The Information Protection Blog

Articles and news about SealPath

SealPath at Infocom Security

SealPath will be showing its Information Rights Management solution at InfoCom Security Conference in Athens which took place on 29 & 30 March 2017 and it is the most important Cyber Security Event in the Country The title of this year’s conference is “On the IT...

read more

Transparent encryption with identity control

  Starting from SealPath version 3.0, we offer the ability to encrypt all types of files, so that only users who have permission can access the contents of the files. We offer the same identity encryption and control as the standard products, without digital...

read more

SealPath Information Rights Sandbox

We present in this blog article our new SealPath Information Rights Sandbox technology available in the new 3.0 version. Through this technology, SealPath is capable of ensuring that the digital rights established in relation to a file are respected by applications...

read more

SealPath will be at Infosecurity Europe

  SealPath will be for the first time at InfoSecurity Europe in London next week from the 7th to the 9th of June. SealPath will be showcasing their new releases of IRM solutions at stand S05 of the XXI InfoSecurity Europe Event. There will be a number of demos...

read more

Join us at Infosecurity Europe 2016!

  SealPath will be present at Infosecurity Europe 2016 in booth S05. Do you want to know the latest features and innovations of the most user-friendly and powerful market IRM solution? Visit us and we'll show with a demo how to protect your important information...

read more

Ashley Madison and “guaranteed” privacy

One of the most prominent marketing themes of the recently hacked “Ashley Madison” was that it guaranteed privacy. Despite the padlock logos and the other commercial messages on the website trying to reflect the high level of security it employed, it is important to...

read more

Whitepapers

Whitepapers Keep the ownership of your documents. Why is it so important? We find every day in the workplace important information that if it goes to the wrong hands it could cause us trouble. Wouldn´t it be great if we could keep our critical documents under...

read more

What we can learn from the latest APTs

It has been more than a month since the data leakage suffered by Sony Pictures Entertainment (SPE). There is no doubt that this is one of the most devastating attacks of recent times. The Federal Bureau of Investigations (FBI) formally stated that they have connected...

read more

AutoCAD Protection

Protection and control of AutoCAD designs Thanks to SealPath, the AutoCAD users can apply protection policies over the designs, so that these are kept encrypted and under control inside or outside the company. The AutoCAD protection allows companies of different...

read more

New SealPath version 2.1 – Features

In this blog article we include a description of some of the most prominent features that have been recently included in the product with the release v2.1.0. These features are the support of AutoCAD files, new app for viewing protected files in Mac OSX, protection of...

read more

Protecting the three states of data

When it comes to protecting confidential information, we find that clients require different approaches or pose different protection needs. Some clients need to protect information on mobile or portable equipment to prevent problems if they are lost or stolen. Others...

read more

Are your documents travelling safe?

We are at the beginning of our journey. The first thing we have to do is planning. Where do I want to go? Who am I going to travel with? Who am I going to meet with? Let’s buy the train tickets, I have to take a little time. Now, it is the moment to analyze the risks...

read more

The four pillars of data protection

The release of SealPath Enterprise version 2.0 means a fundamental milestone in the strategy that SealPath designed in 2013 in response to the challenges that information security solutions are facing in the coming years. This strategy is based on four key ideas:...

read more