EU Data Protection Regulation

Check what it means for your business and how SealPath can help you

Read more

SealPath Information Rights Management

Your data protected and under control. Wherever they travel

Read more

Automatic IRM protection of information repositories.

Automatically protects documentation on file servers, SharePoint, Office 365, Alfresco and other document managers. Adds persistent security to your collaboration tools.

Read more

Office, PDF, CAD, etc.

The most widely used format support on the market that works with native tools.

Read more


Persistent encryption that accompanies the files and emails wherever they travel.



It controls who accesses the data, when and with what permission (read only, edit, etc.).


Monitors accesses and alerts on your organisation’s documentation wherever it may be.


Employees who take information with them when they resign or are dismissed.


Organisations that lack a mature method for tracking and controlling their confidential information.


Leaks in which the data extracted was encrypted and therefore useless.


Companies that have experienced negative business consequences after a data leak.

Don’t leave your data security to chance

It’s your data and belongs only to you. Important business data is stored in documents, PDF, Excel worksheets, CAD designs etc. that are exposed to internal threats, human error, extraction by external attacks, etc. SealPath provides total control and visibility of all the documentation you share. How does it work?

How does it work?

Learn how other organisations protect their data with SealPath

Energy, manufacturing, healthcare, banking, aerospace, public authorities, etc


Protection of engineering documentation in industrial companies.


Protection and control of confidential information in the financial sector.           


Secure sharing of patient data in public and private healthcare centres.

The most user-friendly and flexible IRM application on the market

Unbeatable ease of use

  • It integrates with Office without requiring plugins or viewers.
  • Works with your PDF editor/reader: Adobe, Foxit, Nuance, etc.
  • Protect information with a simple drag & drop.
  • A simple way to share with third parties.
Know more

Powerful policy management

  • Flexible policy management by the administrator.
  • Option of policy creation by users.
  • Multi-organisation: Different admins and policies for each tenant.
  • Option of appointing “data managers”.
Know more


  • Automatic protection for file servers.
  • Protection for SharePoint, Documentum, OpenText, etc.
  • Automation of the protection from Microsoft Outlook.
  • Integration with storage systems such as Box, Dropbox, etc.
Know more

Tracking and revocation

  • Access revocation capacity for users and administrators.
  • Tracking available for end users and administrators.
  • Off-line access support for protected documents.
  • Dynamic watermarks.
Know more

The widest range of formats

  • CAD, Project, Visio, Access, Video, Audio, etc.
  • Multi-platform: Windows, Mac, iOS, Android.
  • Integrates seamlessly with AD/LDAP.
  • Available on-premise and in cloud/SaaS.
Know more

Serving major companies worldwide

Discover some of our success stories.

Customers in +20 countries place their trust in SealPath

“SealPath is the perfect tool to ensure effective protection of data regardless of its location (USB, disc, email, Internet, smartphone, etc.). Now, thanks to the automatic folder protection in the File Server, operation is even more transparent for users.”

Miguel Ángel Puente. Head of Systems and Operations Management at Barloworld Finanzauto. Official Caterpillar dealership

“We tested it for a week before using it in real applications. It only took one day to implement it in the department… Now we can ascertain who accesses a document and when, thanks to the tracking information. And if the document is printed or reproduced in a screenshot, it retains the watermark imprinted by the program”

Iván Sánchez. Organisation Manager, BQ

“One of the most important obstacles when implementing an encrypted information system is the ease with which it can be used by end users. We wanted a system that would not interfere significantly with the established business information management processes and would integrate well with them.”

Jesús Redrado. Information Systems Manager. Clínica Universidad de Navarra.


Data breaches

Why data breaches continue rising? Keep calm and control your shared sensitive files

Billions of dollars are spent annually on Cyber Security products, yet the threats and data breaches continue to rise at unprecedented rates. On-going attempts to control the perimeter such as Applications, Devices and Networks – all become futile based upon the...
Read more
entec Solutions partner event Sealpath

Sealpath was presented during “Entec Solutions partners event”

Entec Solutions, VAD of Sealpath in Czech Republic has organized 2 days event for their system integrators in a golf resort near Pilzen. During the event Sealpath was presented  to the main partners and showing how Sealpath is able to helps to our customers,...
Read more