ESIGN & UETA Compliant
eIDAS-Aligned
GCP Hardened Security

Enterprise-Grade Signatures. Startup-Friendly Pricing.

Join 500+ teams automating document logistics with ephemeral security, 60% average cost savings, and 100% data sovereignty.

Start Free(No card required)
Assess Risk2-min Security Audit
500+
Integrated Teams
10M+
Hardened Documents
60%
Average Efficiency Gain
4.9/5
Peer Review Average
IUSign Core Interface
IUSign Signing Interface
IUSign Control Center

Scale Document Logistics

Enterprise-grade visibility

Crypto-Chain Audit Log

Immutable Provenance

SHA-256 Chain Integrity

Engineered to outperform.

Capability FrameworkIUSignLegacy Vendor DLegacy Vendor S
Bulk Send Pipeline
Built-in / Unlimited
NoLimited
Domain White-labeling
Standard / Native
Enterprise OnlyNo
API Ecosystem
Developer-First / Full
Restricted / TieredRestricted
Envelope Surcharge
Non-existent
Usage-based FeesUsage-based Fees
GCP KMS Key Control
Included / Native
UnavailableUnavailable
Cryptographic Provenance
SHA-256 Chaining
NoneNone

Current Feature Matrix Verification: April 2026

Core Ecosystem

Full Stack. Zero Bloat.

Visual Document Preparation

Drag-and-drop signature, text, date, and checkbox fields directly onto your PDF. Upload PDF or DOCX — automatic conversion via LibreOffice.

Sequential Multi-Party Signing

Define signing order: Person 1 → Person 2 → Person 3. Each signer receives the document only when it's their turn.

Immutable Audit Trail

Database-level triggers physically prevent deletion or modification of audit logs. SHA-256 hash chain per event.

Change Request & Revision Workflow

Signers click anywhere on the PDF to place comment pins. You resolve, upload a revised document, and re-send — all version-tracked.

Full White-Label Capability

Custom logo, brand colors, organization name, custom email from address, custom domain with DNS verification. Per-tenant usage limits enforced.

Smart Email Delivery

Redis-backed queue with exponential backoff retry. 4 Jinja2 email templates with custom composer and variable substitution.

Stuck Document Detection

Automatically detects documents inactive for 7+ days. Status filters, manual reminders, and blocker identification.

Developer API & SDK

39 documented endpoints. Postman collection, Python SDK, Swagger UI, HMAC-signed webhooks with retry, idempotency support.

Secure by Architecture

Infrastructure-Level Trust

AES-256-GCM GCP KMS Envelopes

Your document is encrypted with a unique data encryption key (DEK) before it ever touches disk. The DEK itself is wrapped with a master key controlled in your GCP KMS instance.

Deploy Control Key
IUSIGN_KERNEL_X64
// GCP KMS ENVELOPE HANDSHAKE
STATUS: ENCRYPTED
MASTER: kms:global:ias:key/01
DEK_HASH: sha256:5e8...3a2
// ACCESS LOGGED VIA CLOUD AUDIT ✓

SHA-256 Hash Chain Integrity

Every signature event — envelope created, document viewed, signature applied — is cryptographically chained. If a single record is altered, the entire chain triggers a violation.

Validate Integrity
IUSIGN_KERNEL_X64
// CRYPTO-CHAIN VERIFICATION
EVENT: SIG_LOG_09
SIGNED_BY: MICHAEL ROBERTS
HASH: 0x82f0be...a12b
PREV: VIEW_LOG_08
DOCUMENT_RENDERED
HASH: 0x41e9d4...d94c
INTEGRITY: MATHEMATICALLY VERIFIED ✓

Ephemeral Zero-Persistence Flow

Raw document content exists only in temporary memory buffers during processing. We physically collect garbage (GC) and overwrite memory sectors after encryption.

Simulate Breach
IUSIGN_KERNEL_X64
// ZERO-PERSISTENCE STREAM
... allocating ephemeral_buffer [0x00FF23]
input_stream = io.BytesIO(encrypted_blob)
transformer.flatten(input_stream)
! EMERGENCY WIPEOUT INITIATED !
overwrite_sectors(0x00FF23, pattern=0x00, passes=3)
SOVEREIGNTY PRESERVED ✓

Immutable PDF Flattening

Signatures aren't just invisible overlays; they are physically burned into the document's structure at 300 DPI, creating a permanent, flattened forensic record.

Verify Provenance
IUSIGN_KERNEL_X64
IUSIGN ARCHITECTURE VERIFICATION
PROCESS_ID: 98264
status = service.verify("pdf-render")
Result: SUCCESS -- ENFORCED

Universal Evidence Package

Export a self-contained, court-ready JSON bundle containing all metadata, signer IP logs, intent capture, and the full hash chain provenance.

Download Bundle
IUSIGN_KERNEL_X64
IUSIGN ARCHITECTURE VERIFICATION
PROCESS_ID: 84422
status = service.verify("evidence-json")
Result: SUCCESS -- ENFORCED

HMAC-Signed Idempotent Pipelines

Webhooks aren't just POST requests. They are HMAC-signed for security and support idempotent retry logic to ensure your backend stays in perfect sync.

Test Endpoint
IUSIGN_KERNEL_X64
IUSIGN ARCHITECTURE VERIFICATION
PROCESS_ID: 95711
status = service.verify("webhook-flow")
Result: SUCCESS -- ENFORCED

Take control of your
document logistics.

Self-hosted ephemeral security, immutable audit trails, and 100% data sovereignty starts here.

Start Free(No credit card required)