How does IceLock protect against unauthorized users?
Unlike other encryption applications, IceLock monitors user behavior on the computer. If someone repeatedly fails to login, IceLock detects successive failures and will automatically take steps to protect encrypted data. These steps include destroying essential elements of the decryption key rendering access impossible. If IceLock sees the computer is marked as lost or stolen it automatically takes steps to protect your data.