whoitelogo

Webinar: SealPath – How to control and protect information shared online and offline.

Date: 22.09.2022

Time: 10:00 – 12:00

 

Agenda:

10:00 – 10:10 – Welcome XONTECH & SealPath;

10:10 – 10:20 – SealPath solution presentation;

10:20 – 10:50 – DEMO presentation of the SealPath solution;

10:50 – 11:05 – DEMO scenario presentation – possible integration with Forcepoint and McAfee DLP solutions;

11:05 – 11:15 – SealPath trends – scenarios of how the solution can be used in the banking, private and government sectors;

11:15 – 11:30 – Q&A;

11:30 – 11:45 – Raffle with prizes.

Questions to be answered in the Webinar:

  • How to always protect and monitor information no matter where you send it?
  • How to revoke immediately, after 3 months or after 2 years information sent both online and offline?
  • How to secure and encrypt information sent via email, USB, cloud or other communication channels?
  • How to create limited rights to information sent to third parties such as editing, downloading, printing, sharing or view-only rights, including how to set expiration dates for information?
  • How to work remotely with co-workers and keep jointly used documents intact and encrypted?
  • How to encrypt any sent document or file so that only the recipient can open it?

About the solution:

SealPath is among the only DRM/IRM solutions that aims to protect and monitor the entire lifecycle of a transmitted information. The solution allows to set access rights to information in order to control and monitor it remotely. For this purpose, the following types of document usage rights are set: viewing, editing, downloading, printing, sharing by any method (email, cloud, USB stick, etc.) and setting expiration dates. All these rights can be set for both online and offline document use.

With the SealPath solution, any system administrator as well as the company’s top manager has complete visibility over the entire lifecycle of a document. They can audit and track who transmitted the document, when, how and by what method, including the ability to destroy the document or revoke someone’s rights to it, for both online and offline documents.