Curtain DLP


Curtain e-locker is a powerful Data Loss Prevention (DLP) solution that secures sensitive electronic information within an organization. It controls and monitors user actions such as saving, copying, printing, and transferring files to prevent data leakage, and ensures confidential data is accessible only within a secure zone. Users can continue working with the data within the Zone without disruption.

Whether you are in healthcare, finance, legal, or any other sector, Curtain e-locker is your trusted partner in safeguarding critical data and maintaining compliance with stringent data protection regulations.


Features

Granular User Control Over File Permissions

Curtain e-locker DLP provides precise control over user actions within the protected zone and in different folders, letting administrators manage access individually. For each user group, you can tailor permissions to specific actions, like saving, copying and pasting, sending files externally, taking screenshots, printing, editing, sharing internally, or setting it as read-only. This level of granularity ensures that sensitive information stays secure and that each user only has access to the tools they genuinely need.

Salesperson, engineer, designer or other roles can have different access ability, like read, edit, print, internal share and copy out

Online / Offline Protection

Files can be downloaded to local Protected Directory for reading and editing.

Administrators can define different control policies, to ensure sensitive files are secure, even when workstations are offline or users are working out of the office.

centralized control by the admin to set differnt online and offline policy

Protect First Draft

File creators must save new files to the Protected Zone

The control can be applied per application, this prevents creators from saving new design files to other unsecured locations and is especially suitable for R&D department.

first draft and only save in protected zone

Smart Copy & Paste Control

You can copy data to the Protected Zone, or copy and paste files within the Zone. However, copying data from the Protected Zone to other locations is prohibited. It makes a good balance between convenience and security.

Can't copy and paste to out of protected zone area

Personal local protected directory

Local Protected Directory can be personalized according to login user. It is suitable for shared workstations and notebooks, which prevents other users from accessing your local Protected Directory.

People at the shared workstation working happily

Screen Capture Protection

To enhance security, windows displaying sensitive data are obscured during screen captures, and screen-dump software is blocked. However, users can still enjoy the convenience of screen capture for non-sensitive data.

Additionally, administrators can apply custom watermarks to further deter unauthorized sharing.

windows displaying sensitive data are obscured during screen captures

Secured Internal File Sharing

Users can pass encrypted files to colleagues by email or USB hard disk, but can only be decrypted within the company. Sensitive files are still secured even when the USB is lost.

encrypted files can be shared by email, USB, or other method, but can't decrypted outside the zone

Central Audit Log

Files activities in the Protected Zone are logged. Allow management to review the usage of sensitive files.

Files activities in the Protected Zone are logged

Other Features


Curtain e-locker Overview


Benefits

Data Security icon

Enhanced Data Security

Protects sensitive data from unauthorized access and leakage.

Zone-Based Protection icon

Zone-Based Protection

Allows for tailored security policies with granular control for different roles.

Continuous logging icon

Real-Time Logging

Continuous logging of data flow and user activity.

under control icon

Simplified Management

Easy administration with user-friendly interface for policy creation and management.

save money and time icon

Cost-Efficient

Reduces the risk of costly data breaches and lowers compliance and regulatory costs.

Scalability icon

Scalability

Easily scalable to accommodate different user groups and data sources.

Data safe icon

Data Encryption

Encrypts data at user-side and in transit to ensures data integrity and confidentiality.


Scroll to Top