Best Alternative to GFI EndPointSecurity

Need to control, audit, and secure access to removable storage devices?

Try a free trial of AccessPatrol, the best alternative to GFI EndPointSecurity.

Test drive the live demo

Block USB Access
Prevent Data Theft
Whitelist Trusted Devices
Manage Remote Workers

Trusted by 

Pepsi-Cola Logo
AXA Logo
Panasonic logo
San Diego Padres logo

What Happened to GFI EndPointSecurity?

GFI EndPointSecurity has reached End of Engineering (EoE)

“End of Engineering: No new releases, minor releases, defect logging or defect fixes for affected products. Customers can continue to use EoE products unencumbered and add/subtract user licenses as necessary. Customer Support will continue to respond to issues and use reasonable efforts to assist customers, but no new, tested corrections will be generated. Latest versions of software and fixes remain available for download.”
–  GFI end-of-engineering announcement 

What Does End-of-Engineering Mean for Existing GFI EndPointSecurity Users?


No more security & compatibility updates

Using GFI EndPointSecurity on a computer running Windows 10 version 1803 or later causes a fatal Blue Screen of Death (BSoD) error to occur.


Businesses that follow cybersecurity best practices need a GFI EndPointSecurity alternative that is regularly updated to remain compatible with the latest version of Windows.

“The latest version of EndPointSecurity supports Windows operating systems up to Windows 10 version 1709. Due to the End of Engineering status of the product, this issue will not be fixed.” – GFI

Reduced customer support

Support for GFI EndPointSecurity has been greatly scaled back. Without reliable customer support, GFI users have struggled without a solution to their problems.

“They’ve essentially gotten rid of everyone, moved to a model where there is a support team who supports multiple companies and doesn’t provide working solutions.”

I had a ticket open for 2 months that was never addressed. We just gave up and moved away from GFI.”

“I have had a ticket open with them for 7 weeks now that affects a production system we need for PCI compliance, but they don’t seem to care” – Spiceworks Community

Alternative to GFI EndPointSecurity –
AccessPatrol Data Loss Prevention Software

Device control software to prevent data leakage to portable storage devices

Improve Endpoint Security

Protect your endpoint devices against the threat of malicious software transmission from USB portable storage devices.

Prevent Data Leakage

Granular device control features allow you to control who can transfer data to USB devices and what devices they can transfer to.

File Transfer Visibility

Gain more insight into how employees are handling sensitive company data. Generate USB activity reports to investigate files that have been transferred or modified.

User and Computer Based Policies

Set unique device blocking policies for each user, endpoint, or department in your organization. Have policies follow users to any computer they use.

Centralized Security

Apply policies and run reports on the devices in your network, all from the convenience of a central console. Access the web console from any networked computer.

Remote Workers Compatible

Security policies are cached locally, keeping devices locked down even while offline. Policy updates and activity data sync when they reconnect to the network.

Check Out Our Great Reviews on Capterra!

AccessPatrol is a magical weapon with cutting-edge capabilities that protects your computer from untrusted USB devices. If an unauthorized device is attached it will warn the company immediately.

Md Jahan M, Digital Marketing & Full Stack Specialist
Internet Industry, 10,001+ employees

[AccessPatrol] has been a great benefit to secure USB devices and access to company computers. We now have the ability to secure machines that otherwise would have been exposed to threats.

Jordan F., Senior IT Specialist
Machinery Industry, 1001-5000 employees

Data leaks have been thwarted by AccessPatrol. When an unauthorized device is detected, an email alert is sent immediately. It enables real-time audit reports on accessed and blocked devices.

Karen M., Senior Director of Marketing
Construction Industry, 10,001+ employees

We have experienced data leaks by dishonest employees in the past and AccessPatrol has helped us avoid them and work with greater security and peace of mind for us and our customers.

Julio V., Head of Information Technology
Financial Services Industry, 10,001+ employees


First Choice Health protects their patients’ information

“We never have to worry about what may happen when someone plugs a device into one of our machines. AccessPatrol has made our lives easy. We just set it, forget it, and it works!”

First Choice Health Headline Image

AccessPatrol protects your sensitive data from theft and misuse

Granular control over a variety of peripheral devices

Increase endpoint security by blocking or limiting the use of storage devices, wireless connectivity, communication ports, imaging devices, and other peripherals. Policies can be uniquely configured for each user, endpoint, and department.

  • Easily block USBs, optical discs, external hard drives, SD cards, and other removable media
  • Disable wireless connections through Bluetooth, infrared, and WiFi
  • Block employees from using scanners, printers, cameras, and portable storage hardware to steal sensitive data
AccessPatrol files operations report with 15 different file operations listed.

Monitor USB activity for suspicious behavior

AccessPatrol’s USB activity monitor improves your endpoint security through increased visibility into high-risk data transfers.

  • Receive instant email alerts when employees violate your endpoint security policy by using unauthorized USB devices or transferring sensitive files
  • Audit file operations reports to see files that have been copied, created, deleted, or renamed on removable media devices
  • Review USB activity logs to trace data breaches back to their source

Enforce endpoint security and device control policies

AccessPatrol gives you the device control features you need to enforce and manage your endpoint security policies.

  • Effortlessly block all peripheral devices that fall outside of your allowed devices lists
  • Exempt USB devices used by tech support and other trusted users
  • Temporarily grant time-limited access to blocked devices using the Access Code Generator

How to Get Started with AccessPatrol

1) Download & install the free trial

Click the button below to test out a free 14-day trial on up to 10 computers. Install the CurrentWare Console and Server by running CurrentWare.exe on the administrator’s computer. 

2) Deploy software clients

Deploy the CurrentWare Client (cwClientSetup.exe) on all the computers you want to control. Install locally, with Active Directory, SCCM, or our built-in deployment tool.

3) Apply device control policies

After the client deployment you will see all of your computers displayed in the CurrentWare Console. Now blocking USB devices and running reports is as easy as a few clicks.

We’re Here to Help

When you switch from GFI EndPointSecurity to CurrentWare AccessPatrol you get more than just a product; you get access to our dedicated customer support team.

Phone Support

Call our office from 8:00 AM – 8:00 PM EST, Monday to Friday at 1-888-912-9619 x 1

Email Support

Email us with your comments, questions, or concerns at

Live Chat

Message the CurrentWare support team directly from our website using the live chat

Flexible Deployment Options

Icon of a hard drive

On Premises

Easy to install. Everything stored on your own network.

Icon of globe with meridians. Four nodes extending from it

Remote Workers

Connect remote users with minimal configuration.

Icon of a server with a cloud behind it

Private Cloud

All the benefits of the cloud on a server of your choice.

AccessPatrol’s USB Control Features

Block USB

Block USB

One click to block USB portable storage devices 

Block External Devices

Peripheral Control

Easily block DVDs, iPods, external hard drives and more

Device Permissions

Device Permissions

Set full access, read only or no access on storage devices

Allowed List

Allowed List

Allow specific trusted peripheral devices to be used


USB Activity Reports

Report on devices accessed or blocked on your network

Track File Transfers

Log USB File Transfer

Monitor files that are copied to USB storage devices

Deivce Access Code

Access Code Generator

Provide temporary access to peripheral devices

Email Alert

Email Alerts

Get alerts of unauthorized file transfers and device use

Email Report

Email Reports

Schedule device reports directly to your administrator's inbox

Block Phones

Block Phones

Prevent users from connecting phones to company computers

Block Files

Block File Transfers

Prevent files from being transferred to portable storage


Stealth Mode

AccessPatrol can run silently in the background or alert users

Internet Off

Centralized Console

Manage all your users from the
centralized console with Active
Directory import or syncing

Internet Off

Platform Security

Protect your CurrentWare console
with 2FA, passwords, privilege
management, and more

Internet Off

Offsite Management

Extend onsite Internet usage
policies to laptops running outside
the corporate network

Internet Off

SQL Server Supported

Database scaled for enterprise and
large business operations using
Microsoft SQL Server

Try AccessPatrol for Free

Fully Functional. Easy to use. Install in minutes