Join 500+ teams automating document logistics with ephemeral security, 60% average cost savings, and 100% data sovereignty.


Enterprise-grade visibility

SHA-256 Chain Integrity
| Capability Framework | IUSign | Legacy Vendor D | Legacy Vendor S |
|---|---|---|---|
| Bulk Send Pipeline | Built-in / Unlimited | No | Limited |
| Domain White-labeling | Standard / Native | Enterprise Only | No |
| API Ecosystem | Developer-First / Full | Restricted / Tiered | Restricted |
| Envelope Surcharge | Non-existent | Usage-based Fees | Usage-based Fees |
| GCP KMS Key Control | Included / Native | Unavailable | Unavailable |
| Cryptographic Provenance | SHA-256 Chaining | None | None |
Current Feature Matrix Verification: April 2026
Core Ecosystem
Drag-and-drop signature, text, date, and checkbox fields directly onto your PDF. Upload PDF or DOCX — automatic conversion via LibreOffice.
Define signing order: Person 1 → Person 2 → Person 3. Each signer receives the document only when it's their turn.
Database-level triggers physically prevent deletion or modification of audit logs. SHA-256 hash chain per event.
Signers click anywhere on the PDF to place comment pins. You resolve, upload a revised document, and re-send — all version-tracked.
Custom logo, brand colors, organization name, custom email from address, custom domain with DNS verification. Per-tenant usage limits enforced.
Redis-backed queue with exponential backoff retry. 4 Jinja2 email templates with custom composer and variable substitution.
Automatically detects documents inactive for 7+ days. Status filters, manual reminders, and blocker identification.
39 documented endpoints. Postman collection, Python SDK, Swagger UI, HMAC-signed webhooks with retry, idempotency support.
Your document is encrypted with a unique data encryption key (DEK) before it ever touches disk. The DEK itself is wrapped with a master key controlled in your GCP KMS instance.
Deploy Control KeyEvery signature event — envelope created, document viewed, signature applied — is cryptographically chained. If a single record is altered, the entire chain triggers a violation.
Validate IntegrityRaw document content exists only in temporary memory buffers during processing. We physically collect garbage (GC) and overwrite memory sectors after encryption.
Simulate BreachSignatures aren't just invisible overlays; they are physically burned into the document's structure at 300 DPI, creating a permanent, flattened forensic record.
Verify ProvenanceExport a self-contained, court-ready JSON bundle containing all metadata, signer IP logs, intent capture, and the full hash chain provenance.
Download BundleWebhooks aren't just POST requests. They are HMAC-signed for security and support idempotent retry logic to ensure your backend stays in perfect sync.
Test EndpointSelf-hosted ephemeral security, immutable audit trails, and 100% data sovereignty starts here.