Trusted by
& many more
Trusted by
and many more
Why Should I Block Cell Phones from Connecting to Computers?
The use of personal cell phones in the workplace is not just a distraction, they are also a high-risk device that needs to be addressed as part of your endpoint security policy.
Data security risks of cell phones
- Data Exfiltration: Unless you assign read-only access to mobile devices, employees can connect their phones to their workstations and illicitly transfer data to their smartphone’s microSD card or internal storage.
- Mobile Malware: Worms, trojans, and other malicious software can be unknowingly transferred to and from mobile devices. All it takes is an employee with Full Access permissions to plug their compromised device into their computer for the attack to begin.
How to Protect Data Against Mobile Devices With AccessPatrol
- Disable Bluetooth on workstations to prevent wireless data transfers to cell phones
- Block cell phones, iPods, PDAs, and other mobile devices from connecting to computers
- Monitor device reports and removable media file transfer logs for suspicious behavior
- Provide employees with alternatives for charging their phones such as USB ports in wall outlets and power bars
AccessPatrol’s USB Control & Data Loss Prevention Features
Block USB
One click to block USB portable storage devices
Peripheral Control
Easily block DVDs, iPods, external hard drives and more
Device Permissions
Set full access, read only or no access on storage devices
Allowed List
Allow specific trusted peripheral devices to be used
USB Activity Reports
Report on devices accessed or blocked on your network
Log USB File Transfer
Monitor files that are copied to USB storage devices
Access Code Generator
Provide temporary access to peripheral devices
Email Alerts
Get alerts of unauthorized file transfers and device use
Email Reports
Schedule device reports directly to your administrator's inbox
Block Phones
Prevent users from connecting phones to company computers
Block File Transfers
Prevent files from being transferred to portable storage
Stealth Mode
AccessPatrol can run silently in the background or alert users
Centralized Console
Manage all your users from the
centralized console with Active
Directory import or syncing
Platform Security
Protect your CurrentWare console
with 2FA, passwords, privilege
management, and more
Offsite Management
Extend onsite Internet usage
policies to laptops running outside
the corporate network
SQL Server Supported
Database scaled for enterprise and
large business operations using
Microsoft SQL Server