The Information Protection Blog

Articles and news about SealPath
How to protect and control AutoCAD files with IRM – EDRM

How to protect and control AutoCAD files with IRM – EDRM

SealPath Enterprise allows you to protect files with sensitive information by encrypting them and limiting the users who can access them and the access permissions. Protection is persistent and are fixed with the files, ensuring that the file is protected regardless...

read more
PROTECTION OF SENSITIVE FILES AND SECURE FILE SHARING IN BOX

PROTECTION OF SENSITIVE FILES AND SECURE FILE SHARING IN BOX

Many companies store their corporate documentation and collaborate daily through Box. Users access and share files easily, but in many cases the documents shared with third parties contain confidential information, losing absolute control of the information and the...

read more
Who should encrypt the data in my company?

Who should encrypt the data in my company?

The encryption of data in companies prevents information leaks and mitigates the cost of its impact. It is one of the best security solutions to protect sensitive information, but you must know what documents to encrypt and how to implement it effectively. Table of...

read more
Protection of AutoDesk Inventor CAD Designs

Protection of AutoDesk Inventor CAD Designs

Many companies in the manufacturing and engineering environment use AutoDesk Inventor in their processes, and in these designs, they include highly sensitive and confidential information for them. They contain competitive information about the company, specifications...

read more
CAD and Intellectual Property Protection in the Supply Chain

CAD and Intellectual Property Protection in the Supply Chain

Theft of trade secrets is more topical than ever. According to the United States Government, theft of American IP currently costs between $225 billion and $600 billion annually, and part of this stems from cyber attacks. Technical documentation and CAD designs more...

read more
Protecting the three states of data

Protecting the three states of data

When it comes to protecting confidential information, we find that clients require different approaches or pose different protection needs. Some clients need to protect the information on their mobile computers or laptops in case they are lost. Others want to keep...

read more