Probability and cost of a data breach

Probability and cost of a data breach

All sales people we face with CIOs, CTOs, CISOs, IT Managers when they make the question: How much does it cost this solution? This kind of situations it’s part of our average day. In order to understand the worthy of the investment for the companies, we have to speak...
SealPath at Infocom Security

SealPath at Infocom Security

SealPath will be showing its Information Rights Management solution at InfoCom Security Conference in Athens which took place on 29 & 30 March 2017 and it is the most important Cyber Security Event in the Country The title of this year’s conference is “On the IT...
Transparent encryption with identity control

Transparent encryption with identity control

  Starting from SealPath version 3.0, we offer the ability to encrypt all types of files, so that only users who have permission can access the contents of the files. We offer the same identity encryption and control as the standard products, without digital...
SealPath Information Rights Sandbox

SealPath Information Rights Sandbox

We present in this blog article our new SealPath Information Rights Sandbox technology available in the new 3.0 version. Through this technology, SealPath is capable of ensuring that the digital rights established in relation to a file are respected by applications...