Company Description: EZ-Lock DRM - Information Security The program consists of server and client sides. The server determines different groups and different groups have different rules which the clients have to obey. All work done under the protection is transparently and automatically encrypted (locked from external use). The files that are easily taken out of the company will be useless as you cannot decrypt the file. Exceptional outsider's file use is allowed with special authoritative decisions and all |