Peripheral & USB Device Control Software—
Block Removable Devices to Prevent Data Theft

AccessPatrol’s device control solutions provide administrators with the capabilities they need to take full control over removable devices in an organization.

AccessPatrol’s device control software policies prevent data loss by via endpoints by stopping employees from using unauthorized peripherals.

    Trusted by

    CW_AXA_logo
    pepsi cola logo
    mitsubishi electric
    New York City Department of Transportation Logo

    & many more

    Trusted by

    mitsubishi electric
    pepsi cola logo
    Viking Yachts
    New York City Department of Transportation DOT Logo

    and many more

    central management console for AccessPatrol endpoint security solutions

    Protect Sensitive Data

    Removable storage devices, such as USB flash drives, and mobile connection technologies, like Wi-Fi or FireWire are convenient and enhance productivity, however, they also present security risks

    AccessPatrol provides the critical peripheral device management features you need to prevent the theft of sensitive data such as personally identifiable information (PII), trade secrets, and financial records to USB drives and other portable storage devices.

    • Customize device access permissions based on user, organizational unit (OU), and endpoint device.
    • Block data transfers to protect sensitive data against exfiltration via removable storage devices.
    • Easily block USB devices, optical media, iPods, cell phones, external hard drives, and more to prevent unauthorized use
    • Optionally integrate AccessPatrol with Active Directory to manage USB security policies with your existing organizational units

    AccessPatrol’s Device Permissions

    AccessPatrol lets administrators easily control peripheral device management permissions for the users and endpoints in their network by assigning Full Access, Read Only, and No Access device control policies.

    The AccessPatrol device control solution will continue to enforce data protection policies even when managed devices lose connection to the CurrentWare server, allowing users to be monitored and managed when they are working offline or on another network.

    • Full Access: The computer or user with this access permission can read and write to the specified removable device that is connected to the computer.
    • Read Only: The computer or user with this access permission can only read the information from the specified external device that is connected to the computer. The user will not be able to copy any information to the specified external device. This option is only available to storage devices.
    • No Access: The computer or user with this access permission cannot read or write to the specified external devices that are connected to the computer.
    Screenshot of AccessPatrol's USB file transfer blocking feature

    The Types of Devices You Can Control With AccessPatrol

    As part of a multi-layered data loss prevention strategy you need peripheral device management capabilities to protect against any storage devices and other peripherals that are capable of transmitting data such as Bluetooth, SD/MM cards, and Infrared ports.

    AccessPatrol allows you to apply access rules for multiple classes of removable devices to prevent data loss and other security threats.

    Click here for a full list of the devices you can control with AccessPatrol

     

    Monitor USB Ports for Data Leakage to Portable Storage Devices

    With AccessPatrol’s USB device usage and data transfer monitoring features you can ensure compliance with your removable media policy.

    • Investigate potential data security incidents with advanced insights into which parties transferred which files to what devices
    • Understand what unauthorized devices are being used such as firewire, Android/Apple phones, removable devices
    • Improve your data theft prevention efforts with evidence of every data transfer to storage devices
    viking yachts

    Case Study

    Viking Yachts Protects Sensitive Information From a Departing Employee

    “CurrentWare saved us a lot of time and money. If we didn’t have AccessPatrol we would have never known what was going on. I cannot thank all of you enough for this software.”

    A departing employee was caught stealing classified files! If we didn’t have AccessPatrol we would never have known.

    AccessPatrol’s USB Control Features

    Block USB

    Block USB

    One click to block USB portable storage devices 

    Block External Devices

    Peripheral Control

    Easily block DVDs, iPods, external hard drives and more

    Device Permissions

    Device Permissions

    Set full access, read only or no access on storage devices

    Allowed List

    Allowed List

    Allow specific trusted peripheral devices to be used

    Reports

    USB Activity Reports

    Report on devices accessed or blocked on your network

    Track File Transfers

    Log USB File Transfer

    Monitor files that are copied to USB storage devices

    Deivce Access Code

    Access Code Generator

    Provide temporary access to peripheral devices

    Email Alert

    Email Alerts

    Get alerts of unauthorized file transfers and device use

    Email Report

    Email Reports

    Schedule device reports directly to your administrator's inbox

    Block Phones

    Block Phones

    Prevent users from connecting phones to company computers

    Block Files

    Block File Transfers

    Prevent files from being transferred to portable storage

    Stealth

    Stealth Mode

    AccessPatrol can run silently in the background or alert users

    Internet Off

    Centralized Console

    Manage all your users from the
    centralized console with Active
    Directory import or syncing

    Internet Off

    Platform Security

    Protect your CurrentWare console
    with 2FA, passwords, privilege
    management, and more

    Internet Off

    Offsite Management

    Extend onsite Internet usage
    policies to laptops running outside
    the corporate network

    Internet Off

    SQL Server Supported

    Database scaled for enterprise and
    large business operations using
    Microsoft SQL Server

    Free removable media policy template from CurrentWare

    FREE DOWNLOAD
    Removable Media Policy

    Download this data security policy template to prevent data leakage to USB flash drives and other removable storage devices.

    • Set data security standards for portable storage
    • Define the acceptable use of removable media
    • Inform your users about their security responsibilities
    access-patrol-currentware

    Try AccessPatrol for Free

    Fully functional. Easy to use. Install in minutes.