Trusted by
& many more
Trusted by
and many more
Simple USB Security
All of CurrentWare’s products continue to enforce policies even when managed devices lose connection to the CurrentWare server, allowing users to be monitored and managed when they are working offline or on another network.
- Assign full access, read-only, and no access permissions for flash drives, external hard drives, optical media, and more.
- Protect sensitive data from theft and mismanagement by unauthorized users.
- Manage device permissions to enforce the exclusive use of authorized USBs.
AccessPatrol’s Device Permissions
AccessPatrol lets administrators easily control USB device permissions for the users and endpoints in their network by assigning Full Access, Read Only, and No Access permissions.
Effortlessly get precise and granular control over untrusted removable devices, mobile connection technologies, mobile devices, bluetooth devices, and more.
Create device whitelists with specific USB devices that can be used in USB ports on managed endpoints.
- Full Access: No restriction. The user/computer can read and write to the specified external devices that are connected to the computer.
- Read Only: Partial restriction. They can only read the information from the storage device; copying is disabled.
- No Access: Full restriction. The user/computer cannot read or write to the external device.
Why Use USB Device Control Solutions?
As part of a multi-layered data loss prevention strategy you will need security controls to protect data against theft to USB ports.
AccessPatrol’s USB blocking tool provides the critical security controls you need to prevent employees, guests, and contractors from stealing sensitive data such as personally identifiable information (PII), trade secrets, and financial records.
- USB Security: Block unauthorized devices as a critical security control for enforcing your removable media policy.
- Prevent Data Breaches: Flash drives are portable and easy to hide. AccessPatrol’s technical safeguards stop insider threats from transferring data to all forms of removable media.
- Endpoint Security: USB devices can unknowingly infect company computers with ransomware and other malicious software. AccessPatrol protects these endpoints against rogue USB devices by proactively preventing the transmission of data.
Monitor USB Ports for Data Leakage to Removable Devices
With AccessPatrol’s USB device usage and data transfer monitoring features you can ensure compliance with your removable media policy.
- Investigate potential data security incidents with advanced insights into which parties transferred which files to what devices
- Understand what unauthorized devices are being used such as firewire, Android/Apple phones, removable devices
- Improve your data theft prevention efforts with evidence of every data transfer to storage devices
AccessPatrol’s USB Control & Data Loss Prevention Features
Block USB
One click to block USB portable storage devices
Peripheral Control
Easily block DVDs, iPods, external hard drives and more
Device Permissions
Set full access, read only or no access on storage devices
Allowed List
Allow specific trusted peripheral devices to be used
USB Activity Reports
Report on devices accessed or blocked on your network
Log USB File Transfer
Monitor files that are copied to USB storage devices
Access Code Generator
Provide temporary access to peripheral devices
Email Alerts
Get alerts of unauthorized file transfers and device use
Email Reports
Schedule device reports directly to your administrator's inbox
Block Phones
Prevent users from connecting phones to company computers
Block File Transfers
Prevent files from being transferred to portable storage
Stealth Mode
AccessPatrol can run silently in the background or alert users
Centralized Console
Manage all your users from the
centralized console with Active
Directory import or syncing
Platform Security
Protect your CurrentWare console
with 2FA, passwords, privilege
management, and more
Offsite Management
Extend onsite Internet usage
policies to laptops running outside
the corporate network
SQL Server Supported
Database scaled for enterprise and
large business operations using
Microsoft SQL Server