Presentation is loading. Please wait.

Presentation is loading. Please wait.

Your data, protected and under control wherever they go SealPath Enterprise – IRM - 2016.

Similar presentations


Presentation on theme: "Your data, protected and under control wherever they go SealPath Enterprise – IRM - 2016."— Presentation transcript:

1 Your data, protected and under control wherever they go SealPath Enterprise – IRM - 2016

2 © SealPath Technologies – Confidential Propietary - 2016 What is SealPath? SealPath protects your documents and allows you to control them remotely

3 © SealPath Technologies – Confidential Propietary - 2016 11.5 millions of confidential documents (2.6 Terabytes) 2.2 millions of PDFs and other formats The Data Leak Problem

4 © SealPath Technologies – Confidential Propietary - 2016 The Data Leak Problem Executives resign Loss of reputationLoss of customers

5 © SealPath Technologies – Confidential Propietary - 2016 How do they happen? Hacking Malware Former employees Negligence, unintentional Loss of devices

6 © SealPath Technologies – Confidential Propietary - 2016 Data travels everywhere without control Control over data is lost

7 © SealPath Technologies – Confidential Propietary - 2016 Current solutions do not solve the problem Perimeter Protection Encryption DLP

8 © SealPath Technologies – Confidential Propietary - 2016 What kind of solution is required? PERSISTENT PROTECTION THAT TRAVELS WITH THE DOCUMENT Monitor activity. Control documents. Anywhere, anytime.

9 © SealPath Technologies – Confidential Propietary - 2016 The SealPath Solution ENCRYPT DATA ENFORCE ACCESS CONTROLS PREVENT DATA LEAKS Who, When, Permissions (View, Edit, Print, Copy&Paste, etc.) The document can be destroyed by remote

10 © SealPath Technologies – Confidential Propietary - 2016 Data travels everywhere WITH control Keep control over data Access Denied

11 © SealPath Technologies – Confidential Propietary - 2016 Deployment On-Premise Cloud/SaaS TWO OPTIONS can be installed SealPath doesn´t store documents. Just protect them Both can be integrated with AD/LDAP A Protection Client is installed in Desktop or File Servers

12 © SealPath Technologies – Confidential Propietary - 2016 How does it work? Protect the document mark@company.com: View, edit, not printing mark@company.com ann@company.com: View only ann@company.com Expiration date: 30/06/2018, Watermark

13 © SealPath Technologies – Confidential Propietary - 2016 How does it work? Share it

14 © SealPath Technologies – Confidential Propietary - 2016 How does it work? Use your native tools to open it

15 © SealPath Technologies – Confidential Propietary - 2016 How does it work? Monitor activity

16 © SealPath Technologies – Confidential Propietary - 2016 Easy to share with external users. Invitations. External user receives an invitation to open protected documents Possibility of customizing the invitation with the look and feel of the customer

17 © SealPath Technologies – Confidential Propietary - 2016 What the user sees when he opens the doc… With Office installed, you just need to enter your SealPath credentials For Adobe you need to download SealPath Lite plugin (5MB, installs in seconds, no admin privileges).

18 © SealPath Technologies – Confidential Propietary - 2016 Supported Platforms and Formats Document Protection Windows XP SP3 Windows Vista Windows 7 Windows 8, 8.1, 10 Windows Server 2003 Windows Server 2008 Windows Server 2008R2 Windows Server 2012, R2 Protected Documents Consumption Mac OSX (Office 2011, App) iOS, Android, Windows Phone (viewers) Microsoft Office Versions Office 2003 2007, 2010, 2013, 2016 2011 (Mac) Other supported formats apart from Office Edit/Read PDFs (Adobe, Foxit, etc.), XPS, Text, RTF, Images, Audio, Video, AutoCAD, SolidWorks and other industrial file formats

19 © SealPath Technologies – Confidential Propietary - 2016 Mobile Apps

20 © SealPath Technologies – Confidential Propietary - 2016 Email protection Ability to protect attachments and message bodies from Outlook The body and attachments can be opened from any email client. Easy to use by the end user Protection for all recipients or with pre-configured policy. It includes a footer or signature with indications for the recipients. Configurable options.

21 © SealPath Technologies – Confidential Propietary - 2016 Example of CAD protection sealpath controls

22 © SealPath Technologies – Confidential Propietary - 2016 Ability to protect for domains or subdomains. Examples: *@s3lab.com: Any user of this domain can access the document.*@s3lab.com anyone@s3lab.com: Similar to the previous case but with other nomenclature.anyone@s3lab.com *.ext@s3lab.com: Anyone with an email with the.ext in the name can access.*.ext@s3lab.com *@*.s3lab.com: Users with i.e. @emea.s3lab.com in the email can access.*@*.s3lab.com anyone@any.com: Anyone from any domain can access the document.anyone@any.com Ability to lock individual documents without modifying the policy Protection for Domains

23 © SealPath Technologies – Confidential Propietary - 2016 On-Premise Deployment All the Information is kept on-premise and under the control of the Customer: Logs, Document ids, keys, etc.

24 © SealPath Technologies – Confidential Propietary - 2016 Use cases Management concerned about access to specific internal documents (Board, Commercial, Product, etc.). Companies that exchange documentation (product guides, specifications) with contractors, and worry about if they documents will go to the wrong hands. Companies in the healthcare sector that manage third-party data that must be protected and controlled under certain data protection regulations. Companies in the financial sector that manage regulated data that they have to be protect by law. Need of sending documentation to external auditors that must be controlled. Companies involved in R&D projects that collaborate with third-parties sending them internal information. Companies that collaborate with temporary sales partners in other countries and want to control the documents to which they have access. Need of protecting data managed by the legal department, very sensitive content for the company. Human Resources department data with sensitive information about employees that must be protected by law (trade union membership, health data, etc.). Contractors working temporarily on the client premises with access to sensitive documents that the company wants to have controlled

25 © SealPath Technologies – Confidential Propietary - 2016 Advantages Protect inside & outside the network Easy to deploy. Easy to share Information classification Monitoring & Tracking Edit and view with Office, Adobe Don´t need to upload to the cloud to protect


Download ppt "Your data, protected and under control wherever they go SealPath Enterprise – IRM - 2016."

Similar presentations


Ads by Google