The Information Protection Blog
Articles and Guides about: Data Protection for Business, Cybersecurity Regulations and Compliance, SealPath Features and Integrations and many more...PROTECTION OF SENSITIVE FILES AND SECURE FILE SHARING IN BOX
Many companies store their corporate documentation and collaborate daily through Box. Users access and share files easily, but in many cases the documents shared with third parties contain confidential information, losing absolute control of the information and the...
5 Data protection use cases using automation and integration between security technologies
This article will dive into 5 use cases of data protection automation and integration between data-centric security technologies. These integration cases can make 1 + 1 > 2 in terms of the advantages to maximize protection compared to having a single isolated...
Data Processing Agreement, International Transfers and Regulations
In this article we will discuss the implications of the Personal Data Processsing Agreement (DPA) required by the Regulation. This have recently become particularly relevant, more specifically, about data transfers to countries outside the European Union where the...
Predictions in the field of Data-Centric Security for 2022
In recent weeks, various analysts such as Gartner, Forrester, and IDC have examined cybersecurity trends and predicted what the future would hold. A majority of these trends overlap, so we want to echo those that relate to data-centric security in this article. Table...
Secure Data Collaboration and Control of Information in Use
Secure data collaboration brings great value to companies, through the exchange of data between business partners we can help grow the business, but it also involves exposing the company to a great risk such as data leakage and lose of control. In this article we...
File Integrity Monitoring through a Data-Centric Security Approach
In this article, we are going to focus on the concept of information integrity, and more specifically, we will discuss the technologies around what is known as File Integrity Monitoring (FIM) and how a data-centric approach to protection can help us maintain it. Table...
IRM/E-DRM Protection for CAD files in Siemens Solid Edge
WHAT IS SIEMENS SOLID EDGE? Solid Edge is a 3D CAD, parametric feature and synchronous technology solid modeling software. It provides solid modeling, assembly modelling and 2D orthographic view functionality for engineers, designers and designers. It allows designs...
How can the Zero Trust model help with CMMC and NIST 800-171 compliance?
What is CMMC (Cybersecurity Maturity Model Certification)? The CMMC program, Cybersecurity Maturity Model Certification, was pioneered by the U.S. Department of Defense to measure and verify the level of implementation of processes and practices in the area of...
How to integrate data-centric security into your applications. The SealPath SDK.
"Sealpath provides a flexible, powerful and performant SDK, which is the ideal solution to guarantee that sensitive documents can be issued without risk. We have integrated Sealpath security in our HR application very quickly. In addition, their technical support was...
How to comply with financial sector regulations through a data-centric approach to security
In the following article you will find all the data protection regulations for financial services, as well as the security risks they face. Finally, we recommend 5 best practices to comply with these regulations effectively. Table of Contents: Risks in financial...
Compliance with the SAMA framework through a data-centric cyber security approach
In previous articles and resources, we have shown how SealPath can help improve security in different use cases within an organization, or facilitate compliance with data protection regulations such as EU-GDPR, Health environment, etc. In this article we will show how...
How Secure Google Drive is and how to improve its protection for Business
The increase in remote work has triggered the use of cloud storage and collaboration applications to share documentation and files between teams within a company and with other external users. Sharing through local folders on file servers has given way to cloud...