DATA-CENTRIC SECURITY FOR THE ENTERPRISE

Don’t leave your data security to chance. It’s your data and belongs only to you. Every day, important business data is stored in docu-ments, PDF, Excel worksheets, CAD designs etc. that are exposed to internal threats, human error, extraction by external attacks and the non-compliance of regulations.

By using a security approach which is based on data, SealPath allows organizations to continuously protect their sensitive data in any location throughout its lifecycle. The security travels with the file, allowing the company to keep it under control even when it is in other networks or on other devices. It offers full visibility regarding who accesses, when they do so, and whether anybody tries to access with-out permission. With one click, SealPath allows data access to be restricted, in real time, even if this data is in the hands of other users.

SealPath IRM

The protection that travels with your data

SealPath protection accompanies the document both on your network and on customers’ or partners’ networks, in the cloud (e.g. Box, Dropbox, etc.) or on a mobile device. It controls who accesses the data, when and with what permission (read only, edit, print, copy and paste, etc.). You can see the details of accesses to the document and if anybody has attempted to gain access without permission. If you cease to collaborate with the holder you can block or delete the document so that it is inaccessible to that user or anyone else.

Granular permission control

  • You can include granular authorisation for access to the information.
  • Set expiry dates, watermarks, off-line access, etc.
  • Delete documents remotely even if they have already been sent.
  • Users can create their own policies and controls.
  • Policy management by department. Automate protection.

Use your usual tools

  • Native integration with Office without requiring installed agents.
  • Open protected PDFs with Adobe, Foxit, Nitro, Nuance, etc.
  • Native integration with AutoCAD, SolidEdge, etc. No viewers required.
  • Supported on Windows, Mac OSX, iOS and Android.
  • Use Microsoft Outlook to send protected emails.

Extremely simple sharing

  • Automatic sending of invitations to external users.
  • Super-convenient self-registration in seconds.
  • Option of customising invitations and the registration portal.
  • Automatic registration and single-sign-on for internal users.
  • Additional centralized controls for the administrator.

Exhaustive access control

  • Audits accesses and the use of protected documentation.
  • Available to the user it protects and to administrators.
  • Alerts for attempts to access by blocked users, breached docs, etc.
  • Risk control reports on the documentation.
  • Powerful Top10 graphics, filterable lists, exportables, etc.

Automation of the protection

  • Automatic protection for file servers, NAS devices, etc.
  • Automatic protection of SharePoint libraries.
  • Automatic protection of folders in Office 365.
  • Automatic protection in Box, Dropbox and Cloud storage.
  • Automatic protection in the email through Outlook and Exchange.

Integration with corporate systems

  • Seamless integration with Active Directory and LDAP.
  • Option of working with groups and domain credentials.
  • Integration with SIEM tools.
  • Integration with DLP solutions (e.g. Symantec DLP).
  • Specific integration with simple, flexible SDK.