

Trusted by
& many more
Trusted by
& many more
ISO 27001 & ISO 27002 Compliance Requirements
You Can Address With CurrentWare
ISO 27001 Control | CurrentWare Modules & Features |
ISO 27001:2022 Controls:
ISO 27001:2013 Controls: Annex A.8.3 — Media Handling
Annex A.8.3 is about media handling. The objective in this Annex is to prevent unauthorized disclosure, modification, removal or destruction of information stored on media.
| AccessPatrol
|
ISO 27001:2022 Controls:
ISO 27001:2013 Controls: Annex A.12.1 — Operations Security
A.12.4 — Logging and Monitoring Annex A.12.1 is about Operational Procedures and Responsibilities. The objective of A.12.1 is to ensure the secure operation of information processing facilities. Annex A.12.4 is about logging and monitoring. The objective in this Annex A area is to record events and generate evidence.
| AccessPatrol
BrowseControl
BrowseReporter
enPowerManager
|
ISO 27002 Control | CurrentWare Modules & Features |
8.12 Data Leakage Prevention (DLP) ISO 27002 control 8.12 modifies risk by implementing technical measures that proactively detect and prevent the disclosure and/or extraction of information. | AccessPatrol
BrowseControl
BrowseReporter
Learn More: CurrentWare’s data loss prevention solutions |
8.16 Monitoring Activities ISO 27002 Control 8.16 modifies risk by optimizing monitoring activities to identify anomalous behavior and assists in the prompt analysis of information security events and incidents. | AccessPatrol
BrowseReporter
enPowerManager
|
8.22 Web Filtering If employees visit websites that contain viruses, phishing materials, or other types of illegal information, this may expose corporate networks and information systems to security risks. With BrowseControl you can restrict the websites that employees can access to mitigate the risk of malicious sites.
| BrowseControl
|
See What Our Customers Have to Say
The reports are very easy to understand and the fact that they can be emailed to you on a schedule is amazing, and have made finding productivity killers VERY easy. Customer support has been fantastic every time I've had to reach out to them; I highly recommend them!
Kristen S, Associate IT Director
The Coding Network, 700+ Employees
As a 'novice' I was able to set up with help from support in about an hour. Previous software took forever and didn't work as advertised. This software worked right out of the box.
Dr. Gerard B, Office Manager
Medical Practice, 2-10 Employees
In my nearly 40 years in the IT business I’ve worked with a lot of support teams. I really appreciate CurrentWare going the extra mile to help me get the most out of the product. They’ve definitely outweighed any of the other competitors that I’ve looked at.
J.S, Managed Services Provider
Vehicle Dealership, 150-200 Employees
We have experienced data leaks by dishonest employees in the past and [CurrentWare's] AccessPatrol has helped us avoid them and work with greater security and peace of mind for us and our customers.
Julio V, Head of Information Technology
Financial Services Industry, 10,001+ employees
FREE DOWNLOAD
Removable Media Policy Template
Download this data security policy template to prevent data leakage to USB flash drives and other removable storage devices.
- Set data security standards for portable storage
- Define the acceptable use of removable media
- Inform your users about their security responsibilities
CurrentWare's Key Features
User Activity Monitoring
Track web browsing, software use, search queries, and more
Screenshot Monitoring
Take automatic screenshots or remotely view desktops
Track Software Usage
Get insights into software usage trends in your organization
Transparent & Stealth Modes
Run silently in the background or provide notice of monitoring
Block USB & Other Devices
Set full access, read only or no access on storage devices
Device Whitelist
Allow only authorized storage devices to be used
Block File Transfers
Prevent files from being transferred to portable storage
DLP Activity Reports
Track file transfers, storage device use, file operations, and more
Block Websites
Block websites based on
URLs & content categories
Block Downloads/Uploads
Prevent uploading and downloading based on file type
Application Blacklisting
Block specific Windows
applications from launching
PC Power Management
Remotely track and control PC power states
Central Web Console
Save time with a central admin console; optionally integrate Active
Directory OUs or security groups
Platform Security
Protect your CurrentWare console
with 2FA, passwords, privilege
management, and more
Offsite Management
Extend onsite security policies to computers running outside the corporate network
SQL Server Supported
Database scaled for enterprise and
large business operations using
Microsoft SQL Server
Learn How to Meet These Compliance Requirements With CurrentWare
NERC CIP
Protect TCAs & BCSI From Insider Threats
ISO 27001
Increase the Maturity of Your ISO27K ISMS
NIST 800-171/53
Protect Controlled Unclassified Information
CIPA for Education
Qualify for the FCC’s
E-Rate Program
Cyber Essentials
Critical Security Controls For Your Assessment
CMMC
Protect CUI to qualify for DoD contracts
Meet ISO 27001 Compliance With CurrentWare
Frequently Asked Questions
What is ISO 27001 compliance software?
ISO 27001 compliance software helps organizations meet information security standards by enforcing access controls, logging user activity, and managing IT usage policies. Tools like CurrentWare support ISO 27001 compliance by simplifying audits, maintaining traceability, and protecting sensitive data from unauthorized access. Its suite, BrowseReporter, AccessPatrol, and BrowseControl, helps enforce Annex A controls such as A.9 (Access Control) and A.12 (Operations Security).
What are the ISO 27001 logging requirements?
ISO 27001 requires organizations to log user activity to ensure traceability, support forensic investigations, and respond to incidents. This includes login/logout activity, system events, and access to sensitive systems. CurrentWare’s BrowseReporter and AccessPatrol automatically capture these logs across all endpoints, supporting Annex A.12.4.
What features should ISO 27001 compliance software include?
Key features include:
- User activity logging (BrowseReporter)
- Access control (BrowseControl for internet, AccessPatrol for USB/devices)
- Policy enforcement & reporting
- Audit trail generation
- Real-time visibility & alerts
CurrentWare’s suite covers all these, making it a practical choice for achieving and maintaining ISO 27001 compliance.
Can CurrentWare help with ISO 27001 compliance?
Yes. CurrentWare supports ISO 27001 compliance with a comprehensive suite for logging, monitoring, and access control. Its endpoint tools work across both on-site and remote environments, ensuring continuous enforcement of compliance policies. Features like USB control, web filtering, and user activity tracking help fulfill ISO 27001’s technical controls and streamline audit preparation.
How does employee monitoring support ISO 27001 compliance?
Employee monitoring supports ISO 27001 by fulfilling the need for activity logging, user accountability, and policy enforcement. With BrowseReporter, organizations can track web activity, application usage, and user behavior to detect anomalies and generate audit-ready reports. This helps meet Annex A controls, including A.12.4 (Logging and Monitoring) and A.16.1 (Incident Management).
Why is access control important for ISO 27001?
Access control is critical for protecting information and systems based on roles and responsibilities. ISO 27001 Annex A.9 requires organizations to restrict access to authorized users only. CurrentWare supports this with:
- AccessPatrol: Device control (e.g., blocking USBs)
- BrowseControl: Web access restrictions
- User-based policy enforcement: Tailored controls by group, department, or location
How can I prepare for an ISO 27001 audit?
Preparation involves enforcing clear security policies, documenting user activity, and generating detailed logs. With CurrentWare, organizations can:
- Monitor and log endpoint usage
- Restrict access to sensitive systems
- Export audit-ready reports
These capabilities help demonstrate compliance with ISO 27001 Annex A controls like A.6 (Organization of Information Security), A.9 (Access Control), and A.12 (Operations Security).
How does CurrentWare support ISO 27001 compliance for remote and hybrid teams?
CurrentWare works seamlessly across on-premise, remote, and hybrid work environments. With agent-based software and centralized management, administrators can enforce security policies, log remote user activity, and generate compliance reports. This helps maintain ISO 27001 compliance regardless of where employees work, especially relevant for Annex A.6 and A.9 controls.