Feature Matrix
Locktera’s core capabilities offer a comprehensive suite of security features designed to protect sensitive data and streamline file sharing processes
Core CapabilitiesCopied!
Share Files Securely with Private Link |
Securely share files with encrypted, password-protected links, customizable access permissions, and expiration dates to control who can view or download your data. |
Configure Security Parameters |
Adjust and customize security settings, such as encryption levels, access controls, and authentication methods, to protect your data and ensure compliance with security standards. |
File Level Security |
File-level security applies protection directly to each file, ensuring encryption and access controls are enforced no matter where the file is stored or shared. |
Restrict File Level Access |
Limit access to specific files by setting permissions, ensuring only authorized users can view, edit, or share the file, regardless of its location. |
Deny Access With Forwarding |
Prevent unauthorized access by blocking recipients from viewing a file if it's forwarded, ensuring only the original, intended users can access the content. |
Import Files From Any Storage Provider |
Seamlessly upload and import files from any cloud storage provider, allowing easy access and integration with your existing storage solutions. |
Revoke Access Remotely On Click |
Instantly disable access to a secure file from any location with a single click, ensuring immediate security control. |
Authenticate Viewer Prior to File Access |
Ensure that users are verified with proper credentials before they can view or interact with the file, enhancing security and access control. |
Share Data Files Via Chat Applications Securely |
Send files through chat applications with end-to-end encryption, ensuring that data remains protected and only accessible to authorized recipients. |
Storage Per User (GB) |
Storage allocated for each user. |
Private Cloud Storage |
Store your files in a dedicated, secure space with restricted access, ensuring complete privacy and protection from unauthorized users. |
Large File Sharing |
Effortlessly share large files ranging from 300 MB to 1 TB, with secure and reliable transfer, ensuring smooth delivery of data. |
SafeSend Request TM |
Send a secure link to your customer, allowing them to return data files that are encrypted directly on their device, ensuring safe and private file transfer. |
SSO, SCIM and RBAC Configuration |
Streamline user authentication and access control by integrating SSO for single sign-on, SCIM for provisioning and RBAC for role-based access management. |
Real-Time Data CollectionCopied!
Complete Real-Time Audit Trail |
Track and monitor all user activities in real-time, providing a comprehensive log of actions for enhanced security, accountability, and compliance. |
Page Engagement Duration |
Measure the amount of time users spend interacting with a specific page, helping to assess user interest and content effectiveness. |
Location & IP Address Data |
View detailed information about the user's geographical location and IP address, providing insights into access patterns and enhancing security monitoring. |
Block By Block Video Engagement Analytics |
Analyze viewer interaction at a granular level, tracking engagement metrics for each segment of the video to gain insights into audience behavior and content performance. |
Comprehensive File Access Audit Report |
Generate detailed reports that track and summarize all file access activities, providing a clear overview of who accessed files, when, and what actions were taken for enhanced security and compliance. |
Document Download Log |
Track and review a detailed history of all document downloads, including user information, timestamps, and file details, for better monitoring and security. |
Audit Report Of Files Accessed By Viewer |
Generate a detailed report of all files accessed by a specific viewer, including timestamps and actions taken, for thorough monitoring, security analysis and compliance. |
Core CapabilitiesCopied!
AES 256 Encryption Layer |
Protect your data with industry-leading encryption, ensuring that all information is securely encrypted using a 256-bit key for maximum privacy and security. |
Post-Quantum Encryption Layer |
Future-proof your data security with encryption designed to withstand attacks from quantum computers, ensuring long-term protection against emerging threats. |
Obfuscation Enhancement |
Add an extra layer of security by transforming sensitive data into a complex, unreadable format, making it more difficult for unauthorized users to interpret or misuse the information. |
End To End Encryption |
Ensure that data is securely encrypted during transmission, with only the intended recipient able to decrypt and access the content, protecting it from unauthorized access at all stages. |
IPFS Enhanced UUID |
Leverage a unique, decentralized identifier system that combines IPFS (InterPlanetary File System) with enhanced UUIDs for secure, tamper-proof file storage and retrieval. |
Data File Immutability Enforcement |
Ensure that data files cannot be modified or deleted after being stored, preserving data integrity and preventing unauthorized alterations. |
Configuragle Access Controls |
Customize and manage access control permissions to define who can access your files, providing flexible and granular control over data security. |
Files In Transit With TLS 1.3 Encryption |
Securely transfer files with the latest TLS 1.3 encryption, ensuring data integrity and confidentiality while in transit, protecting it from interception or tampering. |
Sender Verification |
Confirm the identity of the sender before granting access to shared files, ensuring that only authorized users can initiate transfers and enhance overall security. |
Decentralized Security |
Reduced single points of failure, enhanced resilience and security by ensuring no central vulnerability can compromise the system. |
Disabled Screen Print, Copy and Share |
Prevents 1 users from taking screenshots, copying, or sharing sensitive content, ensuring that data remains protected and limiting unauthorized distribution. |
Immutable Data Files |
Ensure that data files cannot be altered or deleted once created, preserving their integrity and preventing unauthorized modifications. |
Compliance ReportsCopied!
Platform User Audit Logs |
Track and review detailed logs of all user activities within the platform, including logins, actions, and changes, to ensure accountability and support security audits. |
Viewer Engagement Reports & Analytics |
Track and analyze viewer interactions with content, generating detailed reports to ensure adherence to compliance requirements and maintain audit-ready records. |
Privacy Law Compliance Reports |
Generate detailed reports to ensure your data handling practices comply with privacy regulations, such as GDPR and CCPA, helping you maintain legal and regulatory standards. |
Change Logs |
Keep a detailed record of all changes made to files, settings, or configurations, providing a clear history of modifications for transparency, accountability, and auditing purposes. |
Access ControlsCopied!
Restrict Access To View Only |
Limit user permissions to view content without the ability to edit, download, or share, ensuring data remains secure and unaltered. |
Limit Access To Date Range |
Restrict access to content within a specified date range, ensuring that files are only available for viewing or sharing during the designated time period. |
Restrict Access To Organization |
Limit file access to users within your organization, ensuring that only authorized personnel can view or interact with sensitive data. |
Designate Download Permission |
Control whether users can download files, allowing you to grant or restrict download access based on specific user roles or permissions for enhanced security. |
Access By Oauth 2.0 Authentication |
Enable secure, token-based authentication, allowing users to access secure files using their existing credentials from trusted third-party services, ensuring seamless and secure login. |
Restrict or Block Access By Location |
Control user access based on geographic location, allowing or denying access to content depending on specific regions or IP addresses for enhanced security. |
Limit Access By Number |
Restrict how many times an authorized viewer can access the data file, ensuring controlled and monitored usage. |
Restrict Access To Specific IP Address |
Limit access to your content by allowing only users from designated IP addresses to view or interact with the data, enhancing security and control. |
Block Access To Specific Locations and IP Address |
Prevent access to your data from specified geographic regions or IP addresses, enhancing security by restricting unauthorized or high-risk sources. |
Tiered Organization RolesCopied!
SSO, SCIM and RBAC Configuration |
Streamline user authentication and access control by integrating SSO for single sign-on, SCIM for provisioning and RBAC for role-based access management. |
Assign Licenses |
Allocate specific licenses to users, granting them access to designated features, tools, or content based on their assigned permissions and roles. |
Centralized Billing |
Consolidate all charges and account management into a single, unified billing system for streamlined financial oversight and easier expense tracking. |
Sub-Group or Role Permissions |
Customize access levels by assigning specific permissions to sub-groups or roles, allowing granular control over who can view, edit, or manage content. |
Group or Role File Ownership |
Assign secure file ownership to specific groups or roles, allowing designated users to manage access, permissions, and responsibilities for shared content. |
User ExperienceCopied!
Outlook Integration |
Seamlessly connect with Microsoft Outlook to secure files directly from your email, enhancing workflow efficiency and secure communication. |
Chrome, Safari, Edge, Firefox Browser Support |
Access and use the platform seamlessly across major web browsers, ensuring a consistent and optimized experience regardless of your preferred browser. |
Admin & User Tracking Dashboards |
Monitor and manage user activities and system performance through intuitive dashboards, providing real-time insights for both administrators and users. |
Custom Search Tags |
Create and assign personalized tags to files, making it easier to organize, search, and quickly retrieve content based on specific keywords or categories. |
All Common File Types Supported |
Upload, share, and manage a wide range of file formats, ensuring compatibility with the most commonly used document, image, video, and data types. |
No Video Compression |
Ensure that videos are shared and viewed in their original quality without any loss of resolution or clarity due to compression. |
Access Notifications |
Receive real-time alerts when your files are accessed. |
SupportCopied!
Live Chat Support |
Get assistance from our support team in real-time. Simply start a chat to resolve any issues or ask questions, and we'll guide you through the process. |
Priority Email Support |
Get faster response times for your inquiries with our dedicated priority email support. Send your questions or concerns, and we'll ensure they are addressed promptly. |
Phone Support |
Speak directly with our support team for personalized assistance. Call us for quick resolutions, troubleshooting, or any questions you may have. |
Dedicated Success Manager |
Enjoy personalized guidance and support from a dedicated expert who will help you achieve your goals and maximize the value of our services. |
Personalized Training and Onboarding |
Receive customized training sessions and onboarding support tailored to your needs, ensuring a smooth and effective start with our services. |
StorageCopied!
Storage Per User (GB) |
Storage allocated for each user. |
Egress Per User (GB) |
The amount of data transferred out of the system allowed per user. |
API Calls Per User Monthly (k) |
The allowed number of API requests made by each user per month. |
Maximum Users |
Maximum number of Users allowed. |
Single File Size Limit |
Defines the maximum allowable size to be encrypted in a single secured file. |
Private Cloud Storage |
Store your files in a dedicated, secure space with restricted access, ensuring complete privacy and protection from unauthorized users. |
Branded Document Viewer |
Customize the document viewing experience with your brand's logo and colors. |
Branded Custom Subdomain |
Create a personalized web address for your organization with a custom subdomain, reinforcing your brand identity and making access to your services more professional and recognizable. |
Branded Portal |
Fully customized portal with your organization's branding, including logos, colors, and design elements, to provide a cohesive and professional user experience. |
Additional API Calls |
Increase your API call limit by purchasing additional requests. Ensure seamless operation and avoid disruptions when your monthly usage exceeds the standard quota. |
Additional Storage and Egress |
Increase your Storage and Egress limit by purchasing additional. Ensure seamless operation and avoid disruptions when your monthly usage exceeds the standard quota. |
1 Browser capabilities may limit 100% enforcement For more information about the different tiers please visit our Pricing Page |