File Monitor - File Audit

Monitor the file system I/O activities, track the file change in real time, to know who and when your files were accessed.

READ MORE

File Protector - File Access Control

Control the file access, prevent your sensitive files from being accessed by unauthorized users and processes.

READ MORE

Transparent File Encryption - Encryption At Rest

Transparent file level encryption on-the-fly, automatically encrypt/decrypt the data in memory, support AES-256 military grade encryption.

READ MORE

Secure File Sharing with DRM

Share encrypted file with digital rights embedded, grant or revoke the file access anytime and anywhere, prevent your sensitive data from leaking.

READ MORE

Registry Monitoring and Protection

Monitor the registry access on-the-fly, prevent the registry from changing by unauthorized processes or users.

READ MORE

Process Monitoring and Protection

Monitor the process creation or termination on-the-fly, prevent the untrusted Windows programs or application being launched.

READ MORE

Secure Sandbox - Data Protection

Secure your sensitive files with access control policies, prevent unauthorized access, run untrusted programs safely with restriction.

READ MORE

Storage Tiering Solution

Automatically moves data between local stub files and data in the cloud storage. Implement cloud archiving solution.

READ MORE

ABOUT US

We specialize in file system filter driver development for two decades. We architect, implement and test file system filter drivers for a wide range of functionalities, EaseFilter SDK can provide you a comprehensive file security solution to implement your file access control, file audit and file encryption applications. We can offer several levels of assistance to meet your specific needs:Provide consulting service for your existing file system filter driver; Customize the SDK to meet your requirement; Create your own filter driver with our source code.

White Papers

File Security Tools Free Tools

The free tools can monitor the file access in real time to know which user and process accessing the files, based on the user and file information, you can authorize or prevent the file access.

What Clients Say