USB Blocking Software—Stop Data Theft

AccessPatrol is a powerful USB blocker to prevent data leaks to external hard drives, USB flash drives, mobile devices, and other removable devices.

AccessPatrol’s device control and data loss prevention policies will stop employees from transferring sensitive files to unauthorized devices.

Access Patrol

Try AccessPatrol for Free

Fully functional. Easy to use. Install in minutes.

AccessPatrol’s Device Permissions

AccessPatrol lets administrators easily control device access permissions for the users and endpoints in their network by assigning Full Access, Read Only, and No Access device control policies.

AccessPatrol’s USB blocker will continue to enforce data protection policies even when managed devices lose connection to the CurrentWare server, allowing users to be monitored and managed when they are working offline or on another network.

  • Full Access: The computer or user with this access permission can read and write to the specified removable device that is connected to the computer.
  • Read Only: The computer or user with this access permission can only read the information from the specified external device that is connected to the computer. The user will not be able to copy any information to the specified external device. This option is only available to storage devices.
  • No Access: The computer or user with this access permission cannot read or write to the specified external devices that are connected to the computer.
Screenshot of AccessPatrol's USB file transfer blocking feature

The Types of Devices You Can Control With AccessPatrol

As part of a multi-layered data loss prevention strategy you need to limit data transfer to several classes of storage devices and peripherals such as Bluetooth, SD/MM cards, and Infrared ports.

AccessPatrol allows you to apply access rules for multiple classes of removable devices to prevent data loss and other security threats.

Click here for a full list of the devices you can control with AccessPatrol


Monitor USB Ports for Data Leakage to Portable Storage Devices

With AccessPatrol’s USB storage devices usage and data transfer monitoring features you can ensure compliance with your removable media policy.

  • Investigate potential data security incidents with advanced insights into which parties transferred which files to what devices
  • Understand what unauthorized devices are being used such as firewire, Android/Apple phones, removable devices
  • Improve your data theft prevention efforts with evidence of every data transfer to storage devices
viking yachts

Case Study

Viking Yachts Protects Sensitive Information From a Departing Employee

“CurrentWare saved us a lot of time and money. If we didn’t have AccessPatrol we would have never known what was going on. I cannot thank all of you enough for this software.”

A departing employee was caught stealing classified files! If we didn’t have AccessPatrol we would never have known.

The Essential Role of a USB Device Control Solution

USB DLP—Prevent Data Loss to Flash Drives

Even authorized USB devices can pose a data loss risk if they are misused, lost, or stolen. The portability of removable storage devices makes it difficult to prevent users from losing them.

How to Prevent Data Loss to USB Drives With AccessPatrol:

  • Limit the USB devices that can be used to a specific list of trusted devices
  • Review the recent activity of missing USB devices to determine the last time it was used and what data was transferred to it
  • Restrict the file types and filename keywords that can be transferred to portable storage devices

Monitor USB Activity to Collect Evidence of Data Transfers

A USB device control solution provides insightful and easily accessible device usage reports.

These USB device control reports track USB activities such as:

  • File operations to removable storage
  • What USB devices are being used in the network
  • The USB device access history of endpoints
  • Which user was responsible for inserting unauthorized devices into a USB port

Having access to the usage history of USB devices is valuable for investigating data loss to removable storage devices and unauthorized use of USB ports in your network.

Prevent Data Theft to Insider Threats

Insider threats are a significant risk to data security. Employees have intimate access to corporate data, insider knowledge of the organization’s systems, and a level of trust that can allow them to steal data undetected.

  • 70% of intellectual property data theft occurs within the 90 days before an employee’s resignation announcement
  • 72% of CEOs admit they’ve taken valuable intellectual property (IP) from a former employer
  • 50% of respondents in a Symantec survey say they have taken information, and 40% say they will use it in their new jobs

With AccessPatrol’s USB device control features you can prevent data loss to USB removable media devices and other high-risk peripherals.

Learn more: How to Keep Data Safe When Offboarding

Free removable media policy template from CurrentWare

Removable Media Policy

Download this data security policy template to prevent data leakage to USB flash drives and other removable storage devices.

  • Set data security standards for portable storage
  • Define the acceptable use of removable media
  • Inform your users about their security responsibilities

AccessPatrol’s USB Activity Alerts, Reports, and Dashboards

AccessPatrol’s email alerts, reports, and dashboards provide your organization with the USB monitoring  tools it needs to protect data against insider threats.

Instantly notify designated people to high-risk activities and automate the distribution of data loss prevention reports for easy archiving and USB file operations monitoring.

  • Send AccessPatrol’s USB activity reports straight to your security team’s inbox when alerts are triggered

  • USB data loss prevention Customize thresholds to send email alerts based on suspicious USB connection history, file operations, or specific file types

  • Combine with AccessPatrol’s other USB control features to enforce your removable media device policy and improve your USB data loss prevention capabilities

USB File Operations Alerts

Protect sensitive data against theft by alerting security personnel when suspicious file operations are performed on USB storage devices, cell phones, and cameras.

Configure file operations alerts based on file extensions (.exe, .zip, .msi, .xslx, .cad, etc) or file names to get alerted when these copied files are detected.

You can configure file operations alerts to trigger when:

  • Files are created on external storage devices
  • Files are transferred to external storage devices

  • Files are deleted from external storage devices

  • Files are saved as to external storage devices

  • Files are renamed on external storage devices

AccessPatrol USB Device Control Software Report - USB File Operations
Screenshot of AccessPatrol's USB activity email alerts setup window. Alerts are set for .exe, .zip, .cad, and .xlsx file transfers

USB File Transfers Alerts

Get alerts when specific file types and file names are transferred to removable storage devices.

You can configure USB file activity alerts to trigger when:

  • A user commits and sort of file operation

  • A user transfers specific file types
  • A user transfers files with pre-defined keywords in the file name

Removable Device Usage Alerts

With the Email Alerts by Devices feature you can trigger real-time alerts based on the peripheral device usage of your organization

You can configure USB connection history alerts to trigger when:

  • A Specific device is used
  • Any peripheral device is used
  • An unknown device is used
  • Any blocked or allowed device is used
AccessPatrol allowed vs denied USB device report with a list of storage devices listed

Try AccessPatrol for Free

Fully functional. Easy to use. Install in minutes.

AccessPatrol’s USB Control Features

Block USB

Block USB

One click to block USB portable storage devices 

Block External Devices

Peripheral Control

Easily block DVDs, iPods, external hard drives and more

Device Permissions

Device Permissions

Set full access, read only or no access on storage devices

Allowed List

Allowed List

Allow specific trusted peripheral devices to be used


USB Activity Reports

Report on devices accessed or blocked on your network

Track File Transfers

Log USB File Transfer

Monitor files that are copied to USB storage devices

Deivce Access Code

Access Code Generator

Provide temporary access to peripheral devices

Email Alert

Email Alerts

Get alerts of unauthorized file transfers and device use

Email Report

Email Reports

Schedule device reports directly to your administrator's inbox

Block Phones

Block Phones

Prevent users from connecting phones to company computers

Block Files

Block File Transfers

Prevent files from being transferred to portable storage


Stealth Mode

AccessPatrol can run silently in the background or alert users

Internet Off

Centralized Console

Manage all your users from the
centralized console with Active
Directory import or syncing

Internet Off

Platform Security

Protect your CurrentWare console
with 2FA, passwords, privilege
management, and more

Internet Off

Offsite Management

Extend onsite Internet usage
policies to laptops running outside
the corporate network

Internet Off

SQL Server Supported

Database scaled for enterprise and
large business operations using
Microsoft SQL Server


Try AccessPatrol for Free

Fully functional. Easy to use. Install in minutes.