| | FAQ | Question | |
37 |
| Advanced Settings |
| |
12 |
| |
1 |
| Comparison |
| |
41 |
| |
62 |
| Curtain Client |
| |
20 |
| |
15 |
| Curtain Server Plug-in |
| |
15 |
| |
3 |
| Data Recovery |
| |
5 |
| |
6 |
| Encryption |
| |
| | 00016 | How does Curtain e-locker work with backup software? | |
| | 00017 | Where does Curtain e-locker do encryption? | |
| | 00018 | What is the encryption algorism used? | |
| | 00019 | Can users steal information by attaching local hard-disk to another PC? | |
| | 00028 | Can Curtain encrypted data be decrypted by another company (which is also using Curtain e-locker)? | |
| | 00048 | Does Curtain e-locker affect performance of workstations? | |
8 |
| |
6 |
| Feature - Basic |
| |
3 |
| |
5 |
| Feature - Copy Out |
| |
2 |
| |
3 |
| Feature - Housekeeping |
| |
2 |
| Feature - Online Offline Protection |
| |
2 |
| Feature - Others |
| |
2 |
| Feature - Personal Local PD |
| |
2 |
| Feature - Print to PDF |
| |
2 |
| Feature - Protect First Draft |
| |
3 |
| Feature - Send Request |
| |
24 |
| |