revoke individual user access to single, multiple, or all documents
revoke access automatically after a number of views and/or prints
Watermark
Add dynamic watermarks to viewed and or printed pages. Dynamic variables (date/time, user name, company name, email address) are replaced with actual user and system data when the protected PDF document is displayed and/or printed.
You only have to protect a document once in order to customize it for multiple users.
see what devices & operating systems users are using
Comply Law
Comply with legislation by controlling access and use:
Ensure only authorized parties can view confidential documents
Enforce document retention policies with automatic expiry
Log use for proof of when documents are viewed and printed
Benefits
Protect IPR, reduce costs, ensure compliance, gain new revenue:
Protect revenue and increase ROI – reduce losses and costs
Take control over your IPR, prevent document leakage & theft
No cost per document or user – one fixed price for unlimited use
Free Trial & Demo
“Fantastic product… outstanding support.”
“We would recommend Locklizard to others”
“The clear leader for PDF DRM protection”
“Our ebook sales have gone through the roof”
“Simple & secure – protects IPR from theft”
Trusted by:
An overview of document encryption and why DRM is needed for document control
What is document encryption?
Document encryption is the process by which documents are protected with cryptographic keys (a password, public key, token, etc.) so that only individuals with the corresponding decryption keys can open them. It is used to protect documents in transit (i.e. sent via email) and at rest (i.e. stored on a disk or in the cloud) from being accessed by unauthorized users.
Document encryption software
Document encryption software can either be:
standalone file encryption applications (like PGP, which encrypts any files and not just documents)
plugins to certain applications like Microsoft Office/Word or Adobe Acrobat which enable documents to be encrypted when they are saved to disk
online tools that enable you to upload documents and encrypt them on a cloud server
Not all document encryption is equal. Whilst most document encryption programs provide NIST-approved AES encryption, they vary with their protection methods – some provide password protection, some use hardware tokens, and others provide public key technology (PKI). Each scheme has its own pros and cons – passwords can be given away (and are often weak and therefore easily broken), tokens have to be distributed and maintained, and public key technology has to have a management hierarchy.
For further information on Adobe Acrobat encryption, see:
According to some politicians, if you have nothing to be worried about then you don’t need encryption! Strange. Historically, there were five groups of people who wanted encrypted documents:
Purveyors (traders)
Princes (the military)
Politicians (diplomats)
Paramours (lovers)
Popes
Unlikely though it may seem, purveyors come out top of the list. The earliest preserved writings were sales manifests on baked clay tablets, and early cryptographic documents included a recipe for pottery glaze. So maybe trade is the most important thing of all? Consider – the famous Enigma machine was first used in commerce before being taken up by the military. So, it is important to preserve commercial activity, and there is a lot more of that than all the others. It’s just so much less exciting.
You don’t need a lot of imagination to figure out that each group must have had information they want to share, but only with carefully selected people and not always on the same basis for each recipient. And you can also figure out that they would want to be sure that the information did not get into the wrong hands, was not changed or misrepresented, and could maybe be denied if necessary. And that is just what an encrypted file provides.
Encryption is the most valuable tool supporting our most common security requirements for internet-based transactions and communication. TLS (Transport Layer Security) relies on encryption to provide secure communications such as encrypted email and secure instant messaging. SSL encryption is ubiquitous for protecting information as it races around the networks from tablet to bank to merchant, or to anywhere else for that matter. Because of that, internet trade is underpinned by something that makes it all tick.
Document encryption isn’t just useful – it’s the essential technology for securing documents in today’s society on the onternet.
But here’s the rub:
Document encryption – the downside
Encryption works just fine if you can maintain an encryption key register – just like you do an email address book. That’s easy to say but evidently not so easy to do, otherwise the email suppliers would have cracked this one years ago.
There are two big problems with encryption that are difficult to solve. The first is that you need the keys of all the people you might want to send secret information to. And the second is that when they get the secret information from you, they can do just what they want with it.
Encrypted documents work splendidly when they’re in transit and at rest (stored on a device). The issue, however, is that the recipient can give the crown jewels to the enemy (either the encrypted document with the corresponding decryption key, or the decrypted document) and you can’t do anything about it. So, document encryption is the starting point, but it needs more functionality if it’s going to give you full document control.
As mentioned earlier, there can be a big management problem looking after and protecting all the cryptographic keys involved in the encryption process. The solution to this is a management system that is based upon both users and documents, and that manages all the keys secretly – actively preventing the users from getting involved in a complicated system that can all too easily go wrong.
Ultimately, although we need encryption to protect a document while it travels around the network or sits on a hard drive somewhere, we also need ways of controlling what can be done with the content once the document has been opened – and that can be achieved with Digital Rights Management (DRM).
“The ROI for us is incalculable. We have the security of knowing that our proprietary documents are secure. This is the entire value of our company.
The ease with which I was able to implement your PDF document DRM product in to our company was surprising.”
DRM has to be both available to the application using the document, and implemented in it by design so that weaknesses are not exposed.
Computer applications (apart from those doing encryption) were usually not designed with document security control in mind – mostly they were designed to get to market as rapidly as possible while allowing quick and easy document copying. Another consideration was speed of operation. Complex application packages are large and use a lot of processing, usually rendering images onto the screen or manipulating large data in memory or on disk (where they would make uncontrolled copies of the documents to speed up performance).
This makes things difficult for document DRM providers, as they are obliged to either find some way of bootstrapping themselves into the applications, or use Systems Development Kits (SDKs) and handle the business functionality themselves. Naturally, both methodologies have been used.
Bootstrapping yourself into someone’s application works in one of two ways. You can either reverse engineer into the application (difficult and may cause litigation in some jurisdictions) or, if the manufacturer allows it, plug-in to their functionality (usually requires a licensing deal, which can be quite complex).
Both of these approaches present problems. If you have reverse engineered into an application and the applications provider changes anything, what you are doing will probably cease working immediately. The same applies to plug-ins, where the locations will likely change, again meaning that everything stops working. This will likely leave your customers very unhappy.
There are also problems for these types of implementations if document locations within the data storage of the application change, and it can be difficult to maintain security/integrity if new unencrypted copies of the document are created by the application, even as temporary files.
A more secure approach to implementing DRM controls into applications is to develop a custom DRM application using appropriate Software Development Kits (SDK). There are many reasons why this is a more secure and reliable approach.
If you plug in to another architecture, you face the problem of trying to prevent users accessing commands. For instance, in Microsoft Word, after highlighting some text you can copy it using Alt + E + C, Ctrl + C or using the appropriate mouse clicks. You can also “Save As” a document using Alt + F + A or using the toolbar. Using an SDK instead allows the DRM provider to determine what functionality they are going to support and how it is being implemented. They can be sure that there are no unencrypted copies of files created or left on hard drives, that memory used for decryption is not transferred to a swap file, and control how text and images are rendered to the screen (some systems send text as text and others as graphics – which is more difficult to copy back to text). The DRM provider can even not implement certain functionality such as editing so that there is no way to enable it.
Another advantage of using an SDK is improved stability. Product manufacturers are continuously making changes to their products, and according to Gilb’s hypothesis (on unreliability), every time a bug is fixed the fix creates one new bug that can be found and one that likely cannot. This may not be strictly accurate, but it’s true that from a security standpoint, the more changes that are made, the more new bugs are introduced. Unless there is a security reason to make a change (say it stops working) it is more reliable for users not to have updates, or, if you must, alter the smallest system where you will do the least damage.
This may sound negative, but consider that the PGP encryption system is well known and widely implemented, and very stable and reliable. It is also very small, with limited functionality. And that is why it is so successful. Though new functionality is exciting, the more systems that interact with a tried and tested security mechanism, the more vulnerable it tends to become.
How to encrypt a document using Locklizard Safeguard
Though it is more effective than standard encryption, creating a encrypted file with Locklizard is no harder. The process takes less than a minute:
Right-click on a PDF file on your desktop and select “Make secure PDF”.
Protect the PDF from copying by ticking the relevant controls. We recommend that you add a watermark to discourage sharing. Safeguard creates permanent dynamic watermarks that identify users and their devices.
Locklizard PDF will automatically protect a PDF reader from copying text and images, but you may want to take additional steps to protect your PDF from screen capture. Without screen capture protection, a user can screengrab your PDF and import it into an optical character recognition tool to make the text editable. To prevent this, open the “Environment Controls” tab and tick “Disallow screen capture” and optionally “Add screen mask” which covers the viewer window with an image if focus is moved away from it.
Press the “Publish” button at the bottom of the dialog.
Locklizard will automatically protect a PDF from editing on publication for anybody who has access to it. This restriction cannot be bypassed, and as the user cannot make a copy of the document, they won’t be able to clone it and edit that, instead. On publication, your document will output to its source folder in the .pdc file format and you can safely share it knowing that nobody can access it without a valid license.
A summary of document encryption and DRM
Document encryption (preferably using a strong and reliable method such as that used by PGP) is a critical tool for protecting document contents. But it needs to be allied to a DRM system that can enforce a limited set of controls so that document owners can specify what is allowed once the content is decrypted. When the document is decrypted, it should only ever occur in memory so users cannot grab content from temporary files on disk. Document DRM applications should also lock decryption keys to devices so they cannot be readily shared – note that this cannot be achieved if the system uses passwords that are known to the user (since these can be shared with other users).
A document DRM system must itself be compact and reliable if it is going to deliver the expected results and not be effected every time a major application manufacturer makes changes. So, document encryption is the essential building block for document security, but successfully implemented DRM technologies are required to integrate with document encryption and application functionality.
Further reading on encryption
To learn more about encryption, please take a look at the following white papers.
US Gov Strength PDF Security – Encrypt documents without passwords
Locklizard takes your document protection seriously – we encrypt PDF documents with US Gov strength AES encryption and use licensing controls and DRM security to control document use.
What’s the best way to send an encrypted document?
If a document is encrypted securely, it doesn’t matter too much how you distribute it: Google Drive, Outlook, Slack, etc. as the document can only be opened by those with the decryption key. It’s worth noting, however, that encryption that relies on passwords (Adobe, Word etc.), is not considered secure, and you may have to be more cautious as a result. If you do not use a very long, secure, password, then the document may be able to be opened in seconds, minutes, or hours.
The best way to send an encrypted document is to protect it with a PDF DRM solution so that the encryption cannot be broken and it remains protected after it is opened.
How do I encrypt documents for email?
You can use a free encryption tool and share public keys with the recipient, but you’ll get more complete and convenient protection if you use document DRM instead. This way users won’t have/be able to share keys and your document will remain protected after it is opened by the recipient.
Locklizard does not allow you to encrypt a Microsoft Office document directly, but it is easy enough to export them as a PDF and encrypt that instead. This will provide more robust protection than Microsoft’s in-built encryption, which uses insecure passwords.
Does Google Docs encrypt documents?
Files uploaded to Google Docs are encrypted with 256-bit AES encryption, but since documents are automatically decrypted if somebody logs in with a valid user account, or has a valid link, this is of limited use. Google Workspace users can additionally encrypt documents with Workspace Client-side encryption. This disables collaboration and admins can optionally require users to log in with SSO. However, as printing is still available and anti-printing/editing controls can be bypassed through the use of JavaScript, a user can simply create an unencrypted copy of the document and share that instead. See How secure are Google Docs?
Is Word document encryption secure?
Microsoft Word enables you to password protect a Word doc to prevent opening. This is secure as any other password protection application. The controls used to restrict editing however are useless since they can be easily bypassed. See why you should not password-protect a Word doc.
Customer Testimonials
We needed to deliver e-book versions of our handbooks while not compromising on security and digital rights. Safeguard PDF security is easy to use and intuitive.
The implementation was painless and we now have a greener, more secure way of distributing training manuals.
Locklizard’s PDF protection is exactly as described – the features are highly effective and I would give it 5 stars.
I would recommend Locklizard to others - their security is simple to use and fit for purpose. It meets common needs of businesses who have information they want to protect.
We would be happy to recommend Locklizard to any company needing a flexible way to secure PDF files.
Safeguard PDF Security has provided us with a very workable solution for sharing of information in a secure fashion. The support has been excellent and very accommodating.
We can cut accounts for a user five minutes before his class starts and he is ready to go. Happy smiling customer, while we still have security and personalized watermarking.
I have immense respect for the product and Locklizard provide great customer satisfaction and service.
We would recommend Safeguard to other companies for its security, cost and ease of use. It does what we expected it to do and more.
Ease of use is a bonus and the implementation was very easy. The product manual is excellent and Locklizard staff are very accommodating.
We sell a highly valued educational product in an open and competitive market so it was important to ensure we had effective security to protect our digital rights.
We highly recommend Locklizard - a professional company with a competitive and professional PDF Security product.
We would absolutely recommend both Locklizard as a company, and Safeguard PDF Security. It has transformed our study materials to the next level.
Not only did this increase sales, but we also believe that it has increased our customers’ ability to learn, which is even more important!
We would recommend Locklizard Safeguard to other companies that need to protect PDF reports. Customers have found the process of accessing the protected documents to be seamless.
Implementation was easy and technical support has been very responsive to requests for help.
Our company would without reservation recommend Locklizard. Their document DRM software opens up delivery of our new products in a timely fashion while knowing that the content will remain secure.
The return on investment to our company has been immediately evident.
We use Safeguard to make sure that documents cannot be opened outside our local network or from a unauthorized computer in order to copy or print the documents.
It is the most feature rich, affordable, & simple to use PDF security product on the market.
Safeguard PDF Security is simple to administer and meets our needs, consistently delivering secured manuals to our customers with ease.
Return on investment has been elimination of many man hours, printing resources and postage – it is estimated that costs decreased by 50% or more.
We would really recommend Safeguard PDF Security to every publishing company for managing ePubs or e-books securely. It is easy to secure PDF files and simple to distribute them to our authorized customers only.
Locklizard also provides a good customer support experience.
The ROI for us is incalculable. We have the security of knowing that our proprietary documents are secure. This is the entire value of our company.
I would most certainly recommend your PDF security product and already have. The ease of implementation was surprising.
We can now sell our manuals without the need to print them first, saving time, money and helping safeguard the environment.
We would recommend Safeguard PDF DRM – it is the perfect solution to sell and send e-documents securely whilst making sure someone cannot copy them.
We would recommend Locklizard to other companies without hesitation.
Their PDF DRM products provide a manageable, cost effective way to protect intellectual investment and they are always looking for ways to improve them. Moreover, their staff provide an excellent level of support.