Curtain e-locker logo

Prevent data leakage

a gear icon

Sophisticated file log

application windows icon

Support over 500 applications & keep on growing

a security lock icon

Restrict file save, copy, print & screen capture

Curtain e-locker DLP – Data Loss Prevention Software

Shield-shaped logo for Curtain e-locker security solutions

Understanding Data Loss Prevention (DLP)

In today’s digital landscape, companies handle vast amounts of data. Within this data lies sensitive information, such as Personally Identifiable Information (PII), intellectual property, business secrets, and surveillance footage.

This presents a critical challenge: How can organizations empower authorized staff to use this data productively while preventing leaks—whether intentional or accidental?

This is the core problem Data Loss Prevention (DLP) is designed to solve.

A DLP solution’s primary objective is to strike the perfect balance between operational convenience and ironclad security. It ensures authorized users can work efficiently while proactively preventing sensitive information from leaving its secure environment.

logo showing a mouse device in a circle

Introducing Zone-Based DLP: A Smarter Approach

Most traditional DLP tools are Content-Based. They require companies to define sensitive information using keywords or patterns, then scan all outgoing communications (emails, uploads, etc.) for matches. While logical in theory, this approach has a major flaw: false positives.

Imagine an employee sending a routine email to schedule a meeting, which includes a customer’s name and phone number. A content-based DLP, detecting this “PII,” could flag and block the email. This disrupts workflow, frustrates users, and forces IT to handle manual approvals. Over time, this leads to “alert fatigue,” where security teams are forced to disable proactive blocking, reducing the powerful DLP to a mere logging tool.

Curtain e-locker DLP offers a fundamentally different and more effective strategy: Zone-Based DLP.

What is Zone-Based DLP?

Curtain e-locker DLP is a unique Zone-based DLP solution. We take a different approach: instead of scanning content, we empower companies to secure information based on where it is stored.

First, administrators designate the systems and shared folders that contain sensitive data—such as HR department shares, finance servers, ERP/CRM systems, or customer databases. These become controlled sources. Data from these systems can only exist within the sources and a defined set of allowed locations, which we call the Protected Zone.

Users can work within this Protected Zone as usual: accessing data, downloading files, sharing internally, and performing analysis—all without interruption. The key control is automatic: any file/data from a controlled source is confined to the Zone. It cannot be copied out, emailed, or uploaded to unauthorized locations.

This design creates perfect isolation between sensitive corporate information and casual data. Companies gain complete visibility and control, knowing exactly where their critical data resides. Meanwhile, users enjoy unimpeded use of their devices, messaging apps, and the internet for their everyday, non-sensitive tasks.

logo showing a mouse device in a circle

A Complete Solution

Product box of Curtain e-locker DLP

Curtain e-locker changes “Uncertainty” to “Company Practice”

It controls:

  • Save Anywhere
  • Send
  • Print
  • Print Screen
  • Copy Content to Anywhere
  • Copy File to Anywhere

Architecture

With Curtain e-locker, there is a Curtain Policy Server. Administrators can define which systems (e.g. share drives, web system, ERP, CCTV system, etc) in server are protected by Curtain e-locker. In order to access Protected systems, by default Curtain Client must be installed on user’s workstations. A secure folder (i.e. Local Protected Directory) will be automatically created in user’s workstation during installation of Curtain Client.

Then administrators can define different control policies for users/user groups centrally in Curtain Policy Server. Curtain e-locker has a unique design called Protected Zone (i.e. combined by Protected system in server and Local Protected Directory in user’s workstation). Users can work with sensitive information within the Zone as usual (e.g. Read, Edit, etc). However, they cannot take the information out of the Zone if they are not authorized. At the same time, users can still use Internet, email, and etc.

With Curtain e-locker, companies can allow users to work with the company’s data, documents, and information as they normally would, while simultaneously ensuring that the organization’s valuable data assets are safeguarded from unauthorized access and potential data breaches.

Diagram showing e-locker Protected Zone in server and user's workstations

Features of Curtain e-locker

  • Control Saving / Printing / Sending
  • Control Print-Screen / Copy-n-Paste
  • On-screen watermark
  • Integration with Active Directory
  • Password management
  • Supports over 500 Applications
  • Online / Offline Protection
  • Secure generation of PDF file
  • Secure internal file sharing
  • Housekeeping of downloaded files
  • Admin delegation
  • Self protection for the software
  • File / Print log
  • Watermark for printout
  • Snapshot for printout
  • Approval for sending file out
  • Copy-out with declaration
  • Local encrypted drive

Benefits

Curtain e-locker is an all-round & complete solution to your problems

confidential document icon

Prohibits confidential data from being taken away or copied to other/ external sources

Deny accessing a document icon

Stops confidential data from being leaked unintentionally

computer with shield icon

Differentiates your products/services from competitors

Security shield icon

Mitigates the risk of legal liability

regulation compliance symbol

Complies with regulations

Security shield icon

Changes “Uncertainty” to “Company Practice”

handshaking icon

Helps expand your business with invincible security

Supported Applications

Curtain e-locker has a great support coverage on applications. It supports not only general office applications, but also CAD/CAM software, multimedia applications, ERP systems, CCTV systems, programming tools, and so on. However, if you want to secure an application but which is not in our support list, please feel free to let us know. Many more software applications would be covered in days and years to come!
Please check out here to see the common applications already been covered:

Office Utilities

  • 7-Zip
  • Adobe Acrobat
  • Adobe Reader
  • CutePDF Writer
  • Google Chrome
  • IrfanView
  • Microsoft Access
  • Microsoft Edge
  • Microsoft Excel
  • Microsoft Internet Explorer
  • Microsoft OneNote
  • Microsoft Paint
  • Microsoft PowerPoint
  • Microsoft Project
  • Microsoft Visio
  • Microsoft Word
  • Nitro PDF Pro
  • Notepad
  • OpenOffice
  • PDF Complete
  • PDFill PDF
  • SnippingTool
  • WinRAR
  • WordPad
  • Windows Explorer
  • Windows Media Player
  • WPS Presentation
  • WPS Spreadsheets
  • WPS Writer
  • WinZip

CAD/CAM Software

  • 3ds Max
  • 3DVIA Composer/Player
  • Altium Designer
  • AutoCAD
  • AutoCAD Electrical
  • AutoCAD Mechanical
  • Autodesk Fusion 360
  • Autodesk Inventor
  • CATIA
  • CAXA CAD/Mechanical
  • CCAD Free/Professional
  • Creo
  • DWG editor/TrueView
  • Gerber AccuMark
  • JewelCAD
  • MasterCAM
  • Matlab
  • PADS
  • Pro/ENGINEER
  • PTC Mathcad Prime
  • Rhinoceros
  • Solid Edge
  • SolidCAM
  • SolidWorks
  • SolidWorks Composer Player
  • SolidWorks Electrical
  • SolidWorks Simulation
  • SolidWorks EPDM
  • Unigraphics NX
  • Zhong Wang CAD

Graphics & Multimedia

  • ACDSee
  • ACDSee Pro
  • ACDSeeQV Pro
  • Adobe After Effects
  • Adobe Animate
  • Adobe Bridge
  • Adobe Illustrator
  • Adobe InDesign
  • Adobe LightRoom
  • Adobe Photoshop
  • Adobe Premiere Pro
  • Canon XF utility
  • Capture NX-D
  • Corel PHOTO-PAINT
  • CorelDRAW
  • HandBrake
  • JDPaint
  • LaserCut
  • LayOut
  • Media Composer
  • Media player classic
  • OptiTex Mark
  • OptiTex Modulate
  • OptiTex PDS
  • PE DESIGN NEXT
  • PhotoImpact
  • Quick Time
  • Roland 3D Engrave
  • Roland Dr.Engrave
  • Sony Xdcam Viewer

Others

  • AXIS Camera Station
  • AXIS File Player
  • Backup Player/Viewer
  • C++ Builder XE2
  • Cognos Impromptu
  • Delphi XE2
  • Eclipse
  • Epicor ERP
  • File Finder
  • Jupyter Notebook
  • Genetec Video Player
  • Indigo Vision
  • Media Player
  • Microsoft Dynamics AX
  • Microsoft SQL Server
  • Microsoft Visual Basic
  • Microsoft Visual FoxPro
  • Microsoft Visual SourceSafe
  • Microsoft Visual Stuido
  • Multi Backup
  • Multi Sview/Viewer
  • NS Backup Viewer
  • Python
  • R Studio
  • QuickBooks Premier
  • SAS Enterprise Guide
  • Smart Player
  • SmartPSS
  • XProtect Smart Client
  • VLC media player

Resources

System Requirements

  • CPU: 1.6 GHz or faster, 2-core; 2 GHz or greater recommended
  • WinXP/Vista/Win7/Win8/Win10/Win11/ Server 2003/2008/2012/2016/2019/2022
  • 2GB RAM
  • 2GB Hard Disk (in NTFS) for installation
  • TCP/IP network

Licensing

So, how much is a license and how does the calculation work? Well, literally we have 2 types of licensing model, Perpetual and Subscription. After selecting licensing model, you should purchase licenses for protecting your client workstations and backend systems.

  • Select licensing model first (Perpetual or Subscription)
  • On client-side, choose to purchase the required license (Office Suite or Universal License) according to the number of workstations or the number of concurrent users, and you can purchase a mix of Office Suite and Universal license. Example: Buy 20 Universal licenses for design department to protect design documents, and buy another 100 Office Suite licenses for other departments to protect general office documents.
  • For backend system, purchase the corresponding backend system module for the system that needs to be protected. Example: If you need to protect share folders on Windows file server, you should purchase Curtain e-locker Protector for Windows File Server. No matter how many file servers need to be protected, only one file server protection module is needed.

Curtain e-locker Office Suite covers all our supported office applications, such as MS Office, Adobe Reader, etc. (See the list of Office Utilities in supported applications)
Curtain e-locker Universal License covers all our supported applications, from office applications to professional design software and CCTV systems, such as AutoCAD, SolidWorks, etc. It also includes Curtain e-locker Office Suite.

For example: A company wants to implement Curtain e-locker to protect share drives on 5 Windows file servers, protect CAD/CAM files for 20 workstations in R&D department, and protect general office documents for 100 workstations in other departments.

License Required:
– 1 x Curtain e-locker Protector for Windows File Server (for protecting Windows file server)
– 20 x Curtain e-locker Universal license (for R&D department)
– 100 x Curtain e-locker Office Suite (for other departments)

Want a Demo / Trial Copy?

If you want to have a product demonstration and/or trial copy for testing, please do not hesitate to contact us.

Request A Demo / Trial >>