DATA-CENTRIC SECURITY FOR THE ENTERPRISE

SealPath Secures and Controls Enterprise Data. Wherever they travel.

AUTOMATIC PROTECTION OF INFORMATION REPOSITORIES

Automatically protects documentation on file servers, SharePoint, Office 365, Alfresco and other document managers. Adds persistent security to your collaboration tools.

OFFICE, PDF, CAD, ETC.

The most widely used format support on the market that works with native tools.

EU DATA PROTECTION REGULATION

Check what it means for your business and how SealPath can help you
~

PROTECTION

Persistent encryption that accompanies the files and emails wherever they travel.
f

CONTROL

It controls who accesses the data, when and with what permission (read only, edit, etc.).

AUDIT

Monitors accesses and alerts on your organisation’s documentation wherever it may be.

%

Employees who take information with them when they resign or are dismissed.

%

Organisations that lack a mature method for tracking and controlling their confidential information.

%

Leaks in which the data extracted was encrypted and therefore useless.

%

Companies that have experienced negative business consequences after a data leak.

Don’t leave your data security to chance

It’s your data and belongs only to you. Important business data is stored in documents, PDF, Excel worksheets, CAD designs etc. that are exposed to internal threats, human error, extraction by external attacks, etc. SealPath provides total control and visibility of all the documentation you share. How does it work?

Learn how other organisations protect their data with SealPath

Energy, manufacturing, healthcare, banking, aerospace, public authorities, etc

INDUSTRY

Protection of engineering documentation in industrial companies.

BANKING

Protection and control of confidential information in the financial sector.           

HEALTHCARE

Secure sharing of patient data in public and private healthcare centres.

The most user-friendly and flexible IRM application on the market

Unbeatable ease of use

  • It integrates with Office without requiring plugins or viewers.
  • Works with your PDF editor/reader: Adobe, Foxit, Nuance, etc.
  • Protect information with a simple drag & drop.
  • A simple way to share with third parties.

Powerful policy management

  • Flexible policy management by the administrator.
  • Option of policy creation by users.
  • Multi-organisation: Different admins and policies for each tenant.
  • Option of appointing “data managers”.

Automation

  • Automatic protection for file servers.
  • Protection for SharePoint, Documentum, OpenText, etc.
  • Automation of the protection from Microsoft Outlook.
  • Integration with storage systems such as Box, Dropbox, etc.

Tracking and revocation

  • Access revocation capacity for users and administrators.
  • Tracking available for end users and administrators.
  • Off-line access support for protected documents.
  • Dynamic watermarks.

The widest range of formats

  • CAD, Project, Visio, Access, Video, Audio, etc.
  • Multi-platform: Windows, Mac, iOS, Android.
  • Integrates seamlessly with AD/LDAP.
  • Available on-premise and in cloud/SaaS.

Serving major companies worldwide

Discover some of our success stories.

Customers in +20 countries place their trust in SealPath

“SealPath is the perfect tool to ensure effective protection of data regardless of its location (USB, disc, email, Internet, smartphone, etc.). Now, thanks to the automatic folder protection in the File Server, operation is even more transparent for users.”

Miguel Ángel Puente. Head of Systems and Operations Management at Barloworld Finanzauto. Official Caterpillar dealership

“We tested it for a week before using it in real applications. It only took one day to implement it in the department… Now we can ascertain who accesses a document and when, thanks to the tracking information. And if the document is printed or reproduced in a screenshot, it retains the watermark imprinted by the program”

Iván Sánchez. Organisation Manager, BQ

“One of the most important obstacles when implementing an encrypted information system is the ease with which it can be used by end users. We wanted a system that would not interfere significantly with the established business information management processes and would integrate well with them.”

Jesús Redrado. Information Systems Manager. Clínica Universidad de Navarra.

next
prev

IN OUR BLOG

DLP vs IRM proteger información sensible

DLP or IRM. Which one should I choose to protect my sensitive data?

Every organization generates and manages, to a greater or lesser extent, sensitive information stored in different locations: User computers, document managers, cloud storage, file servers, etc. On the one hand, organizations need to prevent internal threats:...
sesalpath mobile platforms

Native opening of protected files in Office for mobile platforms and MacOSX

Documents protected by SealPath can be opened on mobile devices and Mac machines without installing anything on the device. Just as there has always been this capability in Windows, SealPath has extended support for Office Mobile and Office for Mac. Internal as well...

HIGHLIGHTED

SEALPATH PROTECCIÓN DE EMAIL DATASHEET
EU DATA PROTECTION LAW