Average Ratings 1 Rating
Average Ratings 0 Ratings
Description
Secure your data using AES 256-bit military-grade encryption or conceal your files from unauthorized access to prevent any unwanted scrutiny! With Folder Lock, you can easily lock and hide files and folders in mere seconds. This powerful tool allows you to set password protection, ensuring that no one can access your files, folders, or drives without your permission. Once a folder is locked, it becomes invisible in its original location and can only be retrieved through the software interface. Folder Lock functions like a digital safe, creating secure 'Lockers' for your sensitive information. Imagine safeguarding your files in a digital ‘Locker’ that's more secure than a bank vault! You can effortlessly set up these ‘Lockers’ using AES 256-bit encryption. There’s no need to manually encrypt or decrypt files when you want to access them; just copy them into the Locker, and they will be encrypted automatically. Additionally, Folder Lock provides a two-way encryption and backup solution, allowing you to efficiently backup your encrypted ‘Lockers’ online for added security. This feature not only enhances your data protection but also ensures peace of mind knowing your files are safe from prying eyes.
Description
Just as disasters can strike unexpectedly, IT environments also exhibit a high degree of variability. For this reason, companies require a unified cross-platform solution capable of safeguarding a diverse, hybrid setup. ShadowProtect® backup and disaster recovery software guarantees complete protection and accessibility for on-premises business systems and data. With ShadowProtect, you can achieve or exceed your recovery time and recovery point objectives (RTOs and RPOs). Recovering files and folders can be accomplished in just minutes, and failed servers can be restored efficiently. Utilizing patented VirtualBoot technology, you can effortlessly boot a backup image into a virtual machine. ShadowProtect's image-based backups provide you with various recovery options, enabling you to retrieve a lost file, restore an entire data volume, or transfer a failed server's system to a new physical or virtual machine without complications (P2P, P2V, V2P, V2V). You can trust ShadowProtect, as it features automated verification of backup images to guarantee their effectiveness when disaster strikes, ensuring peace of mind for your IT infrastructure. Ultimately, with ShadowProtect, businesses can navigate the complexities of IT environments with confidence and resilience.
API Access
Has API
API Access
Has API
Integrations
Liongard
OneBlox
Pricing Details
$39.95/one-time/user
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
NewSoftwares.net
Founded
2002
Country
Australia
Website
www.newsoftwares.net/folderlock/
Vendor Details
Company Name
StorageCraft Technology
Website
www.arcserve.com/products/arcserve-shadowprotect
Product Features
Business Continuity
Backup Log
Backup Scheduling
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Multiple System Support
Remote Server Options
Secure Data Storage
Web Access / Restoration
Data Recovery
Web Access / Restoration
Backup Log
Backup Scheduling
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Multiple System Support
Remote Server Options
Secure Data Storage
Encryption
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking
Product Features
Business Continuity
Backup Log
Backup Scheduling
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Multiple System Support
Remote Server Options
Secure Data Storage
Web Access / Restoration
Data Recovery
Web Access / Restoration
Backup Log
Backup Scheduling
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Multiple System Support
Remote Server Options
Secure Data Storage
Database
Backup and Recovery
Creation / Development
Data Migration
Data Replication
Data Search
Data Security
Database Conversion
Mobile Access
Monitoring
NOSQL
Performance Analysis
Queries
Relational Interface
Virtualization
Disaster Recovery
Administration Policies
Bare-Metal Recovery
Encryption
Failover Testing
Flexible Data Capture
Multi-Platform Support
Multiple Data Type Support
Offline Storage
Server Management
CPU Monitoring
Credential Management
Database Servers
Email Monitoring
Event Logs
History Tracking
Patch Management
Scheduling
User Activity Monitoring
Virtual Machine Monitoring