Block Users From Connecting Cell Phones to a PC

With AccessPatrol you can block cell phones from connecting to Windows computers.

Protect sensitive data against illicit transfers to iPhones, Blackberries, PDAs, and other mobile devices used by employees in the workplace.

  • Stop Data Theft to Storage Devices
  • Get Insights Into File Transfers
  • Stay Protected On Any Network

Trusted by

CW_AXA_logo
pepsi cola logo
mitsubishi electric
New York City Department of Transportation Logo

& many more

Trusted by

mitsubishi electric
pepsi cola logo
Viking Yachts
New York City Department of Transportation DOT Logo

and many more

Why Should I Block Cell Phones from Connecting to Computers?

The use of personal cell phones in the workplace is not just a distraction, they are also a high-risk device that needs to be addressed as part of your endpoint security policy.

Data security risks of cell phones

  • Data Exfiltration: Unless you assign read-only access to mobile devices, employees can connect their phones to their workstations and illicitly transfer data to their smartphone’s microSD card or internal storage.
  • Mobile Malware: Worms, trojans, and other malicious software can be unknowingly transferred to and from mobile devices. All it takes is an employee with Full Access permissions to plug their compromised device into their computer for the attack to begin.
A woman uses her phone and laptop simultaneously
AccessPatrol peripheral device permissions mockup block usb

How to Protect Data Against Mobile Devices With AccessPatrol

  • Disable Bluetooth on workstations to prevent wireless data transfers to cell phones
  • Block cell phones, iPods, PDAs, and other mobile devices from connecting to computers
  • Monitor device reports and removable media file transfer logs for suspicious behavior
  • Provide employees with alternatives for charging their phones such as USB ports in wall outlets and power bars
Access Patrol

Try AccessPatrol for Free

Fully functional. Easy to use. Install in minutes.

AccessPatrol’s USB Control & Data Loss Prevention Features

Block USB

Block USB

One click to block USB portable storage devices 

Block External Devices

Peripheral Control

Easily block DVDs, iPods, external hard drives and more

Device Permissions

Device Permissions

Set full access, read only or no access on storage devices

Allowed List

Allowed List

Allow specific trusted peripheral devices to be used

Reports

USB Activity Reports

Report on devices accessed or blocked on your network

Track File Transfers

Log USB File Transfer

Monitor files that are copied to USB storage devices

Deivce Access Code

Access Code Generator

Provide temporary access to peripheral devices

Email Alert

Email Alerts

Get alerts of unauthorized file transfers and device use

Email Report

Email Reports

Schedule device reports directly to your administrator's inbox

Block Phones

Block Phones

Prevent users from connecting phones to company computers

Block Files

Block File Transfers

Prevent files from being transferred to portable storage

Stealth

Stealth Mode

AccessPatrol can run silently in the background or alert users

Internet Off

Centralized Console

Manage all your users from the
centralized console with Active
Directory import or syncing

Internet Off

Platform Security

Protect your CurrentWare console
with 2FA, passwords, privilege
management, and more

Internet Off

Offsite Management

Extend onsite Internet usage
policies to laptops running outside
the corporate network

Internet Off

SQL Server Supported

Database scaled for enterprise and
large business operations using
Microsoft SQL Server

access-patrol-currentware

Try AccessPatrol for Free

Fully functional. Easy to use. Install in minutes.