Full Function PDF Editing - Insert new pages or delete old pages, insert new text with
embedded or non-embedded fonts, insert lines, add filled or non-filled rectangles or
ellipses, and insert images and graphics.
Floating Panes - Customize your workspace by floating and moving the Bookmark
Panel and Property Panel to any ideal position of the page.
Rulers and Grids - Provides horizontal and vertical rulers and grids to help users align
and position objects precisely on the page, as well as measure the dimensions of the
shapes. The Snap to Grid function automatically positions text and other objects to the
closest intersection of the grids as you place or move them on the page.
Easier PDF Text Setting Actions - Set the attributes of the text in the PDF by using
“Add new text objects” dialog box directly, including font, color, size, horizontal scale, line
gap, and more.
Securing PDF Documents
The security features of PhantomPDF give users exceptional control. To provide adequate
protection for content of a PDF, you can encrypt and secure the PDF to prevent unauthorized
access and safeguard sensitive data.
s PhantomPDF, you can add password protection, certificate protection, Microsoft AD
RMS protection, and security restrictions to PDF files, limiting who can open, copy, modify (edit and
annotations), or print the document.
Redaction allows authors to permanently remove sensitive information from document prior
to distribution. Once text or objects are redacted, they have been permanently deleted and
can never be revealed.
Password encryption enables authors to add a password to a PDF document to limit
access to and/or restrict certain features, such as printing, copying and editing. Access is
provided only to the viewers who input the correct password specified by the author.
Certification encryption enables authors to provide access to only a specific set of users
whose identities can be verified and managed can have access to the document. A
certificate that contains public key and other identifying information is used to encrypt
documents. Only viewers with corresponding private keys can decrypt the document that
was encrypted using the certificate and obtain access to the document. Generally, if possible,
encrypt document using certificates from third- party provider. The advantage of securing