Average Ratings 2 Ratings
Average Ratings 0 Ratings
Description
Secure your data using AES 256-bit military-grade encryption or conceal your files from unauthorized access to prevent any unwanted scrutiny! With Folder Lock, you can easily lock and hide files and folders in mere seconds. This powerful tool allows you to set password protection, ensuring that no one can access your files, folders, or drives without your permission. Once a folder is locked, it becomes invisible in its original location and can only be retrieved through the software interface. Folder Lock functions like a digital safe, creating secure 'Lockers' for your sensitive information. Imagine safeguarding your files in a digital ‘Locker’ that's more secure than a bank vault! You can effortlessly set up these ‘Lockers’ using AES 256-bit encryption. There’s no need to manually encrypt or decrypt files when you want to access them; just copy them into the Locker, and they will be encrypted automatically. Additionally, Folder Lock provides a two-way encryption and backup solution, allowing you to efficiently backup your encrypted ‘Lockers’ online for added security. This feature not only enhances your data protection but also ensures peace of mind knowing your files are safe from prying eyes.
Description
An advanced security solution designed to manage access to various computer resources more effectively. It encompasses all the features found in the Standard edition while adding robust security tools tailored for power users and system administrators, such as parental controls, internet usage restrictions, guest passwords, kiosk mode protection, remote access capabilities, USB drive authentication, desktop and webcam snapshots, among others. This comprehensive security solution safeguards your computer from unauthorized access and misuse. It functions as an all-in-one platform that allows you to manage security elements of Windows at a granular level, offering the flexibility to establish distinct protection schemes for each user in a multi-user setting. WinLock selectively activates restrictions according to the individual user profile, ensuring a personalized security experience. Furthermore, it includes specific restrictions for Internet Explorer and filters for website content, providing effective control over internet access, and supports compatibility with most popular web browsers. Additionally, you can securely access WinLock using a USB flash drive, converting any USB device into a unique protection key for enhanced security measures. This innovative approach not only simplifies access but also strengthens the overall safeguarding of your digital environment.
API Access
Has API
API Access
Has API
Integrations
No details available.
Integrations
No details available.
Pricing Details
$39.95/one-time/user
Free Trial
Free Version
Pricing Details
$31.95/one-time/user
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
NewSoftwares.net
Founded
2002
Country
Australia
Website
www.newsoftwares.net/folderlock/
Vendor Details
Company Name
Crystal Office Systems
Founded
1999
Country
United States
Website
www.crystaloffice.com/winlockpro/
Product Features
Business Continuity
Backup Log
Backup Scheduling
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Multiple System Support
Remote Server Options
Secure Data Storage
Web Access / Restoration
Data Recovery
Web Access / Restoration
Backup Log
Backup Scheduling
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Multiple System Support
Remote Server Options
Secure Data Storage
Encryption
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking
Product Features
Privileged Access Management
Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring