screenshots and screen photos, including

cases of distortion or poor image quality.

The advantages of implementing Screen Guard for business are to reduce losses, related to leaks of confidential information. The solution allows you to quickly identify violators and prevent repeated incidents, which contributes to the increase in the general security of the company and the preservation of its reputation. Also in companies where Information leakage prevention system is in operation, employees demonstrate significantly less risk of unauthorized data dissemination, further reducing the risks of internal threats.

Screen Guard is chosen, as the product works even on low-power devices such as call centers and outlet terminals, and supports both automatic and manual incident investigation.