LAB Guard-S

PC Screen Security Solution

A post-tracking solution that can track screen captures and screenshots with invisible watermark layered on the PC screen

  • Build Type
  • Local
  • VDI
도입 필요성 이미지

The need for adoption

  • 1

    With various working environments like Cloud-based work and telecommuting, there is an increase in PC screen capture leakage

  • 2

    It is necessary to trace user information when information leakage occurs due to camera captures

  • 3

    Security incidents involving camera capture leakage are frequent in vulnerable environments like telecommuting and collaboration companies

Solution Process

*Same for Local & VDI

01

Solution Application

Invisible watermark solution setup

02

Solution Operation

Invisible watermark automatically layered when PC is running

03

User Leakage

Capture and leak PC screen

04

Post Tracking

User tracking through invisible watermark code

Solution Feature

  • Adjusting concentration

    Adjusting the concentration of invisible watermark according to policies

  • Policy management

    Setting invisible watermark for departments, personnel, etc. based on policies

  • Automatic execution

    Automatic layering of invisible watermark when PC is launched

  • Inaccessible to users

    Non-administrator users cannot delete or alter invisible watermark

  • VDI environment

    The solution can also be applied in a VDI

  • User awareness

    Awareness that tracking can occur even if it is not visible

  • Apply to all

    Layered across the entire PC screen for enhanced security

  • Statistics/History

    Providing logs for installation status, deletions, and more

The ultimate advantage

Enhancing user convenience while strengthening security

  • Expanding user convenience

    Unlike traditional watermarks, it is not visible, which can reduce user fatigue and improve work efficiency.

  • Security without blind spots

    The invisible watermark image is applied seamlessly to the entire screen and documents, preventing leaks through the gaps in the watermark-free areas.

  • Adjusting the watermark intensity based on security levels

    Adjusting the watermark density based on security levels such as position, department, and working environment allows you to establish a secure environment. In other words, increasing the watermark intensity enhances security by increasing the likelihood of tracking in case of leakage.

  • High recognition rate

    Even with geometric transformations (such as resizing, compression, etc.) and if only a part of the invisible watermark remains, data can be verified if even a single code is detected.

Demonstration Video