The Information Protection Blog
Articles and Guides about: Data Protection for Business, Cybersecurity Regulations and Compliance, SealPath Features and Integrations and many more...How to protect and control AutoCAD files with IRM – EDRM
SealPath Enterprise allows you to protect files with sensitive information by encrypting them and limiting the users who can access them and the access permissions. Protection is persistent and are fixed with the files, ensuring that the file is protected regardless...
What Top 10 Security Projects for 2021 can SealPath help with?
There has been a dramatic change in the security landscape following the massive deployment of teleworking, which has brought new priorities for CISOs and organizational security managers. It is therefore important to focus efforts on the most effective security...
New Technology Trends for 2021 and their relationship to Data-Centric Security
A few weeks ago, Gartner announced what it considers to be the technology trends for 2021 during its Gartner IT Symposium. The pandemic and the current economic and business situation have directly affected these trends which, if in any case they already existed in...
Cross-platform SealPath Protection: Announcing the new SealPath Web Protector
ADVANTAGES OF WORKING WITH WEB APPLICATIONS Although we still work on our teams with many agents and local applications, we have become accustomed in recent years to working with web applications that do not require software installed on our computers....
Protection of AutoDesk Inventor CAD Designs
Many companies in the manufacturing and engineering environment use AutoDesk Inventor in their processes, and in these designs, they include highly sensitive and confidential information for them. They contain competitive information about the company, specifications...
What is the Zero Trust Security model? How to implement this strategy with SealPath?
The network perimeter doesn't exist... Don't trust anyone! What is the Zero Trust model? The Zero Trust security model, devised by a Forrester analyst and evolving over the last decade, is based on the premise that the barrier between what is reliable and what...
CAD and Intellectual Property Protection in the Supply Chain
Theft of trade secrets is more topical than ever. According to the United States Government, theft of American IP currently costs between $225 billion and $600 billion annually, and part of this stems from cyber attacks. Technical documentation and CAD designs more...
Protecting the three states of data
When it comes to protecting confidential information, we find that clients require different approaches or pose different protection needs. Some clients need to protect the information on their mobile computers or laptops in case they are lost. Others want to keep...
How to increase the security of your sensitive data in a VPN working environment (Secure TeleWorking III)
Many companies have been forced to enable users remote access through a VPN connection to connect from their personal computers to the corporate network. But there are some problems in ensuring secure network access. Therefore, we must take measures to maintain...
Protect Files in Teams and Slack (Secure Teleworking II)
Microsoft Teams and Slack allow more real-time interaction, facilitating efficiency when teleworking. Sensitive company documents are found more and more distributed in the personal or remote devices of workers, without being protected or taking into account the risks...
Protecting data in the Cloud (Secure Teleworking I)
Remote work or teleworking has been imposed at a fast pace and CISOs have had to establish procedures and tools to work safely, among the most important, protecting data in the cloud. The new Remote Work environment The COVID-19 pandemic has brought about...
Keep your confidential documents from being compromised during remote work
Since the first outbreaks of Covid19 in Europe and seeing the containment measures taken by different countries such as Italy or Spain, many companies have been preparing so that their employees could work remotely from home without taking into account the risks and...