Mitigating Insider Threats in Document Management Systems (DMS) with Curtain e-locker DLP 

Document Management Systems (DMS) such as SharePoint, Lotus Notes, and Windows File Server help organizations manage and centralize critical documents: product plans, contracts, financial data, and research files. This centralization makes it easier for employees to access information, but also increases the risk if files can be freely downloaded, copied, or shared. Insider threats become harder to detect and control once documents leave the system. 

Traditional DMS access controls focus on who can open a file. However, they do not address what users can do once the document is opened. 

  • Mass Data Theft: Employees may copy large volumes of sensitive files before leaving the company. 
  • Accidental Leakage: Important documents can be placed on personal drives, sent outside the organization, or shared with the wrong contacts. 
  • No Traceability: Files printed or copied onto USB drives become impossible to audit or recall. 

After download, DMS platforms lose control over files. For SharePoint, Lotus Notes, and similar systems, files brought onto desktops or laptops are outside the reach of native controls. 

  • Files exported from the DMS can be copied, shared, or uploaded without detection. 
  • Standard settings in many document platforms do not monitor or prevent copying, printing, or emailing once files reach the endpoint. 

Curtain e-locker DLP: Preventing Data Loss at the Endpoint
Data Outflow Control

Data Outflow Control:

Blocks actions like saving to external media, exporting, printing, copy-paste, uploads to unauthorized cloud storage, and sending files via email outside approved domains.

Context-Aware Integration

Context-Aware Integration:

Operates with SharePoint, Lotus Notes, and Windows File Server, restricting downloads and unapproved sharing while allowing daily work.

Authorization Workflow

Authorization Workflow:

Requires approval before files can be moved or sent externally, logging every action for full traceability.

Consistent Endpoint Protection

Consistent Endpoint Protection:

Applies the same protections regardless of how documents are accessed—locally, via web portal, or file server.


Yes. It prevents unauthorized saving, copying, and uploading from the endpoint, regardless of how a document was first accessed.

Curtain e-locker supports direct integration with both platforms, applying outflow controls without disturbing day-to-day access for approved users.

Printing and export actions are restricted, logged, and can be watermarked for accountability. Files remain protected and traceable whenever possible.

Protect Your Documents from Insider Threats
Scroll to Top