RPost adds Double DLP and Cyber Attribution to PRE-Crime

July 17, 2025 / in News / by RPost Marketing

RPostPRE-Crime Preemptive Cybersecurity Powered by RAPTOR AI Called Visionary.

July 17, 2025 – Los Angeles, CA

RPost, a leading provider of intelligent content security solutions, today announced it has enhanced its PRE-Crime™ preemptive cybersecurity solution with more capabilities to remotely kill leaks and to attribute leaks to leakers, content, and cybercriminal cabals. These modules are powered by RPost’s RAPTOR™ AI that uses custom AI models and agents--including natural language processing (NLP), large language models (LLM) and machine learning (ML) --to pre-empt leaks and identify leakers and leaks-in-progress.

“We’re continuing to evolve our AI infused cybersecurity to meet the sophisticated use cases and security challenges that our enterprise customers are asking us to solve,” remarks RPost CEO Zafar Khan. “Email, document or other data-level leaks, unfettered, can provide insights to cybercriminals in their reconnaissance phase to juice-up hyper-contextual AI powered lures that all too often lead to business disruption, data exfiltration, corporate espionage, financial crimes, or worse. PRE-Crime can kill these leaks remotely and then attribute the leak to leakers, and identify the endgame of the threat actor to preempt risk.” 

Gartner Research recently named RPost a “Visionary” for its PRE-Crime preemptive cybersecurity solution, and Aragon Research positioned RPost in the “Leader” section of “The Aragon Research Globe™ for Intelligent Enterprise Content Management (iECM), 2025”.

Newly released PRE-Crime enhancements:

  • Double DLP™ with delivery pause and advanced LLM AI semantic analysis driven workflows. For content permitted to transmit to recipients (permissible to send via traditional first line DLP rules), en route or after delivery to recipients, RPost’s Double DLP™ AI will auto-pause before delivery or auto-kill content after delivery if the content is about to land in the wrong email address (mis-typed or impersonated) or about to be seen by the wrong eyes (naïve or malicious screen photo leaker, threat actor reconnaissance, or cyber espionage data exfiltration).
  • Cyber Attribution with LLM AI semantic analysis of message thread content to forensically attribute risk to insiders, external threat actors, and specific content. RAPTOR AI generates new data, curates data associated with a leak or threat, and then analyzes the content to provide insights, recommendations, and identity of the type of cybercriminals conducting their reconnaissance or working to sink their hooks in.

Pre-Crime

The Five Phases of PRE-Crime™ Preemptive Cybersecurity

RAPTOR™ AI: See the Unseen™ 

  1. Mass Metadata Collection Outside Endpoints
    Gathers behavioral data from interactions with emails and documents--both inside and outside your organization’s endpoints.
  2. AI-Powered Risk Analysis
    Uses custom AI models--including natural language processing (NLP), large language models (LLM) and machine learning (ML) --to pre-empt leaks and/or identify leaks-in-progress.
  3. Reconnaissance Data Curated
    Curates data breadcrumbs from both insider and external cybercriminal reconnaissance activities, even those occurring outside one’s network perimeter.
  4. Cyber Attribution Mapping
    Identifies naïve and malicious threat actors insiders or external attackers through AI-driven attribution. This includes attributing to users, devices, content, phishing authors, impersonators, and state-sponsored cabals.

DOUBLE DLP™ AI: Un-Leak Leaks™ 

  1. Agentic Leak Remediation & Double DLP™
    Proactively kills compromised content—email messages or documents—based on detected risks, stopping data leaks in their tracks. Psychologically deters leakers circumventing traditional DLP and document rights management with overt awareness and covert forensic attribution cemented to documents associated with each viewer by page view. And if leakers persist, proactively kills compromised content—email messages or documents—based on detected risks, stopping data leaks in their tracks.

PRE-Crime is additive to existing systems with common hook-ins to enterprise infrastructure:

  • Outbound Routing at Email Gateway - as email and attachments pass through on outbound path exiting endpoints or mail exchange servers. 
  • Document Repository API Connector - when documents are downloaded from sensitive systems. 

Top level use cases of PRE-Crime preemptive cybersecurity include: 

  1. Psychologically deter naïve and malicious leakers from circumventing traditional data leak prevention technologies (e.g., using screen photo capture or putting sensitive documents on memory devices).
  2. Pre-empt sophisticated threat actor reconnaissance that can lead to leaking of sensitive information at less resourced third parties and coalition partners.
  3. Attribute discovered leaks to leakers, content, cabals and systems, forensically.
  4. Un-leak leaks before seen to mitigate cost of remediation of devices and network servers that may have otherwise had access to the sensitive content.
  5. Generate evidentiary record of a leak un-leaked before seen thus proving non-breach. 

Unlike traditional defensive reactive cybersecurity and traditional data leak prevention and document retention tools, PRE-Crime provides offensive cybersecurity, identifying, deterring and neutralizing threats before they escalate negating risk and remediation costs. 

About RPost:

We’re the global leader in premium, feature-rich and more affordable eSignature and cybersecurity services, and we’ve been continuously innovating for our customers the world over since 2000. From within our three main platforms: RMail email security and compliance, RSign eSignatures and RDocs™ document security and intelligence, we’re everything our customers need when it comes to email, document and form security, compliance, and workplace acceleration — track, prove, eSign, encrypt, share, certify, control, cure. We do what no other company does — all in one.

We thrive on ensuring that we are artisans and experts in everything we do: secure and certified email encryption for privacy and compliance; eSignatures and web forms to ease digitization of workflows; eDelivery tracking to prove important communications; managed file transfer to simplify secure sharing of large documents and sets of files; document-level digital rights management to empower control of document access even after transmission; and AI-infused apps to prevent data leaks by minimizing human eSecurity errors and locking out cybercriminal from exposed content. This is why more than 25 million users have enjoyed our RMail, RSign and RDocs™ services for over two decades across 193 countries. Learn more at the RPost website.