FAQ
   
FAQs by Category

Previous Next Expand Collapse Search


FAQCan be sorted ascendingQuestionCan be sorted ascending
15
Show details for Advanced SettingsAdvanced Settings
14
Show details for Backend SystemsBackend Systems
1
Show details for ComparisonComparison
33
Show details for Curtain AdminCurtain Admin
48
Show details for Curtain ClientCurtain Client
12
Show details for Curtain Server Plug-inCurtain Server Plug-in
15
Hide details for Data LeakageData Leakage
00012Can users change file extension in Protected Zone? does it cause data leakage?
00013How does Curtain e-locker handle Copy and Paste?
00017Where does Curtain e-locker do encryption?
00019Can users steal information by attaching local hard-disk to another PC?
00022Will data in Protected Zone be leaked to the public through Peer-to-Peer (P2P) software (such as Foxy or BT)?
00028Can Curtain encrypted data be decrypted by another company (which is also using Curtain e-locker)?
00029How to uninstall Curtain e-locker system in the future? any procedures or guidelines?
00030An employee is going to leave the company. How to stop this employee to access sensitive documents?
00033If Curtain Admin is down, what does it happen?
00034Can workstations without Curtain Client access Protected server resource (e.g. Protected share folder)?
00044If Curtain related services are stopped by users, what does it happen?
00045How does Curtain e-locker handle Insert Object and other similar functions?
00060Any survey about data security?
00076How does Curtain e-locker handle Print-screen?
00077How does Curtain e-locker handle Print-to-PDF?
2
Show details for Data RecoveryData Recovery
4
Show details for DefinitionsDefinitions
6
Show details for EncryptionEncryption
4
Show details for Feature - Audit TrailFeature - Audit Trail
6
Show details for Feature - BasicFeature - Basic
1
Show details for Feature - Copy and PasteFeature - Copy and Paste
1
Show details for Feature - Encrypt OutFeature - Encrypt Out
3
Show details for Feature - HousekeepingFeature - Housekeeping