Endpoint Security Solutions

Device control and endpoint security solutions to protect sensitive corporate data against theft.

Block USB Access


Data Loss Prevention


Allowed List for Devices

Remote Workforce Compatible

Trusted by 

Pepsi-Cola Logo
AXA Logo
Hyatt logo
Honeywell logo
San Diego Padres logo

AccessPatrol secures data against insider threats
with USB activity detection and access control

Granular control over
USB devices and more

Protect sensitive data with AccessPatrol’s endpoint security solutions. Block or limit the use of storage devices, wireless connectivity, communication ports, imaging devices, and other peripherals. Policies can be uniquely configured for each user, endpoint, and department.

  • Easily block USBs, optical discs, external hard drives, SD cards, and other removable media
  • Disable wireless connections through Bluetooth, infrared, and Wifi
  • Block employees from using scanners, printers, and cameras to steal sensitive data

Monitor USB activity for suspicious behavior

AccessPatrol’s endpoint security solutions include a USB activity monitor for increased visibility into high-risk data transfers.

  • Receive instant email alerts when employees violate your endpoint security policy by using unauthorized USB devices or transferring sensitive files
  • Audit file operations reports to see files that have been copied, created, deleted, or renamed on removable media devices
  • Review USB activity logs to trace data breaches back to their source

Prevent the use of unauthorized portable storage hardware

AccessPatrol’s endpoint security solutions give you the device control features you need to enforce and manage your endpoint security policies.

  • Effortlessly block all peripheral devices that fall outside of your allowed devices lists
  • Exempt USB devices used by tech support and other trusted users
  • Temporarily grant time-limited access to blocked devices using the Access Code Generator

Endpoint Security Solutions to
Protect Against Data Loss to USB Devices

Illustration depicting endpoint security by having two security guards standing in front of a computer

Endpoint Security Solutions

AccessPatrol’s endpoint security solutions protect your computers against malicious USB devices and high-risk file transfers.

Illustration of a man on a laptop. There are icons of file folders behind him protected by a shield with a lock icon

Prevent Data Leakage

Improve your data security and endpoint security with granular device control features. Control who can transfer data to USB devices and what devices they can transfer to.

Illustration depicting USB devices by showing a hand placing a file in a folder

File Transfer Visibility

Gain more insight into how employees are handling sensitive company data. Generate USB activity reports to investigate files that have been transferred or modified.

Illustration of a man on a laptop surrounded by gear icons

User and Computer Based Policies

Set unique content blocking policies for each user, endpoint, and department in your organization. Have policies follow users in any computer they use.

Illustration of a man sitting in a chair operating a console

Centralized Endpoint Security Solutions

All of CurrentWare’s endpoint security solutions operate from a convenient central console. Manage all of your endpoints and run reports in just a few clicks.

Illustration of three employees framed by cogs

Remote Workers Compatible

Use our endpoint security solutions with off-site computers. Protect data by controlling the access of devices used by your remote workers.

Manage our endpoint security solutions from a convenient central console

Screenshot of the central console of AccessPatrol endpoint security solutions

Flexible Deployment Options

Icon of a hard drive

On Premises

Easy to install. Everything stored on your own network.

Icon of globe with meridians. Four nodes extending from it

Remote Workers

Connect remote users with minimal configuration.

Icon of a server with a cloud behind it

Private Cloud

All the benefits of the cloud on a server of your choice.

AccessPatrol’s Data Protection Features

Block USB

Block USB

One click to block USB portable storage devices 

Block External Devices

Peripheral Control

Easily block DVDs, iPods, external hard drives and more

Device Permissions

Device Permissions

Set full access, read only or no access on storage devices

Allowed List

Allowed List

Allow specific storage devices to be used on your network


USB Activity Reports

Report on devices accessed or blocked on your network

Track File Transfers

Log USB File Transfer

Monitor files that are copied to USB storage devices

Deivce Access Code

Access Code Generator

Provide end users with temporary access to their devices

Email Alert

Email Alerts

Get alerts of unauthorized file transfers and device use

Email Report

Email Reports

Schedule device reports directly to your administrator's inbox

Block Phones

Block Phones

Prevent users from connecting phones to company computers

Block Files

Block File Transfers

Prevent restricted files from being transferred to portable storage


Stealth Mode

AccessPatrol can run silently in the background or alert users


Centralized Console

Central Web Console

Access the administrative console from a web browser on any computer in your network

Remote Client Install

Remote Client Install

Easily deploy the CurrentWare Client remotely to all of your  company computers

Offsite Management

Offsite Management

Extend onsite policies to endpoint devices running outside the corporate network

Centralized Console

SQL Server Supported

The included SQL database is scalable for enterprise and large business operations


First Choice Health protects their patients’ information

“We never have to worry about what may happen when someone plugs a device into one of our machines. AccessPatrol has made our lives easy. We just set it, forget it, and it works!”

Stethoscope on top of a report

Check out our great reviews on Capterra!

"This software helps us to achieve compliance with industry and government requirements."

- Matthew W, Project Manager
Mindrum Precision

"Endpoint security simple and easy and economical. All in one place!"

- Pankaj S, President
eRecords USA

Try AccessPatrol for Free

Fully Functional. Easy to use. Install in minutes

AccessPatrol Endpoint Security Solutions FAQ

Can I Set Unique Device Restrictions for Different Computers or Users?

Yes. With AccessPatrol’s endpoint security solutions you can block or allow USB devices and other peripherals for each computer, user, department, or other organizational unit (OU) in your company. 

To do this, AccessPatrol’s management console allows you to create group folders with separate policies. This feature is perfect for blocking USB devices for employees while still providing access for trusted administrators that need unrestricted access. 

You can also use the access code generator to temporarily grant access to all peripherals or use the device scheduler to automatically allow/block devices at specific times.

Can I Use AccessPatrol for My Remote Team?

Yes. CurrentWare’s endpoint protection software solutions support a variety of deployment options that allow you to control USB devices no matter where your employees work.

To learn more about increasing the security of remote workers with our endpoint security solutions, visit this article: How to Set Up Device Control Software for Remote Teams

Are There Any Limits to the Free Trial?

The free trial of our endpoint security solutions are fully functional. You can deploy it on up to 10 computers for 14 days. If you need more time or more computers to properly evaluate AccessPatrol in your organization, reach out to our support team.

Who Uses This Data Loss Prevention Software?

CurrentWare has a global client base across a variety of industries including government, healthcare, finance, nonprofit, and manufacturing.

CurrentWare’s customers use our computer monitoring, web filtering, and endpoint security solutions to protect their business against time theft, data leakage, and web-based threats by monitoring and controlling computer usage. 

Read our data loss prevention and device control software customer case studies to learn more.

Can I Block Specific File Types from Being Transferred?

Yes. One of the endpoint security solutions provided by AccessPatrol is the ability to prevent your end-users from copying specific files to their storage devices. These file transfer restrictions can be configured based on the file name or file extension. 

The file transfer blocking feature can also be used on devices that are on the allowed list. This lets you provide access to company-authorized USB devices while still protecting the sensitive data in your network against exfiltration to portable storage hardware.

Does Currentware Have Access to Employee Data?

No. CurrentWare’s endpoint security solutions do not send your user’s computer usage data to CurrentWare. They are installed and managed by your organization.

All of the data collected by CurrentWare’s software is stored on a database that is installed in a data center in your organization’s network or on a virtual machine provided by a cloud service provider of your choice.

For more information please refer to our Terms of Service

Is This a Cloud Solution?

No, our endpoint security solutions are not cloud-native. At this time AccessPatrol will continue to be offered for on-premises deployments, however, you can install CurrentWare’s software on a cloud platform of your choice with our Bring Your Own Cloud option.

CurrentWare will not have access to your employee’s data. All of the data collected by CurrentWare’s employee monitoring and endpoint security solutions are stored on a database that is fully controlled and managed by your organization. For more information please refer to our Terms of Service

Which Devices Can I Control With AccessPatrol?

AccessPatrol allows you to control the following peripheral devices on your users’ computers.

Devices Access Permissions
USB Full / Read only / No access
DVD /CD Full / Read only / No access
Floppy Full / Read only / No access
Tape Full / Read only / No access
External Hard drive Full / Read only / No access
Firewire Full / Read only / No access
SD Card Full / Read only / No access
MM Card Full / Read only / No access
Bluetooth Full / No access
Infrared Full / No access
Wifi Full / No access
Serial Full / No access
Parallel Full / No access
Scanners Full / No access
Cameras, Webcams & Others Full / No access
Printers Full / No access
USB Ethernet Adapter Full / No access
Sound Cards Full / No access
Portable Devices (iPhones, Mobiles) Full / No access
Network Share Full / No access

Learn More:
Device control with AccessPatrol

Will My Employees Know They Are Being Monitored?

As with any CurrentWare Suite product, your organization is in control of how visible the endpoint security solutions are.

AccessPatrol does not disclose when its USB activity monitoring feature is active. When your employees attempt to use an unauthorized USB device they can be presented an optional warning message.

The CurrentWare software client that is used by our endpoint security solutions operates in stealth mode by default.

In stealth mode, the CurrentWare software client is not visible in the system tray or control panel of the employee’s computer. Your employee will not be able to uninstall the program or stop it without administrator privileges.

If you would like your employees to be aware that they are being monitored, you can choose to show the CurrentWare software client in their system tray by enabling it in the client software settings.

If you would like to disable monitoring altogether, visit this article: How Do I Disable AccessPatrol’s Device Tracking?

How Can I Start Protecting My Data?

  1. Download & install AccessPatrol
    Download the files for your free device control software trial. On the administrator’s computer, run CurrentWare.exe to begin the installation of the endpoint security solutions.
  2. Deploy the software clients
    Deploy the CurrentWare software client (cwClientSetup.exe) on all the computers you want to control with our endpoint security solutions. You can deploy the software client with a local install or by using Active Directory, SCCM, or our built-in remote deployment tool.
  3. Monitor your employees
    After the installation, you will see all of your employee’s computers on the CurrentWare Console. From this console, you can run detailed reports on all of your employees’ USB device activities and use our endpoint security solutions to protect data against insider security threats.

Try AccessPatrol for Free

Fully Functional. Easy to use. Install in minutes

System Requirements

Compatible on Windows 7/8/10 & Server 2008/2012/2016/2019

How to Order
Orders may be placed online, by phone, by fax or by e-mail. We accept purchase orders, major credit cards, PayPal and payments by check.