Data Loss Prevention

Sample Reports
report on every website visited by your employees

File Operations History

Audit your employee's file transfer history. Track confidential company files that were copied onto personal USB devices.
Top domain by employee Internet browsing time report.

All Devices Accessed

A high-level overview of all the endpoint devices that were plugged into your employee's PC.

Total employee Internet browsing time report

Allowed Devices

The allowed devices that were connected to your employee's PC during the report period.
include specific urls in internet activity report

Blocked Devices

All of the accessed devices (allowed and blocked) with a visual report of their Allowed or Blocked status.

Get Started with AccessPatrol Today

Data Loss Prevention Solution
Download and install in a few minutes

AccessPatrol’s Endpoint Security Features

Block USB

Block USB

One click to block USB devices completely
Learn More
Block External Devices

Block External Devices

Easily block DVDs, iPods, external hard drives and more from being accessed on your computers
Learn More

Device Permissions

Set full access, read only or no access on storage devices
Learn More

Allowed List

Allow specific storage devices to be always allowed on your network
Learn More


Device Report

Report on devices accessed or blocked on your network
Learn More
Track File Transfers

Log USB File Transfer

Prevent data theft by monitoring files created and deleted on USB devices
Learn More
Deivce Access Code

Access Code Generator

Provide end users with temporary access to their devices
Learn More
Email Alert

Email Alerts

Alert administrators of unauthorized file transfers and devices access
Learn More

Email Reports

Email device reports directly to your administrator's inbox
Learn More

Block Phones

Prevent users from connecting their phones to company computers
Learn More
Block Files

Block File Extensions

Prevent users from transferring restricted file types to their devices
Learn More

Stealth Mode

The CurrentWare client runs silently in the background and can be configured to alert users of device blocking policies

Centralized Console

Centralized Console

Manage all your users from the centralized console with Active Directory import or syncing
Remote Client Install

Remote Client Install

Deploy the client agent remotely to start enforcing endpoint security policies right away
Offsite Management

Offsite Management

Enforce endpoint security policies for laptops operating offline or outside of the network
SQL Supported

SQL Server Supported

Database scaled for enterprise and large business operations