FAQ-
   
Coworkshop Website 

FAQ Home 

Curtain e-locker
Installation Guide
User Guide 

Curtain LogTrace 

Curtain MonGuard


Previous Next Expand Collapse Search


FAQCan be sorted ascendingQuestionCan be sorted ascending
41
Show details for Advanced SettingsAdvanced Settings
12
Show details for Backend SystemsBackend Systems
1
Show details for ComparisonComparison
42
Show details for Curtain AdminCurtain Admin
63
Show details for Curtain ClientCurtain Client
5
Show details for Curtain FrontierCurtain Frontier
17
Show details for Curtain LogTraceCurtain LogTrace
20
Show details for Curtain MonGuardCurtain MonGuard
15
Show details for Curtain Server Plug-inCurtain Server Plug-in
15
Hide details for Data LeakageData Leakage
00060Any survey about data security?
00030An employee is going to leave the company. How to stop this employee to access sensitive documents?
00028Can Curtain encrypted data be decrypted by another company (which is also using Curtain e-locker)?
00012Can users change file extension in Protected Zone? Does it cause data leakage?
00019Can users steal information by attaching local hard-disk to another PC?
00034Can workstations without Curtain Client access Protected server resource (e.g. Protected share folder)?
00013How does Curtain e-locker handle Copy and Paste?
00045How does Curtain e-locker handle Insert Object and other similar functions?
00076How does Curtain e-locker handle Print-screen?
00077How does Curtain e-locker handle Print-to-PDF?
00029How to uninstall Curtain e-locker system in the future? any procedures or guidelines?
00033If Curtain Client cannot connect to Curtain Admin (due to network problem or failure of Curtain Admin), does it affect normal usage of sensitive information? does it cause data leakage?
00044If Curtain related services are stopped by users, what does it happen?
00017Where does Curtain e-locker do encryption?
00022Will data in Protected Zone be leaked to the public through Peer-to-Peer (P2P) software (such as Foxy or BT)?
3
Show details for Data RecoveryData Recovery
5
Show details for DefinitionsDefinitions
6
Show details for EncryptionEncryption
10
Show details for Feature - Audit TrailFeature - Audit Trail
6
Show details for Feature - BasicFeature - Basic
 
Previous Next Expand Collapse Search