AccessPatrol Endpoint Security
Monitor and block USB device use in your organization to protect sensitive corporate data against theft.
Block USB Access
Data Loss Prevention
Allowed List for Devices
Remote Workforce Compatible
Trusted by

Manage CurrentWare from your Windows Desktop or Web Console*


*Coming soon: Web Console is currently in private beta & will be available for public launch in April 2021. Click here to request early access
Improve Endpoint Security with an Industry-Leading DLP solution
AccessPatrol gives you full control over your endpoint security and device usage!
Endpoint Security
Bolster your endpoint security by protecting your computers against users with malicious USB devices.
Prevent Data Leakage
Improve your data security and endpoint security with granular device control features. Control who can transfer data to USB devices and what devices they can transfer to.
File Transfer Visibility
Gain more insight into how employees are handling sensitive company data. Generate USB activity reports to investigate files that have been transferred or modified.
User and Computer Based Policies
Set unique content blocking policies for each user, endpoint, and department in your organization. Have policies follow users in any computer they use.
Centralized Security
From a centralized console, endpoint security policies can be applied instantly to all endpoint devices on your network. The console is intuitive and easy-to-use.
Remote Workers Compatible
AccessPatrol is compatible with off-site computers. Protect your organization’s data by controlling the access of devices used by your remote workers.
AccessPatrol protects your sensitive data from theft and misuse
Granular control over a variety of peripheral devices
Increase endpoint security by blocking or limiting the use of storage devices, wireless connectivity, communication ports, imaging devices, and other peripherals. Policies can be uniquely configured for each user, endpoint, and department.
- Easily block USBs, optical discs, external hard drives, SD cards, and other removable media
- Disable wireless connections through Bluetooth, infrared, and Wifi
- Block employees from using scanners, printers, and cameras to steal sensitive data

Monitor USB activity for suspicious behavior
AccessPatrol’s USB activity monitor improves your endpoint security through increased visibility into high-risk data transfers.
- Receive instant email alerts when employees violate your endpoint security policy by using unauthorized USB devices or transferring sensitive files
- Audit file operations reports to see files that have been copied, created, deleted, or renamed on removable media devices
- Review USB activity logs to trace data breaches back to their source
Enforce endpoint security and device control policies
AccessPatrol gives you the device control features you need to enforce and manage your endpoint security policies.
- Effortlessly block all peripheral devices that fall outside of your allowed devices lists
- Exempt USB devices used by tech support and other trusted users
- Temporarily grant time-limited access to blocked devices using the Access Code Generator
Flexible Deployment Options
On Premises
Easy to install. Everything stored on your own network.
Remote Workers
Connect remote users with minimal configuration.
Private Cloud
All the benefits of the cloud on a server of your choice.
AccessPatrol’s Endpoint Security Features
Block USB
One click to block USB devices completely
Block External Devices
Easily block DVDs, iPods, external hard drives and more from being accessed on your computers
Device Permissions
Set full access, read only or no access on storage devices
Allowed List
Allow specific storage devices to be always allowed on your network
Device Report
Report on devices accessed or blocked on your network
Log USB File Transfer
Prevent data theft by monitoring files created and deleted on USB devices
Access Code Generator
Provide end users with temporary access to their devices
Email Alerts
Alert administrators of unauthorized file transfers and devices access
Email Reports
Email device reports directly to your administrator's inbox
Block Phones
Prevent users from connecting their phones to company computers
Block File Transfers
Prevent users from transferring restricted file types to their devices
Stealth Mode
CurrentWare runs silently in the background and can be optionally configured to alert users
Centralized Console
Manage all your users from the centralized console with Active Directory import or syncing
Remote Client Install
Easily deploy the CurrentWare Client remotely to all of your computers
Offsite Management
Extend onsite policies to laptops running outside the corporate network
SQL Server Supported
Our database is scaled for enterprise and large business operations
CASE STUDY
First Choice Health protects their patients’ information
“We never have to worry about what may happen when someone plugs a device into one of our machines. AccessPatrol has made our lives easy. We just set it, forget it, and it works!”

Check out our great reviews on Capterra!
Try AccessPatrol for Free
Fully Functional. Easy to use. Install in minutes
System Requirements
Compatible on Windows 7/8/10 & Server 2008/2012/2016/2019
How to Order
Orders may be placed online, by phone, by fax or by e-mail. We accept purchase orders, major credit cards, PayPal and payments by check.