Feature Matrix

Locktera’s core capabilities offer a comprehensive suite of security features designed to protect sensitive data and streamline file sharing processes

Core CapabilitiesCopied!

Share Files Securely with Private Link 

Securely share files with encrypted, password-protected links, customizable access permissions, and expiration dates to control who can view or download your data.

Configure Security Parameters

Adjust and customize security settings, such as encryption levels, access controls, and authentication methods, to protect your data and ensure compliance with security standards.

File Level Security

File-level security applies protection directly to each file, ensuring encryption and access controls are enforced no matter where the file is stored or shared.

Restrict File Level Access

Limit access to specific files by setting permissions, ensuring only authorized users can view, edit, or share the file, regardless of its location.

Deny Access With Forwarding

Prevent unauthorized access by blocking recipients from viewing a file if it's forwarded, ensuring only the original, intended users can access the content.

Import Files From Any Storage Provider

Seamlessly upload and import files from any cloud storage provider, allowing easy access and integration with your existing storage solutions.

Revoke Access Remotely On Click

Instantly disable access to a secure file from any location with a single click, ensuring immediate security control.

Authenticate Viewer Prior to File Access

Ensure that users are verified with proper credentials before they can view or interact with the file, enhancing security and access control.

Share Data Files Via Chat Applications Securely

Send files through chat applications with end-to-end encryption, ensuring that data remains protected and only accessible to authorized recipients.

Storage Per User (GB)

Storage allocated for each user.

Private Cloud Storage

Store your files in a dedicated, secure space with restricted access, ensuring complete privacy and protection from unauthorized users.

Large File Sharing 

Effortlessly share large files ranging from 300 MB to 1 TB, with secure and reliable transfer, ensuring smooth delivery of data.

SafeSend Request TM

Send a secure link to your customer, allowing them to return data files that are encrypted directly on their device, ensuring safe and private file transfer.

SSO, SCIM and RBAC Configuration

Streamline user authentication and access control by integrating SSO for single sign-on, SCIM for provisioning and RBAC for role-based access management.

Real-Time Data CollectionCopied!

Complete Real-Time Audit Trail

Track and monitor all user activities in real-time, providing a comprehensive log of actions for enhanced security, accountability, and compliance.

Page Engagement Duration

Measure the amount of time users spend interacting with a specific page, helping to assess user interest and content effectiveness.

Location & IP Address Data

View detailed information about the user's geographical location and IP address, providing insights into access patterns and enhancing security monitoring.

Block By Block Video Engagement Analytics

Analyze viewer interaction at a granular level, tracking engagement metrics for each segment of the video to gain insights into audience behavior and content performance.

Comprehensive File Access Audit Report

Generate detailed reports that track and summarize all file access activities, providing a clear overview of who accessed files, when, and what actions were taken for enhanced security and compliance.

Document Download Log

Track and review a detailed history of all document downloads, including user information, timestamps, and file details, for better monitoring and security.

Audit Report Of Files Accessed By Viewer

Generate a detailed report of all files accessed by a specific viewer, including timestamps and actions taken, for thorough monitoring, security analysis and compliance.

Core CapabilitiesCopied!

AES 256 Encryption Layer

Protect your data with industry-leading encryption, ensuring that all information is securely encrypted using a 256-bit key for maximum privacy and security.

Post-Quantum Encryption Layer

Future-proof your data security with encryption designed to withstand attacks from quantum computers, ensuring long-term protection against emerging threats.

Obfuscation Enhancement

Add an extra layer of security by transforming sensitive data into a complex, unreadable format, making it more difficult for unauthorized users to interpret or misuse the information.

End To End Encryption

Ensure that data is securely encrypted during transmission, with only the intended recipient able to decrypt and access the content, protecting it from unauthorized access at all stages.

IPFS Enhanced UUID

Leverage a unique, decentralized identifier system that combines IPFS (InterPlanetary File System) with enhanced UUIDs for secure, tamper-proof file storage and retrieval.

Data File Immutability Enforcement

Ensure that data files cannot be modified or deleted after being stored, preserving data integrity and preventing unauthorized alterations.

Configuragle Access Controls

Customize and manage access control permissions to define who can access your files, providing flexible and granular control over data security.

Files In Transit With TLS 1.3 Encryption

Securely transfer files with the latest TLS 1.3 encryption, ensuring data integrity and confidentiality while in transit, protecting it from interception or tampering.

Sender Verification

Confirm the identity of the sender before granting access to shared files, ensuring that only authorized users can initiate transfers and enhance overall security.

Decentralized Security

Reduced single points of failure, enhanced resilience and security by ensuring no central vulnerability can compromise the system.

Disabled  Screen Print, Copy and Share

Prevents 1 users from taking screenshots, copying, or sharing sensitive content, ensuring that data remains protected and limiting unauthorized distribution.

Immutable Data Files

Ensure that data files cannot be altered or deleted once created, preserving their integrity and preventing unauthorized modifications.

Compliance ReportsCopied!

Platform User Audit Logs

Track and review detailed logs of all user activities within the platform, including logins, actions, and changes, to ensure accountability and support security audits.

Viewer Engagement Reports & Analytics

Track and analyze viewer interactions with content, generating detailed reports to ensure adherence to compliance requirements and maintain audit-ready records.

Privacy Law Compliance Reports

Generate detailed reports to ensure your data handling practices comply with privacy regulations, such as GDPR and CCPA, helping you maintain legal and regulatory standards.

Change Logs

Keep a detailed record of all changes made to files, settings, or configurations, providing a clear history of modifications for transparency, accountability, and auditing purposes.

Access ControlsCopied!

Restrict Access To View Only

Limit user permissions to view content without the ability to edit, download, or share, ensuring data remains secure and unaltered.

Limit Access To Date Range

Restrict access to content within a specified date range, ensuring that files are only available for viewing or sharing during the designated time period.

Restrict Access To Organization

Limit file access to users within your organization, ensuring that only authorized personnel can view or interact with sensitive data.

Designate Download Permission

Control whether users can download files, allowing you to grant or restrict download access based on specific user roles or permissions for enhanced security.

Access By Oauth 2.0 Authentication

Enable secure, token-based authentication, allowing users to access secure files using their existing credentials from trusted third-party services, ensuring seamless and secure login.

Restrict or Block Access By Location

Control user access based on geographic location, allowing or denying access to content depending on specific regions or IP addresses for enhanced security.

Limit Access By Number

Restrict how many times an authorized viewer can access the data file, ensuring controlled and monitored usage.

Restrict Access To Specific IP Address

Limit access to your content by allowing only users from designated IP addresses to view or interact with the data, enhancing security and control.

Block Access To Specific Locations and IP Address

Prevent access to your data from specified geographic regions or IP addresses, enhancing security by restricting unauthorized or high-risk sources.

Tiered Organization RolesCopied!

SSO, SCIM and RBAC Configuration

Streamline user authentication and access control by integrating SSO for single sign-on, SCIM for provisioning and RBAC for role-based access management.

Assign Licenses

Allocate specific licenses to users, granting them access to designated features, tools, or content based on their assigned permissions and roles.

Centralized Billing

Consolidate all charges and account management into a single, unified billing system for streamlined financial oversight and easier expense tracking.

Sub-Group or Role Permissions

Customize access levels by assigning specific permissions to sub-groups or roles, allowing granular control over who can view, edit, or manage content.

Group or Role File Ownership

Assign secure file ownership to specific groups or roles, allowing designated users to manage access, permissions, and responsibilities for shared content.

User ExperienceCopied!

Outlook Integration

Seamlessly connect with Microsoft Outlook to secure files directly from your email, enhancing workflow efficiency and secure communication.

Chrome, Safari, Edge, Firefox Browser Support

Access and use the platform seamlessly across major web browsers, ensuring a consistent and optimized experience regardless of your preferred browser.

Admin & User Tracking Dashboards

Monitor and manage user activities and system performance through intuitive dashboards, providing real-time insights for both administrators and users.

Custom Search Tags

Create and assign personalized tags to files, making it easier to organize, search, and quickly retrieve content based on specific keywords or categories.

All Common File Types Supported

Upload, share, and manage a wide range of file formats, ensuring compatibility with the most commonly used document, image, video, and data types.

No Video Compression

Ensure that videos are shared and viewed in their original quality without any loss of resolution or clarity due to compression.

Access Notifications

Receive real-time alerts when your files are accessed.

SupportCopied!

Live Chat Support

Get assistance from our support team in real-time. Simply start a chat to resolve any issues or ask questions, and we'll guide you through the process.

Priority Email Support

Get faster response times for your inquiries with our dedicated priority email support. Send your questions or concerns, and we'll ensure they are addressed promptly.

Phone Support

Speak directly with our support team for personalized assistance. Call us for quick resolutions, troubleshooting, or any questions you may have.

Dedicated Success Manager

Enjoy personalized guidance and support from a dedicated expert who will help you achieve your goals and maximize the value of our services.

Personalized Training and Onboarding

Receive customized training sessions and onboarding support tailored to your needs, ensuring a smooth and effective start with our services.

StorageCopied!

Storage Per User (GB)

Storage allocated for each user.

Egress Per User (GB)

The amount of data transferred out of the system allowed per user.

API Calls Per User Monthly (k)

The allowed number of API requests made by each user per month.

Maximum Users

Maximum number of Users allowed.

Single File Size Limit

Defines the maximum allowable size to be encrypted in a single secured file.

Private Cloud Storage

Store your files in a dedicated, secure space with restricted access, ensuring complete privacy and protection from unauthorized users.

Branded Document Viewer

Customize the document viewing experience with your brand's logo and colors. 

Branded Custom Subdomain

Create a personalized web address for your organization with a custom subdomain, reinforcing your brand identity and making access to your services more professional and recognizable.

Branded Portal

Fully customized portal with your organization's branding, including logos, colors, and design elements, to provide a cohesive and professional user experience.

Additional API Calls

Increase your API call limit by purchasing additional requests. Ensure seamless operation and avoid disruptions when your monthly usage exceeds the standard quota.

Additional Storage and Egress

Increase your Storage and Egress limit by purchasing additional. Ensure seamless operation and avoid disruptions when your monthly usage exceeds the standard quota.

1 Browser capabilities may limit 100% enforcement

For more information about the different tiers please visit our Pricing Page