Security Lock Software

Thank You for Submitting a Reply,! In the Open screen, navigate to the folder on your computer containing the downloaded. It also comes with some good extras such as the back up and shred tools. Rest assured that your Gateway always maintains your lock information. Folder Lock is well built, flexible application that offers more than just locking down folders.

USB-Lock-RP Device Control

Security lockAccess Locks

They are encrypted on-the-fly. Never worry about private data in some apps may be read by someone again! Click here to review our site terms of use.

Click on the left side lock. Rename groups using the group rename function. The sector is unprotected.

Finally, import the database to the new version. You also have the option to create virtual encrypted Wallets, for storing data such as addresses and bank information. You can also back up all of your encrypted data to the cloud. Keeping this value protected from the risk of data loss, data theft is challenging. Be aware that both letters always denote the same version.

Records automatically arrive and are stored secured at the Control server. Never worry about a workmates get your phone to have a look again! Flaming or offending other users. They contacted me very quickly and help me to transfer lincence to new machine.

Lock Folders

It lets you password protect and set different acc. The Serial Number and Registration Key could be transferred forward. Click Lost Registration to retrieve your info. Backup files to a secure cloud. Head over to our Contact page and let us know.

It can be a Server, Workstation or Laptop. You can create as many cards as you want in these Wallets. Then, re-discover the lock and perform a full download i.

Remote Devices can be blocked or be specifically authorized normally. Consumer Support Non-Locking Professionals, click here to get a factory-trained specialist in your area. Protection measures escalated depending on the device type and the device status but lockdown is normally included when blocking usb and other removable storage under the software protection scope. Improved file locking software to protect photos, audios and documents.

What do you need to know about free software? Pros Does exactly what it is supposed to do with simple and creative user interface. Report this app to Microsoft. The Control is installed on a Server on-premises within the network domain and operates independently as the Centralized Administrative Console.


At the Central control server the collected data remains encrypted and same as all device insertion attempts records is only readable within the Device Control interface. Once set operation is automatic. Cons so far, I can see no cons Summary great program, and great customer support when you need it. Download the two firmware.

It thwarts hackers by logging and acting upon multiple failed log-in attempts, while a hotkey-activated stealth mode keeps out snoops. Start protecting your network in minutes. Support is in English at no charge by email or phone. It does all and more than I need.

Cons Nothing i see Summary use this app to password protect my folders and it is excellent. Language supported English United States. Protects even if client endpoint is disconnected from the network.

The Shred Settings on the Settings menu sets the default shredding action and can exclude locked and program files from shredding. Your message has been reported and will be reviewed by our staff. Read our End User License Agreement.

Jon Siddall Birmingham, U. Encrypt your Files Folder Lock creates Lockers. Removable storage is considered an attack vector by itself and a probable initial attack vector in an infection sequence. The Management application operates on-premises within the network and provides real-time control over endpoint computers.

Keep your encrypted lockers backed up and synced on a dedicated secure cloud server. If you have any changelog info you can share with us, we'd love to hear from you! Works on air-gapped networks and remote locations. Failure to perform these tasks may cause improper device operation. Folder Lock creates Lockers.

Additionally, Folder Lock comes with additional security settings unheard before. Click the Group security button and choose the group name, sector e. Allows to set or change security measures and automatically receive and log details on blocked, 2008 professional edition and authorized devices as they are plugged into endpoint computers in real-time. Folder Lock Additional Information.

One license, one machine - I wonder if some day the encrypted folder can be cloned to my cloud account for even deeper backups? Also includes other updated keypad programming features.

Intruder Alert Alarm included catch intruders red handed! Description Lock Your App! Central Control of Device Access to Computers.