Tour

SealPath for end users

Protect a document with a simple drag-and-drop

Protect a document with a simple drag-and-drop
1
From your desktop, select the document you want to protect and drag it to “Custom protection.”
2
Configure the users and their permissions. Users are identified by their email address. Accept the configuration and ... the document is protected!
3
You have the option of setting an expiration date for the document or allowing users offline access to the document. You can also add a watermark, which will appear on documents for users with read-only permissions.

Create secure protections or work groups

Create secure protections or work groups
1
If you are going to securely share documents with a partner or your work group on a regular basis, create a new protection.
2
Configure the name/description, users and permissions, save and you are ready to go.
3
Protect documents with a simple drag-and-drop to the protection created.

Protect a document with a right-click

Protect a document with a right-click
1
Right-click on a document on your desktop and choose the protection you want to assign.

Protect a document from Microsoft Office

Protect a document from Microsoft Office
1
Using the plug-in for Office, go to the "Protect" tab and choose the protection you want to assign. You can also apply a custom protection.

Bulk document protect/unprotect

Bulk document protect/unprotect
1
Select a folder or group of files. Drag them to a given protection and they will automatically be protected.
2
If you are authorized to unprotect, by dragging several files to the “unprotect” box, you can remove all the protections at the same time.

List of accesses to your protected documents

List of accesses to your protected documents
1
In the My Documents/Accesses section of SealPath Desktop, you can view the most recent accesses to your protected documents. You can filter by date or search the list.

Classify your sensitive information

Classify your sensitive information
1
Imagine you want to protect documents you are going to send to a partner called “ACME.” Simply create the protection “ACME Docs.” By protecting the documents you exchange with ACME with this protection, your documents will automatically be classified.
2
When you make changes to the “ACME Docs” protection, you will change the accesses to all the documents you have already protected and classified.

SealPath for system administrators

Manage users

Manage users
1
Add users from your organization based on the number of licenses or subscriptions you have.
2
When a user is added, they will be sent an email with instructions for a quick SealPath set-up.

Create corporate policies or protections

Create corporate policies or protections
1
Create corporate protection policies, for example, “Human Resources” or “Executive Team,” and share them with users.
2
They will see the protection in their personal SealPath Desktop application and will be able to protect documents directly, using the corporate protection and without needing to configure anything.

Manage user protections

Manage user protections
1
If a user leaves the organization, for example, you can access the protections they have created and change the ownership, remove them, etc.

Auditing accesses to documents

Auditing accesses to documents
1
By clicking on any document, you can see who has accessed it and when.
2
From the list of protected documents, you can search by user name and view what documents they have had access to and what documents they have protected.
3
You can view the denied document access attempts for a specific user.

Receive warnings for your documents

Receive warnings for your documents
1
In the My Documents/Warnings section, you can see all the denied document access attempts, if certain users have given permissions to other users for documents which they do not own, if a document has been unprotected, etc.
2
By accessing the document information, you can also view all the warnings for a specific document.
3
On the Dashboard or Home, there is also an indicator showing the number of warnings for protected documents which are owned by the company.

Protection use reports

Protection use reports
1
Number and percentages of active protections and unused protections.
2
Corporate protections vs. user-defined protections.
3
Protection creation trends.
4
Most used corporate and user protections.

User activity reports

User activity reports
1
Number and percentages of internal and external users who protect documents.
2
Number and percentages of users who access protected documents.
3
Trends for users who protect documents.
4
Most active internal and external users who access protected documents.

Transferring ownership of documents, regardless of where they are

Transferring ownership of documents, regardless of where they are
1
Select the person you want to transfer ownership from.
2
Select the person you want to transfer ownership to.
3
The documents will no longer be accessible to the first person and will now be accessible to the second person.

Admin audit trail

Admin audit trail
1
All administrator activity is logged for auditing purposes: changes to protections, transfers of permissions, etc.