Plans and Services

Free, Premium, Small Business and Corporate Service

Discover the features of each type of user and choose the best for you:


For Individuals


3 different typs of users to adjust pricing to your necessities


Free

0Free
  • Up to 10 protections per month
    You can protect up to 10 files per month.
  • Permissions up to 10 users
    In all of your protections, you can grant permissions to a maximum of 10 users, either directly or by including them in groups of users.
  • Activity log history: only 1 day
    Activity events of files protected by you will be deleted within 24 hours of their occurrence.
  • Grant Permissions
    Read
    You can only grant read permission to others. Recipients with whom you share your protected files will not be able to edit them, etc.
  • Protonized folder functionality not available for Free users.
  • Free users can not limit the number of devices used by the recipients of their files.
  • Free users can not modify the watermark that appears in the files
  • Free users can not set validity time ranges for permissions.
  • Free users can not enable offline use of their protections.


Small Business Service


Up to 20 users


2 different typs of users to adjust pricing to your different employees and use cases

Basic user

10per month
  • Up to 30 protected files per month
    You can protect up to 30 files per month.
  • Permissions up to 50 users
    In the whole of your protections, you can grant permissions to a maximum of 50 users, either directly or by including them in groups of users.
  • 1 year activity log
    You can know who, from where, for what, has accessed to your files during the last year.
  • Read, Print, Edit, Copy Permissions
    You can grant any permissions to the other users: read, print, edit, copy or unprotect, management.
  • Protonized Folders
    Set up folders in your file system so that they are monitored by your Prot-On application and any files in the folder, or those you move to it will be automatically protected immediately and the permissions set in the folder will be assigned to the files.
  • Limit number of devices
    To prevent users from sharing their credentials with third parties, the owner of the file can:
    • avoid users can access a file from more than one device simultaneously
    • limit the maximum number of devices that can be used by each authorized recipient of the file
  • Watermarks
    Configure the watermark shown printing or viewing files:
    • set or remove a predefined fixed text
    • show or not at runtime the user accessing the file and the timestamp of the event
    • control the position and opacity of the watermark
  • Document validity (Period of Time)

    Define in which period of time the permissions assigned in the protection are valid.

    This period of time can be defined in two ways: between two fixed dates, or a period of time from the moment of protection.

  • Offline use
    Enabling offline use you allow to the recipient´s Prot-On application temporarily stores the file´s license of use, so that in the case of losing connection to the key server the user can continue working with the protected document for a maximum time set by you as owner of the protection.
  • The Basic user can not use the API or install Prot-On as a Windows service.

Enterprise user

69per month
  • Unlimited protections
    You can protect as many files as you want.
  • Unlimited permissions
    You can grant permissions to as many users as you need, either directly or by including them in groups of users.
  • 1 year activity log
    You can know who, from where, for what, has accessed to your files during the last year.
  • Read, Print, Edit, Copy Permissions
    You can grant any permissions to the other users: read, print, edit, copy or unprotect, management.
  • Protonized Folders
    Set up folders in your file system so that they are monitored by your Prot-On application and any files in the folder, or those you move to it will be automatically protected immediately and the permissions set in the folder will be assigned to the files.
    You can also use this functionality in Network Shared Folders
  • Limit number of devices

    To prevent users from sharing their credentials with third parties, the owner of the file can:

    • avoid users can access a file from more than one device simultaneously
    • limit the maximum number of devices that can be used by each authorized recipient of the file
  • Watermarks

    Configure the watermark shown printing or viewing files:

    • set or remove a predefined fixed text
    • show or not at runtime the user accessing the file and the timestamp of the event
    • control the position and opacity of the watermark
  • Document validity (Period of Time)

    Define in which period of time the permissions assigned in the protection are valid.

    This period of time can be defined in two ways: between two fixed dates, or a period of time from the moment of protection.

  • Offline use
    Enabling offline use you allow to the recipient´s Prot-On application temporarily stores the file´s license of use, so that in the case of losing connection to the key server the user can continue working with the protected document for a maximum time set by you as owner of the protection.
  • Prot-On as Service and API-REST use

    Allows the use of the REST API to integrate other applications or services with Prot-On.

    Allows you to install Prot-On as a Windows service to protonize shared network folders.


Corporate Service


Complete functionalities of the most complete IRM in the market.
No limit of protections or in the number of people with whom to share your information

Corporate
  • Unlimited protections

    You can protect as many files as you want.

  • Unlimited permissions

    You can grant permissions to as many users as you need, either directly or by including them in groups of users.

  • 10 years log activity

    Activity events of files protected by you will be kept for 10 years in the system accessible for information and auditing.

  • Read, Print, Edit, Copy Permissions
    You can grant any permissions to the other users: read, print, edit, copy or unprotect, management.
  • Protect and manage Folders

    Set up folders in your file system so that they are monitored by your Prot-On application and any files in the folder, or those you move to it will be automatically protected immediately and the permissions set in the folder will be assigned to the files.

    You can also use this functionality in Network Shared Folders

  • Limit number of devices

    To prevent users from sharing their credentials with third parties, the owner of the file can:

    • avoid users can access a file from more than one device simultaneously
    • limit the maximum number of devices that can be used by each authorized recipient of the file
  • Watermarks

    Configure the watermark shown printing or viewing files:

    • set or remove a predefined fixed text
    • show or not at runtime the user accessing the file and the timestamp of the event
    • control the position and opacity of the watermark
  • Document validity (Period of Time)

    Define in which period of time the permissions assigned in the protection are valid.

    This period of time can be defined in two ways: between two fixed dates, or a period of time from the moment of protection.

  • Offline use

    Enabling offline use you allow to the recipient´s Prot-On application temporarily stores the file´s license of use, so that in the case of losing connection to the key server the user can continue working with the protected document for a maximum time set by you as owner of the protection.

  • Prot-On as Service and API-REST use

    Allows the use of the REST API to integrate other applications or services with Prot-On.

    Allows you to install Prot-On as a Windows service to protonize shared network folders.

  • LDAP/Active Directory Integration

    Provisioning users and groups from LDAP or Active Directory.

    You can configure as many connections as necessary to apply different configurations.

  • 10 "consumer" users for FREE for each full featured user

    For each corporate user hired, the organization may have up to 10 only-consumer users, ie users who can only consume protected information, but can not protect or manage permissions. This makes it possible to extend the solution in a corporation without incurring an increase in costs, since usually no more than one tenth of the personnel of a company manages the protection of the information.

  • Web Single Sign On through SAML2

    Integration with identity managers through SAML2 protocol, this allows the web-SSO, double factor of authentication, control of formats and expiration of passwords, etc.

  • Information Classification

    Tool for Classification of Information Security according to levels predefined by the administrators and that may or may not involve encryption with Prot-On as well as the assignment of a specific security policy.

  • Version Inventory and Validation
    Once a file is protected, it can evolve in multiple versions. With this functionality the activity log will tell us which version each user is accessing, and we can view the version tree or disable versions that we consider invalid or obsolete.
  • Export activity events to SysLog

    Complementarily to save activity records in the database, Prot-On can export these events via SysLog protocol to log analyzers like SIEM systems.

    One or more SysLog servers can be configured for each Prot-On domain, and both, UDP, and TCP with TLS are supported.

Support
Back to Top