Self-serve access for one organisation with policy-governed sharing and operational audit visibility.
- Controlled sharing
- Limited user seats
- Policy enforcement
- Audit trail
Sovereign DRM and content governance for regulated environments. Persistent encryption, runtime policy enforcement, and evidence-grade audit integrity — designed for CISO review and government procurement.
Content is uploaded, integrity-hashed (SHA-256), and stored in object storage. The original file never leaves the server.
Expiry, view limits, watermarking, passcode, and OTP constraints are set per share link. Policy is evaluated on every access.
Recipients view server-rendered previews. Every access is logged. Signed audit bundles provide tamper-evident proof of who accessed what, when, and under what policy.
Every share is a runtime policy decision — expiry, view limits, watermarking, and revocation enforced on every request.
Immediate revocation with zero cache windows
Server-rendered previews with hardened headers — recipients never receive the original file.
No-store, no-embed, no-cache on every response
Signed bundles with HMAC integrity, snapshot hashes, and offline verification for auditors and assessors.
Tamper-evident export verified with standard tools
Every query is tenant-scoped by design — cross-tenant access returns 404, not 403.
Application-enforced isolation with RLS roadmap
Scoped API keys, HMAC-signed webhooks, and a structured event catalog for embedding DRM into existing workflows.
7 API scopes, 6 webhook event types
AU-region hosting with SCP guardrails, encryption key separation, and immutable audit storage for regulated environments.
Region-locked to ap-southeast-2 via Service Control Policy
Commercial options are structured for governance maturity. Start with a self-serve single organisation plan or engage our enterprise team for advisory-led implementation.
Self-serve access for one organisation with policy-governed sharing and operational audit visibility.
Advisory-led commercial model for multi-team governance, sovereign controls, and tailored entitlements.