EU Data Protection Regulation

Check what it means for your business and how SealPath can help you

Read more

SealPath Information Rights Management

Your data protected and under control. Wherever they travel

Read more

Automatic IRM protection of information repositories.

Automatically protects documentation on file servers, SharePoint, Office 365, Alfresco and other document managers. Adds persistent security to your collaboration tools.

Read more

Office, PDF, CAD, etc.

The most widely used format support on the market that works with native tools.

Read more

PROTECTION

Persistent encryption that accompanies the files and emails wherever they travel.

f

CONTROL

It controls who accesses the data, when and with what permission (read only, edit, etc.).

AUDIT

Monitors accesses and alerts on your organisation’s documentation wherever it may be.

%

Employees who take information with them when they resign or are dismissed.

%

Organisations that lack a mature method for tracking and controlling their confidential information.

%

Leaks in which the data extracted was encrypted and therefore useless.

%

Companies that have experienced negative business consequences after a data leak.

Don’t leave your data security to chance

It’s your data and belongs only to you. Important business data is stored in documents, PDF, Excel worksheets, CAD designs etc. that are exposed to internal threats, human error, extraction by external attacks, etc. SealPath provides total control and visibility of all the documentation you share. How does it work?

How does it work?

Learn how other organisations protect their data with SealPath

Energy, manufacturing, healthcare, banking, aerospace, public authorities, etc

INDUSTRY

Protection of engineering documentation in industrial companies.

BANKING

Protection and control of confidential information in the financial sector.           

HEALTHCARE

Secure sharing of patient data in public and private healthcare centres.

The most user-friendly and flexible IRM application on the market

Unbeatable ease of use

  • It integrates with Office without requiring plugins or viewers.
  • Works with your PDF editor/reader: Adobe, Foxit, Nuance, etc.
  • Protect information with a simple drag & drop.
  • A simple way to share with third parties.
Know more

Powerful policy management

  • Flexible policy management by the administrator.
  • Option of policy creation by users.
  • Multi-organisation: Different admins and policies for each tenant.
  • Option of appointing “data managers”.
Know more

Automation

  • Automatic protection for file servers.
  • Protection for SharePoint, Documentum, OpenText, etc.
  • Automation of the protection from Microsoft Outlook.
  • Integration with storage systems such as Box, Dropbox, etc.
Know more

Tracking and revocation

  • Access revocation capacity for users and administrators.
  • Tracking available for end users and administrators.
  • Off-line access support for protected documents.
  • Dynamic watermarks.
Know more

The widest range of formats

  • CAD, Project, Visio, Access, Video, Audio, etc.
  • Multi-platform: Windows, Mac, iOS, Android.
  • Integrates seamlessly with AD/LDAP.
  • Available on-premise and in cloud/SaaS.
Know more

Serving major companies worldwide

Discover some of our success stories.

+30,000 users in 20 countries place their trust in SealPath

“SealPath is the perfect tool to ensure effective protection of data regardless of its location (USB, disc, email, Internet, smartphone, etc.). Now, thanks to the automatic folder protection in the File Server, operation is even more transparent for users.”

Miguel Ángel Puente. Head of Systems and Operations Management at Barloworld Finanzauto. Official Caterpillar dealership

“We tested it for a week before using it in real applications. It only took one day to implement it in the department… Now we can ascertain who accesses a document and when, thanks to the tracking information. And if the document is printed or reproduced in a screenshot, it retains the watermark imprinted by the program”

Iván Sánchez. Organisation Manager, BQ

“One of the most important obstacles when implementing an encrypted information system is the ease with which it can be used by end users. We wanted a system that would not interfere significantly with the established business information management processes and would integrate well with them.”

Jesús Redrado. Information Systems Manager. Clínica Universidad de Navarra.

IN OUR BLOG

boldonjames_sealpath_pr

SealPath and Boldon James Partner on Document Security Classification & Protection

This week we announce the partnership with Boldon James, the leader provider in data classification solutions. Below is a summary of the news release. Seamless one-click solution classifies and protects sensitive documents automatically Bilbao, Spain & London, UK...
Read more
probability data breach

Probability and cost of a data breach

All sales people we face with CIOs, CTOs, CISOs, IT Managers when they make the question: How much does it cost this solution? This kind of situations it’s part of our average day. In order to understand the worthy of the investment for the companies, we have to speak...
Read more

HIGHLIGHTED