Each viewer sees a unique, invisible fingerprint embedded in the document. If someone screenshots or prints it, the identifier travels with the leak.
Every document view is logged with the viewer's email, IP address, device, and timestamp. You always know who accessed what and when.
When viewers know documents are traceable, leaks drop dramatically. The knowledge that a leak can be traced is often more powerful than any technical barrier.
"Peony is by far the simplest and most intuitive way to populate and share data rooms with investors and partners. All the key analytics and features integrated into a sleek interface!"
Mark Petrov
Head of Financials, Loop
Peony embeds invisible, per-viewer forensic watermarks into every document. Each viewer sees a unique identifier tied to their email and session. If a confidential file surfaces outside your control, you can trace it back to the exact person who leaked it using Peony audit trail.
A forensic watermark is an invisible identifier embedded directly into the document content. Unlike visible watermarks that can be cropped out, Peony forensic watermarks persist through screenshots, printing, and re-encoding. They are invisible to the viewer but fully traceable by the document owner.
Yes. Peony screenshot protection detects and blocks common screen capture tools on desktop and mobile devices. Combined with forensic watermarking, this creates a layered defense: screenshot attempts are blocked, and if someone bypasses the block with a camera, the forensic watermark still identifies the source.
Peony data rooms apply leak protection to every document in the room automatically. Each viewer receives unique forensic watermarks across all files they access, and every view is logged with their email, IP address, device, and timestamp. Peony also offers controlled redaction to permanently black out sensitive financial figures, PII, or proprietary terms before sharing with counterparties. This gives deal teams full traceability during M&A, fundraising, and due diligence.
Yes. Peony provides detailed audit trails that log every document access event, including the viewer email, IP address, device type, timestamp, and pages viewed. Combined with Peony page-level analytics, you get both engagement insights and security accountability in a single dashboard.
Legacy providers like Ideals and Firmex charge extra for forensic watermarking and often require enterprise-tier plans for screenshot blocking. Peony includes leak protection, forensic watermarks, screenshot blocking, and auto-indexing with full-text search and OCR on Pro ($20/admin/month, 200 GB) and Business ($40/admin/month, 1 TB) plans with no add-on fees.
No. Peony applies forensic watermarks during document processing, not at view time, so there is no impact on loading speed or viewer experience. Documents render instantly in the browser-based viewer with full watermark protection already embedded.
Yes. Peony leak protection works alongside password protection, NDA gates, link expiry, revoke access, two-factor authentication, and AES-256 encryption at rest with TLS 1.3 in transit on SOC 2-ready infrastructure. Peony is GDPR, CCPA, and HIPAA compliant. You can layer multiple security controls on any document or data room to match your confidentiality requirements without additional cost.
Add dynamic watermarks with viewer details to every page, deterring unauthorized redistribution.
Block screen captures and recording tools to prevent unauthorized copies of your documents.
Require email-based identity verification before anyone can view your shared documents.