CurrentWare Helps Companies become HIPAA Compliant

CurrentWare offers a range of solutions to help healthcare organizations address HIPAA compliance security standards.

“With CurrentWare, we’re certain we’re meeting today’s cybersecurity standards whilst maintaining immediate, reliant access to patient records so we can keep delivering a high-quality service to our clients”

– Nicholas Scheetz
IT Service Desk Supervisor, First Choice Health

Deivce Access Code
Control Endpoint Devices
URL Filter
Web & App Blocker & Monitor
Allowed List
Allowed & Blocked List
URL Filter
Active Directory Integration
URL Filter
Email Reports & Alerts
URL Filter
Work from Home

How do I become HIPAA compliant?

In today’s digital and mobile age, the healthcare sector is susceptible to increasing vulnerabilities of exposing confidential patient files. With the dissemination of data via the “information superhighway” and mobile communication devices, the incidences of data loss through security breaches continues to be a growing risk for medical facilities. The rising number of data breaches has resulted in a federally governed regulation that mandates data loss prevention for medical data.

 To safeguard the privacy of patient information, the healthcare sector in the US is obliged to comply with the guidelines under the Health Insurance Portability and Accountability Act (HIPAA).

Trusted by

pepsi cola logo
mitsubishi electric
New York City Department of Transportation Logo

& many more

Trusted by

mitsubishi electric
pepsi cola logo
Viking Yachts
New York City Department of Transportation DOT Logo

and many more

HIPAA compliant Checklists with CurrentWare


Restrict and Audit Access to USB and Endpoint Devices

With the influx of mobile storage devices such as USB devices and smartphones, stealing confidential data and electronic personal health information (ePHI) files can be achieved quite discreetly without the approval or knowledge of authorities.

AccessPatrol provides comprehensive endpoint security to prevent theft of sensitive data and ePHI:

Enforce selective data access: Implement access privileges: read only, read and write, or no access to patient data files.

Whitelist Endpoints: Completely block access to all endpoints. Allow access to authorized endpoint devices, such as USBs and external hard drives, using the AccessPatrol Allowed List.

Removable Storage Auditing: Inclusive reporting ensures speedy identification of abusive use of endpoint devices.

Offsite Management: Endpoint security policies will be maintained, even if the computer or laptop is used outside the building.


Report on Internet, Bandwidth & Application Usage

Monitor Internet usage by tracking and reporting on the websites visited and the duration of visits by the healthcare staff. Identify users that are frequently visiting sites that may compromise patient information or infect your network.

Real Time Monitoring: Accurate real time monitoring of Internet activity on a per employee or per computer basis. Meticulous recording of all employee Internet activity.

Bandwidth Tracking: Capture and instantly analyze bandwidth usage to realize bottlenecks and detect trends of suspicious usage of bandwidth.

Application Tracking: Discover if malicious software is being launched on your end user’s computers.

Email Reports Automatically: Schedule reports to be automatically emailed to the managers on a daily, weekly or monthly basis.

Offsite Monitoring: Computers or laptops that are typically used offsite, such as in ambulances, can be assured the same level of Internet monitoring as the computers that are onsite. Monitoring of offsite systems is not compromised.


Block Websites and Malicious Applications

Protect against Internet threats by blocking and filtering websites not related to the medical practice. Enforce Internet restriction policies for HIPAA compliance. Improve staff productivity and mitigate security threats to your network and ePHI.

Whitelist & Blacklist Sites: Reduce Internet threats and infections by restricting web access to medical related sites only. Build custom lists of Allowed and Blocked websites.

URL Category Filtering: Choose from over 100 URL Categories to instantly block thousands of sites within a Category. Restricting access to questionable sites reduces the risk of users frequenting malicious sites that could be hosted by cybercriminals.

Block Downloading of Files: Restrict users from downloading files that could inadvertently compromise the company network. Preventing users from downloading music and video files limits the hogging of the corporate bandwidth and reduces staff distractions.

Block Suspicious applications: Increase employee productivity by blocking time wasting applications such as online chats and games.

Offsite Filtering: Laptops used by mobile medical workers can be subject to the same Internet policies as those onsite. This mitigates the risk of Internet misuse by offsite employees as well.

3 Easy Steps to Install CurrentWare

Icon of a man in a suit with a magnifying glass next to him
On the Manager’s computer, install the CurrentWare Console
  1. Run the CurrentWare.exe setup file. 
  2. Select AccessPatrol, BrowseControl and BrowseReporter
  3. The Installer will proceed to install the CurrentWare Server, Console and the 3 solutions onto the Manager’s computer.
Icon with two men and a padlock
On the employees' computers, install the CurrentWare Client
  1. Deploy the CurrentWare Client onto your employee’s computers using the built-in remote client install or Active Directory
  2. Connect your computers to the CurrentWare Server.
  3. You can now control your employee’s computers
Icon of a man in a suit with a magnifying glass next to him
Return to the Manager’s PC, launch the CurrentWare Console
  1. Under the AccessPatrol menu, you can set device permissions, add devices to your allowed list and etc.
  2. Under the BrowseControl menu, you can block websites and applications. 
  3. Under the BrowseReporter menu, you can monitor computer activities.


Restrict and Audit Access to USB and Endpoint Devices

  • Set Device Permissions to block external devices such as USB, external hard drives, phones, camera and other portable devices.
  • Run a Device Report to view the USB file transfer history
  • Assign company authorized USB keys on the Allowed list


Report on Internet, Bandwidth & Application Usage

  • Run a specific URL report to see if your users have violated their Internet usage policy.
  • Get a summary of Internet activities directly sent to your inbox by using Email Report
  • Track Application usage by active time
  • Find out which user is consuming the most bandwidth by running the Bandwidth Usage Report


Block Websites and Malicious Applications

  • Choose from ~120 categories to block Internet access from.
  • Create your own Allowed List to give Internet access to specific websites.
  • Block Windows applications to prevent intrusions of malicious virus.
  • Use the Port Filter to block trojan from hacking into your computers.
First choice health

Case Study

First Choice Health Protects Medical Data
& Meets HIPAA Compliance

“With CurrentWare we’re certain we’re meeting today’s cybersecurity standards whilst maintaining immediate, reliant access to patient records so we can keep delivering a high-quality service to our clients.”

First Choice Health Headline Image

For SMBs, SMEs & Large Enterprises

Scalable Solutions, Centralized Console, Remote Client Install and Offsite Management

CurrentWare's software can be deployed remotely and managed from a centralized console. Whether you are a small-to-medium-sized business (SMB), a mid-market small-to-medium enterprise (SME), or a large enterprise with thousands of units to manage, BrowseControl and all of the other programs in the CurrentWare Suite offers solutions to manage all of the users and computers across your organization.

Whether you are managing 10 or 10,000 computers, you can enjoy the benefits of internet filtering with BrowseControl combined with the efficiency of CurrentWare’s centralized console to manage the internet access of your entire organization from a single machine.

Ensure your organization’s web filtering policies are enforced for remote workers. The offsite management capabilities of the CurrentWare centralized console lets you enforce your BrowseControl policies wherever your employees work.

Check Out Our Great Reviews!

This software helps us to achieve compliance with industry and government requirements with respect to controlling the use of removable storage media. It fits the bill perfectly.

Matthew W., Project Manager
Aviation & Aerospace Industry, 11-50 employees

In my nearly 40 years in the IT business I’ve worked with a lot of support teams. I really appreciate CurrentWare going the extra mile to help me get the most out of the product. They’ve definitely outweighed any of the other competitors that I’ve looked at.

Jerry Slocum, Managed Services Provider
Haggerty Auto Group, 150-200 Employees

Data leaks have been thwarted by AccessPatrol. When an unauthorized device is detected, an email alert is sent immediately. It enables real-time audit reports on accessed and blocked devices.

Karen M., Senior Director of Marketing
Construction Industry, 10,001+ employees

We have experienced data leaks by dishonest employees in the past and AccessPatrol has helped us avoid them and work with greater security and peace of mind for us and our customers.

Julio V., Head of Information Technology
Financial Services Industry, 10,001+ employees