Device Control - Block External Devices
AccessPatrol’s device control features provide administrators with the capabilities they need to block external devices from being used in the network. AccessPatrol’s data loss prevention policies will stop employees from plugging in unsafe USB devices by assigning read-only or no access permissions.
Customize device access permissions based on user, organizational unit (OU), and endpoint device
Protect sensitive data against exfiltration via removable storage devices.
Easily block USB devices, optical media, iPods, cell phones, external hard drives, and more from being connected to your computers.
What is AccessPatrol?
AccessPatrol provides critical security controls for protecting sensitive data against illicit transfers to USB devices. CurrentWare’s data loss prevention software can block more than just USB devices - it can manage permissions for cell phones, optical media, and more. For a full list of the devices that you can control, visit this article in the CurrentWare knowledge base.
All of CurrentWare’s products continue to enforce policies even when managed devices lose connection to the CurrentWare server, allowing users to be monitored and managed when they are working offline or on another network.
AccessPatrol’s Device Permissions
AccessPatrol lets administrators easily control device access permissions for the users and endpoints in their network by assigning Full Access, Read Only, and No Access permissions.
Full Access: The computer with this access permission can read and write to the specified external devices that are connected to the computer.
Read Only: The computer with this access permission can only read the information from the specified external device that is connected to the computer. The user will not be able to copy any information to the specified external device. This option is only available to storage devices.
No Access: The computer with this access permission cannot read or write to the specified external devices that are connected to the computer.
For even greater device control, AccessPatrol includes an Allowed List to whitelist trusted devices and a Device Scheduler to automate changes to access permissions based on a predetermined schedule.
Why use a USB blocker?
As part of a multi-layered data loss prevention strategy you will need access control measures to protect against USB storage devices. AccessPatrol provides the critical security controls you need to prevent employees, guests, and contractors from stealing sensitive data such as personally identifiable information (PII), trade secrets, and financial records.
USB Security: Enforce the exclusive use of authorized USB devices. Combine AccessPatrol’s software-based policies with existing administrative safeguards to prevent employees from using personal USB devices.
Prevent Data Breaches: Flash drives are portable and easy to hide. AccessPatrol’s technical safeguards stop insider threats from transferring sensitive data to all forms of removable media.
Endpoint Security: USB devices can unknowingly infect company computers with ransomware and other malicious software. AccessPatrol protects these endpoints against rogue USB devices by proactively preventing the transmission of data.
Combine this feature with AccessPatrol’s full suite of external device policy management features for full control over how removable media and other peripherals are used in your organization.