CBFS Filter is a powerful development library that allows you to intercept and react to filesystem, registry, and process manager operations as they occur. Advanced filter rules ensure that your application only gets notified of the operations that you actually care about, and intelligent access rules enable you to enforce access restrictions with no additional effort. Without writing a single line of driver code, you'll be able to modify data, encrypt files on-the-fly, control access, and block requests entirely.
Features
Proactively Intercept and React to Requests: CBFS Filter's robust, rules-based filtering engine is flexible enough to handle use-cases of any scale and complexity. Target the requests you care about with surgical precision, then react to them as they occur.
Secure Files and Enforce Access Restrictions: Implement on-the-fly file encryption, using algorithms of your choice, for deeply-integrated data security. Leverage intelligent access rules to enforce targeted access restrictions at the file-system level.
Monitor Process and Thread Activity: Keep an eye on applications' process and thread activity. Limit access rights to prevent undesired creation, suspension, and termination; and to guard against potentially unwanted programs (PUPs).
Implement Continuous Data Protection (CDP): Continuously record all filesystem changes, and back up content revisions in real time as each modification occurs. Encrypt the backups before storing them for added peace of mind.
Log System Activity for Auditing Purposes: Get a complete picture of who or what is accessing your information. CBFS Filter's comprehensive monitoring capabilities let you keep a detailed record of everything that happens on your system.
Manage and Protect Registry Keys: Full control over registry key creation, modification, enumeration, and deletion allows you to protect registry keys and their values. You can even redirect requests to other registry keys.
Create Virtual Files, Directories, and Registry Keys: Create virtual files, directories, and registry keys populated with application-defined data. Windows will recognize them as real, so third-party applications can interact with them in the usual manner.
Outstanding Technical Support: Backed by an expert team of support professionals. Unlimited free Email support or paid Premium Support options.
Other Features...: Detailed documentation, sample applications, how-to articles, and more!