USB Blocker Software—Block USB Ports to Stop Data Theft
AccessPatrol is a powerful USB blocker to prevent data leaks to external hard drives, USB flash drives, mobile devices, and other removable devices.
AccessPatrol’s device control and data loss prevention policies will stop employees from transferring sensitive files to unauthorized devices.
Effortlessly block USB ports and restrict unwanted users from accessing USB ports to improve data security. Unblock ports in just a few clicks to maintain employee productivity.
Prevent the Use of Untrusted USB Drives
AccessPatrol USB blocking software gives you the features you need to ensure data protection against portable devices.
- Effortlessly block all peripheral devices that fall outside of your allowed devices lists
- Provide greater USB access to tech support and other trusted users
- Temporarily grant time-limited access to blocked devices using the Access Code Generator
Centralized Management for Scalable Device Control
AccessPatrol lets you implement device control policies from the convenience of a central web console.
Easily monitor removable devices and block/unblock ports for your entire workforce in just a few clicks.
- Granular Control: Control USB drives based on groups of users or computers
- AD Sync: Use Active Directory sync to import your existing organizational units
- Remote Devices: USB device control policies continue to apply even when endpoints disconnect from the network
Start Blocking USB Ports With Granular Device Permissions
Blocking USB ports with AccessPatrol is simple; effortlessly assign Full Access, Read Only, and No Access device control policies to USB drives to protect sensitive data.
AccessPatrol’s USB blocker will continue to enforce data protection policies even when managed devices lose connection to the CurrentWare server, allowing users to be monitored and managed when they are working offline or on another network.
- Full Access: The computer or user with this access permission can read and write to the specified removable device that is connected to the computer.
- Read Only: The computer or user with this access permission can only read the information from the specified external device that is connected to the computer. The user will not be able to copy any information to the specified external device. This option is only available to storage devices.
- No Access: The computer or user with this access permission cannot read or write to the specified external devices that are connected to the computer.
The Types of Devices You Can Control With AccessPatrol
As part of a multi-layered data loss prevention strategy you need to limit data transfer to several classes of storage devices and peripherals such as Bluetooth, SD/MM cards, and Infrared ports.
AccessPatrol allows you to apply access rules for multiple classes of removable devices to prevent data loss and other security threats.
Click here for a full list of the devices you can control with AccessPatrol
Intuitive & Flexible USB
Blocking Software
Protect sensitive data with AccessPatrol’s USB blocker. Block or limit the use of a USB port based on storage devices, wireless connectivity, communication ports, imaging devices, and other peripherals.
USB blocking policies can be uniquely configured for each user, endpoint, and department. This ensure that employee productivity is not hindered by the USB blocker.
- Easily block USBs, optical media, mobile devices, SD cards, and other removable media
- Disable wireless connections through Bluetooth devices, infrared, and WiFi
- Block employees from using scanners, printers, and cameras to steal sensitive data
Monitor USB Ports for Data Leakage to USB Drives
With AccessPatrol’s USB storage devices usage and data transfer monitoring features you can ensure compliance with your removable media policy.
- Investigate potential data security incidents with advanced insights into which parties transferred which files to what devices
- Understand what devices are being used such as firewire, Android/Apple phones, removable devices
- Improve your data theft prevention efforts with evidence of every data transfer to storage devices
Restrict File Transfers to Storage Devices
With AccessPatrol’s USB file transfer blocking feature you can prevent files from being transferred to portable storage devices based on their filename or extension.
- Allowed List: Limit what files can be transferred to storage devices based on file extensions and keywords in filenames
- Block File Transfers: Prevent file transfers between storage devices and PCs, even on trusted storage devices
- Renamed File Extension Blocking: AccessPatrol uses file signatures to detect the original file extension of a file, preventing users from renaming files to bypass your DLP policies
Case Study
Viking Yachts Protects Sensitive Information From a Departing Employee
“CurrentWare saved us a lot of time and money. If we didn’t have AccessPatrol we would have never known what was going on. I cannot thank all of you enough for this software.”
The Essential Role of a USB Blocker
USB DLP—Block USB Ports to Prevent Data Leaks to Flash Drives
Even authorized USB drives can pose a data loss risk if they are misused, lost, or stolen. The portability of USB drives makes it difficult to prevent users from losing them.
How to Prevent Data Loss to USB Drives With AccessPatrol:
- Limit the USB drives that can be used on USB ports to a specific list of trusted devices
- Review the recent activity of missing USB drives to determine the last time it was used and what data was transferred to it
- Restrict the file types and filename keywords that can be transferred to USB drives
Monitor USB Activity to Collect Evidence of Data Transfers
A USB blocking tool provides insightful and easily accessible device usage reports.
These reports and alerts track USB activities such as:
- File operations to removable storage
- What USB devices are being used in the network
- The USB device access history of endpoints
- Which user was responsible for inserting devices into a USB port
Having access to the usage history of USB devices is valuable for investigating copying sensitive data to removable storage and unauthorized use of USB ports in your network.
Prevent Data Theft to Insider Threats
Insider threats are a significant risk to data security. Employees have intimate access to corporate data, insider knowledge of the organization’s systems, and a level of trust that can allow them to steal data undetected.
- 70% of intellectual property data theft occurs within the 90 days before an employee’s resignation announcement
- 72% of CEOs admit they’ve taken valuable intellectual property (IP) from a former employer
- 50% of respondents in a Symantec survey say they have taken information, and 40% say they will use it in their new jobs
With AccessPatrol’s USB device control features you can prevent data loss to USB removable media devices and other high-risk peripherals.
Learn more: How to Keep Data Safe When Offboarding
FREE DOWNLOAD
Removable Media Policy
Download this data security policy template to prevent data leakage to USB flash drives and other removable storage devices.
- Set data security standards for portable storage
- Define the acceptable use of removable media
- Inform your users about their security responsibilities
AccessPatrol’s USB Activity Alerts, Reports, and Dashboards
AccessPatrol is more than a powerful USB blocker; it also monitors activity on USB ports so you can get advanced visibility into sensitive data leaks and high-risk activity on USB ports.
AccessPatrol’s email alerts, reports, and dashboards provide your organization with the USB monitoring tools it needs to protect data against insider threats.
Instantly notify designated people to high-risk activities and automate the distribution of data loss prevention reports for easy archiving and USB file operations monitoring.
-
Send AccessPatrol’s USB activity reports straight to your security team’s inbox when alerts are triggered
-
USB data loss prevention Customize thresholds to send email alerts based on suspicious USB connection history, file operations, or specific file types
-
Combine with AccessPatrol’s other USB control features to enforce your removable media device policy and improve your USB data loss prevention capabilities
USB File Operations Alerts
Protect sensitive data against theft by alerting security personnel when users copy data to USB drives and other removable media.
Configure file operations alerts based on file extensions (.exe, .zip, .msi, .xslx, .cad, etc) or file names to get alerted when these copied files are detected.
You can configure file operations alerts to trigger when:
- Files are created on USB drives
-
Files are transferred to USB drives
-
Files are deleted from USB drives
-
Files are saved as to USB drives
-
Files are renamed on USB drives
USB File Transfers Alerts
Get alerts when specific file types and file names are transferred to removable storage devices.
You can configure USB file activity alerts to trigger when:
-
A user commits and sort of file operation
- A user transfers specific file types
-
A user transfers files with pre-defined keywords in the file name
Removable Device Usage Alerts
With the Email Alerts by Devices feature you can trigger real-time alerts based on the peripheral device usage of your organization
You can configure USB connection history alerts to trigger when:
- A Specific device is used
- Any peripheral device is used
- An unknown device is used
- Any blocked or allowed device is used
Try AccessPatrol for Free
Fully functional. Easy to use. Install in minutes.
How to Block USB Devices With AccessPatrol USB Blocker Software
- Open the CurrentWare Console
- Select the group(s) of computers or users you would like to control.
- Under the AccessPatrol tab, select Device Permissions then select the group of users or computers you would like to disable USB devices for.
- Under Storage Devices, select USB
- Under Access Permissions set the desired level of restriction (Full Access, Read Only, No Access)
- Click Apply and then click OK
Try AccessPatrol for Free
Fully functional. Easy to use. Install in minutes.
AccessPatrol’s USB Control Features
Block USB
One click to block USB portable storage devices
Peripheral Control
Easily block DVDs, iPods, external hard drives and more
Device Permissions
Set full access, read only or no access on storage devices
Allowed List
Allow specific trusted peripheral devices to be used
USB Activity Reports
Report on devices accessed or blocked on your network
Log USB File Transfer
Monitor files that are copied to USB storage devices
Access Code Generator
Provide temporary access to peripheral devices
Email Alerts
Get alerts of unauthorized file transfers and device use
Email Reports
Schedule device reports directly to your administrator's inbox
Block Phones
Prevent users from connecting phones to company computers
Block File Transfers
Prevent files from being transferred to portable storage
Stealth Mode
AccessPatrol can run silently in the background or alert users
Centralized Console
Manage all your users from the
centralized console with Active
Directory import or syncing
Platform Security
Protect your CurrentWare console
with 2FA, passwords, privilege
management, and more
Offsite Management
Extend onsite Internet usage
policies to laptops running outside
the corporate network
SQL Server Supported
Database scaled for enterprise and
large business operations using
Microsoft SQL Server