Your data, protected and under control wherever they go SealPath Enterprise – IRM
© SealPath Technologies – Confidential Propietary What is SealPath? SealPath protects your documents and allows you to control them remotely
© SealPath Technologies – Confidential Propietary millions of confidential documents (2.6 Terabytes) 2.2 millions of PDFs and other formats The Data Leak Problem
© SealPath Technologies – Confidential Propietary The Data Leak Problem Executives resign Loss of reputationLoss of customers
© SealPath Technologies – Confidential Propietary How do they happen? Hacking Malware Former employees Negligence, unintentional Loss of devices
© SealPath Technologies – Confidential Propietary Data travels everywhere without control Control over data is lost
© SealPath Technologies – Confidential Propietary Current solutions do not solve the problem Perimeter Protection Encryption DLP
© SealPath Technologies – Confidential Propietary What kind of solution is required? PERSISTENT PROTECTION THAT TRAVELS WITH THE DOCUMENT Monitor activity. Control documents. Anywhere, anytime.
© SealPath Technologies – Confidential Propietary The SealPath Solution ENCRYPT DATA ENFORCE ACCESS CONTROLS PREVENT DATA LEAKS Who, When, Permissions (View, Edit, Print, Copy&Paste, etc.) The document can be destroyed by remote
© SealPath Technologies – Confidential Propietary Data travels everywhere WITH control Keep control over data Access Denied
© SealPath Technologies – Confidential Propietary Deployment On-Premise Cloud/SaaS TWO OPTIONS can be installed SealPath doesn´t store documents. Just protect them Both can be integrated with AD/LDAP A Protection Client is installed in Desktop or File Servers
© SealPath Technologies – Confidential Propietary How does it work? Protect the document View, edit, not printing View only Expiration date: 30/06/2018, Watermark
© SealPath Technologies – Confidential Propietary How does it work? Share it
© SealPath Technologies – Confidential Propietary How does it work? Use your native tools to open it
© SealPath Technologies – Confidential Propietary How does it work? Monitor activity
© SealPath Technologies – Confidential Propietary Easy to share with external users. Invitations. External user receives an invitation to open protected documents Possibility of customizing the invitation with the look and feel of the customer
© SealPath Technologies – Confidential Propietary What the user sees when he opens the doc… With Office installed, you just need to enter your SealPath credentials For Adobe you need to download SealPath Lite plugin (5MB, installs in seconds, no admin privileges).
© SealPath Technologies – Confidential Propietary Supported Platforms and Formats Document Protection Windows XP SP3 Windows Vista Windows 7 Windows 8, 8.1, 10 Windows Server 2003 Windows Server 2008 Windows Server 2008R2 Windows Server 2012, R2 Protected Documents Consumption Mac OSX (Office 2011, App) iOS, Android, Windows Phone (viewers) Microsoft Office Versions Office , 2010, 2013, (Mac) Other supported formats apart from Office Edit/Read PDFs (Adobe, Foxit, etc.), XPS, Text, RTF, Images, Audio, Video, AutoCAD, SolidWorks and other industrial file formats
© SealPath Technologies – Confidential Propietary Mobile Apps
© SealPath Technologies – Confidential Propietary protection Ability to protect attachments and message bodies from Outlook The body and attachments can be opened from any client. Easy to use by the end user Protection for all recipients or with pre-configured policy. It includes a footer or signature with indications for the recipients. Configurable options.
© SealPath Technologies – Confidential Propietary Example of CAD protection sealpath controls
© SealPath Technologies – Confidential Propietary Ability to protect for domains or subdomains. Examples: Any user of this domain can access the Similar to the previous case but with other Anyone with an with the.ext in the name can Users with in the can Anyone from any domain can access the Ability to lock individual documents without modifying the policy Protection for Domains
© SealPath Technologies – Confidential Propietary On-Premise Deployment All the Information is kept on-premise and under the control of the Customer: Logs, Document ids, keys, etc.
© SealPath Technologies – Confidential Propietary Use cases Management concerned about access to specific internal documents (Board, Commercial, Product, etc.). Companies that exchange documentation (product guides, specifications) with contractors, and worry about if they documents will go to the wrong hands. Companies in the healthcare sector that manage third-party data that must be protected and controlled under certain data protection regulations. Companies in the financial sector that manage regulated data that they have to be protect by law. Need of sending documentation to external auditors that must be controlled. Companies involved in R&D projects that collaborate with third-parties sending them internal information. Companies that collaborate with temporary sales partners in other countries and want to control the documents to which they have access. Need of protecting data managed by the legal department, very sensitive content for the company. Human Resources department data with sensitive information about employees that must be protected by law (trade union membership, health data, etc.). Contractors working temporarily on the client premises with access to sensitive documents that the company wants to have controlled
© SealPath Technologies – Confidential Propietary Advantages Protect inside & outside the network Easy to deploy. Easy to share Information classification Monitoring & Tracking Edit and view with Office, Adobe Don´t need to upload to the cloud to protect