Peripheral & USB Device Control Software—
Block Removable Devices to Prevent Data Theft
AccessPatrol’s device control solutions provide administrators with the capabilities they need to take full control over removable devices in an organization.
AccessPatrol’s device control software policies prevent data loss by via endpoints by stopping employees from using unauthorized peripherals.
Trusted by
& many more
Trusted by
and many more
Protect Sensitive Data
Removable storage devices, such as USB flash drives, and mobile connection technologies, like Wi-Fi or FireWire are convenient and enhance productivity, however, they also present security risks
AccessPatrol provides the critical peripheral device management features you need to prevent the theft of sensitive data such as personally identifiable information (PII), trade secrets, and financial records to USB drives and other portable storage devices.
- Customize device access permissions based on user, organizational unit (OU), and endpoint device.
- Block data transfers to protect sensitive data against exfiltration via removable storage devices.
- Easily block USB devices, optical media, iPods, cell phones, external hard drives, and more to prevent unauthorized use
- Optionally integrate AccessPatrol with Active Directory to manage USB security policies with your existing organizational units
AccessPatrol’s Device Permissions
AccessPatrol lets administrators easily control peripheral device management permissions for the users and endpoints in their network by assigning Full Access, Read Only, and No Access device control policies.
The AccessPatrol device control solution will continue to enforce data protection policies even when managed devices lose connection to the CurrentWare server, allowing users to be monitored and managed when they are working offline or on another network.
- Full Access: The computer or user with this access permission can read and write to the specified removable device that is connected to the computer.
- Read Only: The computer or user with this access permission can only read the information from the specified external device that is connected to the computer. The user will not be able to copy any information to the specified external device. This option is only available to storage devices.
- No Access: The computer or user with this access permission cannot read or write to the specified external devices that are connected to the computer.
The Types of Devices You Can Control With AccessPatrol
As part of a multi-layered data loss prevention strategy you need peripheral device management capabilities to protect against any storage devices and other peripherals that are capable of transmitting data such as Bluetooth, SD/MM cards, and Infrared ports.
AccessPatrol allows you to apply access rules for multiple classes of removable devices to prevent data loss and other security threats.
Click here for a full list of the devices you can control with AccessPatrol
Monitor USB Ports for Data Leakage to Portable Storage Devices
With AccessPatrol’s USB device usage and data transfer monitoring features you can ensure compliance with your removable media policy.
- Investigate potential data security incidents with advanced insights into which parties transferred which files to what devices
- Understand what unauthorized devices are being used such as firewire, Android/Apple phones, removable devices
- Improve your data theft prevention efforts with evidence of every data transfer to storage devices
AccessPatrol’s USB Control Features
Block USB
One click to block USB portable storage devices
Peripheral Control
Easily block DVDs, iPods, external hard drives and more
Device Permissions
Set full access, read only or no access on storage devices
Allowed List
Allow specific trusted peripheral devices to be used
USB Activity Reports
Report on devices accessed or blocked on your network
Log USB File Transfer
Monitor files that are copied to USB storage devices
Access Code Generator
Provide temporary access to peripheral devices
Email Alerts
Get alerts of unauthorized file transfers and device use
Email Reports
Schedule device reports directly to your administrator's inbox
Block Phones
Prevent users from connecting phones to company computers
Block File Transfers
Prevent files from being transferred to portable storage
Stealth Mode
AccessPatrol can run silently in the background or alert users
Centralized Console
Manage all your users from the
centralized console with Active
Directory import or syncing
Platform Security
Protect your CurrentWare console
with 2FA, passwords, privilege
management, and more
Offsite Management
Extend onsite Internet usage
policies to laptops running outside
the corporate network
SQL Server Supported
Database scaled for enterprise and
large business operations using
Microsoft SQL Server
FREE DOWNLOAD
Removable Media Policy
Download this data security policy template to prevent data leakage to USB flash drives and other removable storage devices.
- Set data security standards for portable storage
- Define the acceptable use of removable media
- Inform your users about their security responsibilities