AccessPatrol Endpoint Security

Monitor and block USB device use in your organization to protect sensitive corporate data against theft.

Block USB Access
~
Data Loss Prevention
R
Allowed List for Devices
Remote Workforce Compatible

Trusted by 

Manage policies & run reports from a convenient central console

Improve Endpoint Security with an Industry-Leading DLP solution

AccessPatrol gives you full control over your endpoint security and device usage!

Endpoint Security

Bolster your endpoint security by protecting your computers against users with malicious USB devices.

Prevent Data Leakage

Improve your data security and endpoint security with granular device control features. Control who can transfer data to USB devices and what devices they can transfer to.

File Transfer Visibility

Gain more insight into how employees are handling sensitive company data. Generate USB activity reports to investigate files that have been transferred or modified.

User and Computer Based Policies

Set unique content blocking policies for each user, endpoint, and department in your organization. Have policies follow users in any computer they use.

Centralized Security

From a centralized console, endpoint security policies can be applied instantly to all endpoint devices on your network. The console is intuitive and easy-to-use.

Remote Workers Compatible

AccessPatrol is compatible with off-site computers. Protect your organization’s data by controlling the access of devices used by your remote workers.

AccessPatrol protects your sensitive data from theft and misuse

Granular control over a variety of peripheral devices

Increase endpoint security by blocking or limiting the use of storage devices, wireless connectivity, communication ports, imaging devices, and other peripherals. Policies can be uniquely configured for each user, endpoint, and department.

  • Easily block USBs, optical discs, external hard drives, SD cards, and other removable media
  • Disable wireless connections through Bluetooth, infrared, and Wifi
  • Block employees from using scanners, printers, and cameras to steal sensitive data

Monitor USB activity for suspicious behavior

AccessPatrol’s USB activity monitor improves your endpoint security through increased visibility into high-risk data transfers.

  • Receive instant email alerts when employees violate your endpoint security policy by using unauthorized USB devices or transferring sensitive files
  • Audit file operations reports to see files that have been copied, created, deleted, or renamed on removable media devices
  • Review USB activity logs to trace data breaches back to their source

Enforce endpoint security and device control policies

AccessPatrol gives you the device control features you need to enforce and manage your endpoint security policies.

  • Effortlessly block all peripheral devices that fall outside of your allowed devices lists
  • Exempt USB devices used by tech support and other trusted users
  • Temporarily grant time-limited access to blocked devices using the Access Code Generator

Flexible Deployment Options

On Premises

Easy to install. Everything stored on your own network.

Remote Workers

Connect remote users with minimal configuration.

Private Cloud

All the benefits of the cloud on a server of your choice.

AccessPatrol Features

Block USB
Block USB

One click to block USB devices completely

Block External Devices
Block External Devices

Easily block DVDs, iPods, external hard drives and more from being accessed on your computers

Device Permissions
Device Permissions

Set full access, read only or no access on storage devices

Allowed List
Allowed List

Allow specific storage devices to be always allowed on your network

Reports
Device Report

Report on devices accessed or blocked on your network

Track File Transfers
Log USB File Transfer

Prevent data theft by monitoring files created and deleted on USB devices

Deivce Access Code
Access Code Generator

Provide end users with temporary access to their devices

Email Alert
Email Alerts

Alert administrators of unauthorized file transfers and devices access

Email Report
Email Reports

Email device reports directly to your administrator's inbox

Block Phones
Block Phones

Prevent users from connecting their phones to company computers

Block Files
Block File Transfers

Prevent users from transferring restricted file types to their devices

Stealth
Stealth Mode

CurrentWare runs silently in the background and can be optionally configured to alert users

Centralized Console
Central Web Console

Access the administrative console from a web browser on any computer in your network

Remote Client Install
Remote Client Install

Easily deploy the CurrentWare Client remotely to all of your computers

Offsite Management
Offsite Management

Extend onsite policies to laptops running outside the corporate network

Centralized Console
SQL Server Supported

Our database is scaled for enterprise and large business operations

CASE STUDY

First Choice Health protects their patients’ information

“We never have to worry about what may happen when someone plugs a device into one of our machines. AccessPatrol has made our lives easy. We just set it, forget it, and it works!”

First Choice Health Headline Image

Check out our great reviews on Capterra!

"This software helps us to achieve compliance with industry and government requirements."

- Matthew W, Project Manager
Mindrum Precision

"Endpoint security simple and easy and economical. All in one place!"

- Pankaj S, President
eRecords USA

Try AccessPatrol for Free

Fully Functional. Easy to use. Install in minutes

System Requirements

Compatible on Windows 7/8/10 & Server 2008/2012/2016/2019

How to Order

Orders may be placed online, by phone, by fax or by e-mail. We accept purchase orders, major credit cards, PayPal and payments by check.