Peony LogoPeony
Leak Protection

Know exactly who leaked your documents

Peony embeds invisible, per-viewer identifiers into every document. If a confidential file surfaces where it shouldn't, you can trace it back to the exact person who shared it.

Why teams use Leak Protection

Invisible forensic watermarks

Each viewer sees a unique, invisible fingerprint embedded in the document. If someone screenshots or prints it, the identifier travels with the leak.

Per-viewer tracking

Every document view is logged with the viewer's email, IP address, device, and timestamp. You always know who accessed what and when.

Deterrence by design

When viewers know documents are traceable, leaks drop dramatically. The knowledge that a leak can be traced is often more powerful than any technical barrier.

"Peony is by far the simplest and most intuitive way to populate and share data rooms with investors and partners. All the key analytics and features integrated into a sleek interface!"
MP

Mark Petrov

Head of Financials, Loop

Frequently asked questions

How does Peony detect and trace document leaks?

Peony embeds invisible, per-viewer forensic watermarks into every document. Each viewer sees a unique identifier tied to their email and session. If a confidential file surfaces outside your control, you can trace it back to the exact person who leaked it using Peony audit trail.

What is a forensic watermark?

A forensic watermark is an invisible identifier embedded directly into the document content. Unlike visible watermarks that can be cropped out, Peony forensic watermarks persist through screenshots, printing, and re-encoding. They are invisible to the viewer but fully traceable by the document owner.

Does Peony block screenshots?

Yes. Peony screenshot protection detects and blocks common screen capture tools on desktop and mobile devices. Combined with forensic watermarking, this creates a layered defense: screenshot attempts are blocked, and if someone bypasses the block with a camera, the forensic watermark still identifies the source.

How does leak protection work with Peony data rooms?

Peony data rooms apply leak protection to every document in the room automatically. Each viewer receives unique forensic watermarks across all files they access, and every view is logged with their email, IP address, device, and timestamp. Peony also offers controlled redaction to permanently black out sensitive financial figures, PII, or proprietary terms before sharing with counterparties. This gives deal teams full traceability during M&A, fundraising, and due diligence.

Can I see who accessed my documents and when?

Yes. Peony provides detailed audit trails that log every document access event, including the viewer email, IP address, device type, timestamp, and pages viewed. Combined with Peony page-level analytics, you get both engagement insights and security accountability in a single dashboard.

How does Peony leak protection compare to legacy data rooms?

Legacy providers like Ideals and Firmex charge extra for forensic watermarking and often require enterprise-tier plans for screenshot blocking. Peony includes leak protection, forensic watermarks, screenshot blocking, and auto-indexing with full-text search and OCR on Pro ($20/admin/month, 200 GB) and Business ($40/admin/month, 1 TB) plans with no add-on fees.

Does leak protection slow down document viewing?

No. Peony applies forensic watermarks during document processing, not at view time, so there is no impact on loading speed or viewer experience. Documents render instantly in the browser-based viewer with full watermark protection already embedded.

Can I combine leak protection with other Peony security features?

Yes. Peony leak protection works alongside password protection, NDA gates, link expiry, revoke access, two-factor authentication, and AES-256 encryption at rest with TLS 1.3 in transit on SOC 2-ready infrastructure. Peony is GDPR, CCPA, and HIPAA compliant. You can layer multiple security controls on any document or data room to match your confidentiality requirements without additional cost.

Make every document traceable

Enable leak protection in one click. No credit card required.

No credit card required