| | FAQ | Question | |
41 |
| Advanced Settings |
| |
12 |
| |
1 |
| Comparison |
| |
42 |
| |
63 |
| Curtain Client |
| |
5 |
| |
17 |
| Curtain LogTrace |
| |
20 |
| |
15 |
| Curtain Server Plug-in |
| |
15 |
| |
| | 00060 | Any survey about data security? | |
| | 00030 | An employee is going to leave the company. How to stop this employee to access sensitive documents? | |
| | 00028 | Can Curtain encrypted data be decrypted by another company (which is also using Curtain e-locker)? | |
| | 00012 | Can users change file extension in Protected Zone? Does it cause data leakage? | |
| | 00019 | Can users steal information by attaching local hard-disk to another PC? | |
| | 00034 | Can workstations without Curtain Client access Protected server resource (e.g. Protected share folder)? | |
| | 00013 | How does Curtain e-locker handle Copy and Paste? | |
| | 00045 | How does Curtain e-locker handle Insert Object and other similar functions? | |
| | 00076 | How does Curtain e-locker handle Print-screen? | |
| | 00077 | How does Curtain e-locker handle Print-to-PDF? | |
| | 00029 | How to uninstall Curtain e-locker system in the future? any procedures or guidelines? | |
| | 00033 | If Curtain Client cannot connect to Curtain Admin (due to network problem or failure of Curtain Admin), does it affect normal usage of sensitive information? does it cause data leakage? | |
| | 00044 | If Curtain related services are stopped by users, what does it happen? | |
| | 00017 | Where does Curtain e-locker do encryption? | |
| | 00022 | Will data in Protected Zone be leaked to the public through Peer-to-Peer (P2P) software (such as Foxy or BT)? | |
3 |
| |
5 |
| Definitions |
| |
6 |
| |
10 |
| Feature - Audit Trail |
| |
6 |
| |