Resources

Datasheets

PROTECT YOUR DOCUMENTS AND TAKE CONTROL OVER THEM

Keep the documents protected documents inside the company, at a user’s home, on a mobile device, in the cloud or on a partner’s network. Your information will be safe from undue access wherever it may be.

SEALPATH ENTERPRISE SOLUTIONS

Types of SealPath Enterprise solutions: On-premise, SaaS, for MSP, etc. Discover the advantages of our IRM solution and its various formats.

PROTECTION AND CONTROL OF EMAIL AND ATTACHMENTS WITH SEALPATH

Do you control your attachments sent by email? SealPath enables you to protect attachments easily and conveniently for both the sender and the receiver. The attachments and the body of the message are sent with persistent protection that enables remote control of what others can do with them.

ENCRYPT ANY KIND OF FILE TRANSPARENTLY WITH SEALPATH

SealPath provides the capacity to encrypt all types of files so that only users who have permission can access their contents. Identity control, access control and revocation: Explore SealPath’s transparent encryption.

PROTECT YOUR CAD FILES WITH SEALPATH

IRM technology applied to CAD formats. Keep your AutoCAD, SolidWorks, SolidEdge and other designs encrypted and under control with SealPath so that you can see who accesses them and restrict permissions as required.

AUTOMATIC PROTECTION FOR FILE SERVERS AND SHAREPOINT

Automatically protect document repositories, file servers and document managers such as SharePoint or Alfresco. Transparent for users, the documents stay protected by simply moving or copying files to a protected folder.

SEALPATH ENTERPRISE SAAS

Discover the advantages of SealPath’s IRM solution in the cloud. Avoid deployment of infrastructure on your network and manage your most confidential corporate information in a controlled, convenient way.

SEALPATH PROFESSIONAL SAAS

Are you a self-employed professional who wants to have all your confidential documents under control wherever they may be? SealPath Professional SaaS enables you to restrict access permissions to your documents, see who accesses them and remotely delete them even if they have already been sent.

PROTECTION FOR OFFICE 365, SHAREPOINT AND ONEDRIVE

Thousands of companies collaborate using the Microsoft Office 365 Cloud. They upload their documents to OneDrive, manage sensitive documentation in SharePoint online or send emails with attachments that can include confidential information. Discover how SealPath helps you to protect your most sensitive information in these systems.

PROTECTING INFORMATION IN G-SUITE

Google G-Suite allows companies to collaborate comfortably without the need to manage infrastructure or internal servers. However, once the documents leave this environment, you lose control of them. Do you want to be able to control access to your documents even when they have left Drive? Now you can do it. With SealPath.

Whitepapers

WHY IS KEEPING OWNERSHIP OF DOCUMENTS SO IMPORTANT?

In the workday word you encounter situations every day in which you must ensure that you have certain documents under control. These documents contain important information that could cause serious problems if they fall into the wrong hands. What if you could keep all your vital documents under control?

FIVE FACTORS THAT OBSTRUCT CONTROL OF CORPORATE DOCUMENTATION

The way information can be shared has changed drastically in recent years. Various trends such as increased mobility, cloud computing, etc. are making management of confidential corporate documentation more difficult. What are these factors that make document management so difficult? Is there a method for keeping it under control?

SEALPATH COMPARED TO OTHER DATA LEAK PREVENTION TECHNOLOGIES

There are various technological approaches to preventing data leaks in companies: encryption, DLP (data leak prevention) systems, device control, etc. Learn about SealPath’s approach compared to the protection provided by DLP-type systems and encryption.

RAPID GUIDE TO THE EU-GDPR AND WHAT IT MEANS FOR YOUR BUSINESS

The objective of the new General Data Protection Regulation is to effectively protect citizens’ fundamental right to data protection. There are significant implications for companies related to management of data of a personal nature. Use this guide to learn what the new regulation means for your company.

COMPLIANCE WITH REGULATIONS IN THE HEALTHCARE SECTOR

Organizations in the healthcare sector are under constant pressure to comply with data protection and privacy regulations aimed at preventing data leaks. Learn how SealPath can help healthcare organisations to keep their documents secure and comply with the regulations.

DESCRIPTION OF THE SEALPATH ENTERPRISE SERVICE

Discover the SealPath Enterprise platform for the protection and control of corporate information. In the cloud, on-premise, with various deployment options, SealPath is a powerful, flexible IRM solution that is as simple as possible for end users.

Customer cases

PROTECTION AND CONTROL OF DATA IN THE FINANCIAL SECTOR

This company in the financial sector has information protection measures based on perimeter protection systems, protection of hosts, servers, etc. These systems prevent external threats, but the customer wants a data-centric protection system that keeps its confidential information protected on and off the network.

PROTECTION OF PATIENT DATA WITH SEALPATH IRM

The client exchanges documentation containing patients’ clinical data classified as high security data under the Data Protection Act with other public and private entities. This data must be encrypted and control over how and when it leaves the company is necessary. Explore how they did it with SealPath.

DATA SECURITY IN A COMPANY IN THE INDUSTRIAL SECTOR

The company’s intellectual property is contained in documents with technical information on the products it manufactures. This documentation includes support information, details of components, processes and quality criteria, etc. The documents are in PDF, Office CAD design formats.

CASE STUDY – FININZAUTO

Discover how the heavy machinery and Caterpillar motor distributor secured its critical information with SealPath Enterprise.

CASE STUDY – CUN

One of the most prestigious private clinics in Spain with a staff of over 2,000 people trusted in SealPath to enhance the security of their patient data management.

CASE STUDY – BQ

BQ, the manufacturer of mobile telephones and e-readers, was looking for an IRM application to share confidential information with external collaborators. See why they selected SealPath to keep their information protected and under control.

Videos

HOW TO CREATE A PROTECTION POLICY WITH SEALPATH

End users can create their own protection policy with SealPath to safeguard their information. This video shows how it is done.

HOW TO PROTECT A DOCUMENT WITH SEALPATH

This video shows the various options for protecting confidential documents with SealPath.

HOW TO OPEN PROTECTED DOCUMENTS WITH SEALPATH

Opening protected documents with SealPath is easy and convenient. See how to do it in this video.

HOW TO INVITE AN EXTERNAL USER TO ACCESS YOUR CONFIDENTIAL DOCUMENTS

Discover in this video how SealPath users can invite third parties to open the confidential documentation they share by email or other means.

HOW TO MONITOR ACCESSES TO PROTECTED DOCUMENTS

When you send a protected document to a third party you can see who opened it, when, or if someone tried to open it without permission. Find out how it is done in this video.

AZURE INFORMATION PROTECTION FOR AUTOCAD

You can protect AutoCAD files with SealPath if you use Microsoft Azure Information Protection. This video shows how to protect and open protected AutoCAD files.

Links of interest