| | FAQ | Question | |
6 |
| Encryption |
| |
| | 00028 | Can Curtain encrypted data be decrypted by another company (which is also using Curtain e-locker)? | |
| | 00019 | Can users steal information by attaching local hard-disk to another PC? | |
| | 00048 | Does Curtain e-locker affect performance of workstations? | |
| | 00016 | How does Curtain e-locker work with backup software? | |
| | 00018 | What is the encryption algorism used? | |
| | 00017 | Where does Curtain e-locker do encryption? | |
10 |
| |
6 |
| Feature - Basic |
| |
3 |
| |
5 |
| Feature - Copy Out |
| |
2 |
| |
3 |
| Feature - Housekeeping |
| |
2 |
| Feature - Online Offline Protection |
| |
2 |
| Feature - Others |
| |
2 |
| Feature - Personal Local PD |
| |
2 |
| Feature - Print to PDF |
| |
2 |
| Feature - Protect First Draft |
| |
4 |
| Feature - Send Request |
| |
25 |
| |
1 |
| Languages |
| |
7 |
| |
5 |
| Patch |
| |
1 |
| |
12 |
| Sales & Marketing |
| |
10 |
| |
10 |
| System Requirements |
| |
4 |
| |
7 |
| User Interface |
| |
370 |
| |