Peripheral Device Control – Block External Devices

AccessPatrol’s device control features provide administrators with the capabilities they need to block external devices from being used on laptop and desktop computers.

AccessPatrol’s peripheral control policies will stop employees from plugging in unsafe peripherals by assigning read-only or no access permissions.

All of CurrentWare’s products continue to enforce policies even when managed devices lose connection to the CurrentWare server, allowing users to be monitored and managed when they are working offline or on another network.

  • Customize device access permissions based on user, organizational unit (OU), and endpoint device.
  • Protect sensitive data against exfiltration via removable storage devices.
  • Easily block USB devices, optical media, iPods, cell phones, external hard drives, and more from being connected to your computers.

AccessPatrol’s Device Permissions

AccessPatrol lets administrators easily control device access permissions for the users and endpoints in their network by assigning Full Access, Read Only, and No Access permissions.

  • Full Access: The computer or user with this access permission can read and write to the specified external devices that are connected to the computer.
  • Read Only: The computer or user with this access permission can only read the information from the specified external device that is connected to the computer. The user will not be able to copy any information to the specified external device. This option is only available to storage devices.
  • No Access: The computer or user with this access permission cannot read or write to the specified external devices that are connected to the computer.

Why Use a Peripheral Device Blocker?

As part of a multi-layered data loss prevention strategy you will need access control measures to protect against USB storage devices and other peripherals that are capable of transmitting data such as Bluetooth, SD/MM cards, and Infrared ports.

AccessPatrol provides the critical security controls you need to prevent employees, guests, and contractors from stealing sensitive data such as personally identifiable information (PII), trade secrets, and financial records.

access-patrol-currentware

Try AccessPatrol for Free

Fully functional. Easy to use. Install in minutes.

AccessPatrol’s USB Control Features

Block USB

Block USB

One click to block USB portable storage devices 

Block External Devices

Peripheral Control

Easily block DVDs, iPods, external hard drives and more

Device Permissions

Device Permissions

Set full access, read only or no access on storage devices

Allowed List

Allowed List

Allow specific trusted peripheral devices to be used

Reports

USB Activity Reports

Report on devices accessed or blocked on your network

Track File Transfers

Log USB File Transfer

Monitor files that are copied to USB storage devices

Deivce Access Code

Access Code Generator

Provide temporary access to peripheral devices

Email Alert

Email Alerts

Get alerts of unauthorized file transfers and device use

Email Report

Email Reports

Schedule device reports directly to your administrator's inbox

Block Phones

Block Phones

Prevent users from connecting phones to company computers

Block Files

Block File Transfers

Prevent files from being transferred to portable storage

Stealth

Stealth Mode

AccessPatrol can run silently in the background or alert users

Centralized Console

Central Web Console

Access the administrative console from a web browser on any computer in your network

Remote Client Install

Remote Client Install

Easily deploy the CurrentWare
Client remotely to all of your
company computers

Offsite Management

Offsite Management

Extend onsite policies to endpoint devices running outside the corporate network

Centralized Console

SQL Server Supported

The included SQL database is scalable for enterprise and large business operations

access-patrol-currentware

Try AccessPatrol for Free

Fully functional. Easy to use. Install in minutes.