| | FAQ | Question | |
5 |
| Definitions |
| |
6 |
| |
| | 00016 | How does Curtain e-locker work with backup software? | |
| | 00017 | Where does Curtain e-locker do encryption? | |
| | 00018 | What is the encryption algorism used? | |
| | 00019 | Can users steal information by attaching local hard-disk to another PC? | |
| | 00028 | Can Curtain encrypted data be decrypted by another company (which is also using Curtain e-locker)? | |
| | 00048 | Does Curtain e-locker affect performance of workstations? | |
8 |
| Feature - Audit Trail |
| |
6 |
| |
3 |
| Feature - Copy and Paste |
| |
5 |
| |
2 |
| Feature - Encrypt Out |
| |
3 |
| |
2 |
| Feature - Online Offline Protection |
| |
2 |
| |
2 |
| Feature - Personal Local PD |
| |
2 |
| |
2 |
| Feature - Protect First Draft |
| |
3 |
| |
24 |
| Installation |
| |
1 |
| |
7 |
| Networking |
| |
5 |
| |
1 |
| Performance |
| |
11 |
| |
10 |
| Supported Applications |
| |
9 |
| |
4 |
| Uninstallation |
| |
7 |
| |