CurrentWare v7.0.2 is here! Read the release blog to learn more.

Data Loss Prevention Solutions

ISO 27001 Compliance Software

The CurrentWare Suite provides organizations with capabilities that help ensure that their ISMS is aligned with information security best practices

  • Control Removable Media & Other Peripherals

    Prevent the unauthorized use of high-risk wireless and peripheral devices

  • Endpoint Security Controls for Defense-in-Depth
    Minimize the attack surface of endpoints to protect sensitive data
  • Insider Threat Prevention
    Mitigate the risks of insider threats with advanced awareness and control

Trusted By:

CW_AXA_logo
CW_AXA_logo
bostoncenterless logo

& many more

Trusted by:

CW_AXA_logo

and more

ISO 27001 & ISO 27002 Compliance Requirements
You Can Address With CurrentWare

ISO 27001 Controls You Can Meet With CurrentWare

ISO 27001 Control CurrentWare Modules & Features

Annex A.8.3 — Media Handling
A.8.3.1 Management of Removable Media

Annex A.8.3 is about media handling. The objective in this Annex is to prevent unauthorized disclosure, modification, removal or destruction of information stored on media.

AccessPatrol

  • Prevent the use of unauthorized removable media devices
  • Restrict file transfers to removable media devices
  • Get alerts when unknown or blocked removable media is inserted into managed endpoints
  • Monitor removable media activity for security policy violations
  • Maintain an audit trail of every removable media device that is inserted into managed endpoints
  • Maintain an audit trail of file operations executed from portable storage devices

Annex A.12.1 — Operations Security

A.12.4 — Logging and Monitoring
A.12.6.2 Restrictions on Software Installation

Annex A.12.1 is about Operational Procedures and Responsibilities. The objective of A.12.1 is to ensure the secure operation of information processing facilities.

Annex A.12.4 is about logging and monitoring. The objective in this Annex A area is to record events and generate evidence.

 

AccessPatrol

  • Get alerts when unknown or blocked removable media is inserted into managed endpoints
  • Monitor removable media activity for security policy violations
  • Maintain an audit trail of every removable media device that is inserted into managed endpoints
  • Maintain an audit trail of file operations executed from portable storage devices

BrowseControl

  • Prevent employees from launching specific Windows applications

BrowseReporter

  • Monitor application usage to detect unauthorized software (shadow IT)
  • Maintain a log of each website visited and application used

enPowerManager

  • Maintain a log of user logon and logoff times
  • Maintain a log of PC power events (startup, shutdown, sleep, hibernate)

ISO 27002 Controls You Can Meet With CurrentWare

ISO 27002 Control CurrentWare Modules & Features
8.12 Data Leakage Prevention (DLP)

ISO 27002 control 8.12 modifies risk by implementing technical measures that proactively detect and prevent the disclosure and/or extraction of information.

AccessPatrol

  • Block data transfers to portable storage devices to prevent data leakage
  • Maintain a log of each removable media device used
  • Get alerts of attempts to use unauthorized removable media devices
  • Maintain an audit trail of every file operation to removable media devices

BrowseControl

  • Disable unneeded TCP/UDP ports at the endpoint level to reduce the attack surface of ICT systems
  • Prevent users from launching applications that are known to be a risk to sensitive data such as cloud storage apps
  • Restrict browser access to authorized websites and intranet portals to prevent the introduction of malicious code from high-risk websites
  • Block known malicious domains and internet-based data egress points such as cloud storage sites with predefined web content categories

BrowseReporter

  • Get alerts when users attempt to visit known high-risk websites
  • Monitor user computer activity for high-risk web browsing or app usage

Learn More: CurrentWare’s data loss prevention solutions

    8.16 Monitoring Activities

    ISO 27002 Control 8.16 modifies risk by optimizing monitoring activities to identify anomalous behavior and assists in the prompt analysis of information security events and incidents.

    AccessPatrol

    • Maintain a log of each removable media device used
    • Get alerts of attempts to use unauthorized removable media devices
    • Maintain an audit trail of every file operation to removable media devices

    BrowseReporter

    • Get alerts when users attempt to visit known high-risk websites
    • Monitor user computer activity for high-risk web browsing or app usage
    • Collect historical data to establish a baseline of what is considered normal user activity
    • Monitor web browsing and application usage for attempts to access business critical ICT resources

    enPowerManager

    • Maintain a log of user logon and logoff times
    • Maintain a log of PC power events (startup, shutdown, sleep, hibernate)

    8.22 Web Filtering

    If employees visit websites that contain viruses, phishing materials, or other types of illegal information, this may expose corporate networks and information systems to security risks.

    With BrowseControl you can restrict the websites that employees can access to mitigate the risk of malicious sites.

     

    BrowseControl

    • Restrict internet access to only authorized websites
    • Block millions of known malicious and high-risk domains across 100+ predefined web content categories
    • Block network ports to reduce the attack surface of your endpoints

     

    viking yachts

    Case Study

    Viking Yachts Protects Sensitive Information From a Departing Employee

    “CurrentWare saved us a lot of time and money. If we didn’t have AccessPatrol we would have never known what was going on. I cannot thank all of you enough for this software.”

    A departing employee was caught stealing classified files! If we didn’t have AccessPatrol we would never have known.
    Free removable media policy template from CurrentWare

    FREE DOWNLOAD
    Removable Media Policy

    Download this data security policy template to prevent data leakage to USB flash drives and other removable storage devices.

    • Set data security standards for portable storage
    • Define the acceptable use of removable media
    • Inform your users about their security responsibilities

    Flexible Deployment Options

    On-Premises | Remote Workers | Self-Managed Cloud

    hp-on-premise

    Download the Free Trial

    Get started today with a free fully-functional 14-day trial of the CurrentWare Suite. No credit card required to sign up!

    hp-private-cloud

    Deploy the Software

    Install the Console & Server on a computer, server, or a cloud platform of your choice. Then deploy the Clients to your users’ computers.

    manage-remote-workers-and-users

    Manage your Users

    Organize your PCs/Users into custom policy groups. Get advanced awareness & control over how technology is used in your organization.

    CurrentWare Suite

    Get all 4 modules for the best value or choose the exact solution you need

    Get Advanced  Activity Insights

    BrowseReporter is a versatile employee monitoring software to track productivity and efficiency.

    • Make informed decisions
    • Enforce company policies
    • Improve productivity

    Employee Productivity Dashboard

    Block Dangerous & Unwanted Sites

    BrowseControl is an easy-to-use website blocking software for restricting internet access.

    • Block URLs & categories
    • Block unwanted apps
    • Website allow & block lists

    Screenshot of category filtering window from BrowseControl web filter. Porn and social media categories blocked.

    Stop Data Theft to USB Devices

    AccessPatrol is USB control software to protect sensitive data against theft to portable storage devices.

    • Block USB devices
    • USB file activity alerts
    • Block file transfers

    Device Blocking window Screenshot of CurrentWare's USB device control software AccessPatrol

    Remotely Control PC Power States

    enPowerManager is a remote PC power manager for centrally managing power settings across all endpoints.

    • Track logon and logoff times
    • Log PC power event history
    • Remotely shutdown PCs

    Screenshot of enPowerManager's PC power schedule with weekly boot, restart, and shutdown events scheduled

    Check Out Our Great Reviews on Capterra!

    AccessPatrol is a magical weapon with cutting-edge capabilities that protects your computer from untrusted USB devices. If an unauthorized device is attached it will warn the company immediately.

    Md Jahan M, Digital Marketing & Full Stack Specialist
    Internet Industry, 10,001+ employees

    [AccessPatrol] has been a great benefit to secure USB devices and access to company computers. We now have the ability to secure machines that otherwise would have been exposed to threats.

    Jordan F., Senior IT Specialist
    Machinery Industry, 1001-5000 employees

    Data leaks have been thwarted by AccessPatrol. When an unauthorized device is detected, an email alert is sent immediately. It enables real-time audit reports on accessed and blocked devices.

    Karen M., Senior Director of Marketing
    Construction Industry, 10,001+ employees

    We have experienced data leaks by dishonest employees in the past and AccessPatrol has helped us avoid them and work with greater security and peace of mind for us and our customers.

    Julio V., Head of Information Technology
    Financial Services Industry, 10,001+ employees

    CurrentWare Features

    Internet Off

    Internet ON/OFF

    One click to completely block
    the Internet

    Internet Off

    URL Filter

    Allowed list or Blocked list for
    specific URLs

    Internet Off

    Category Filtering

    Block websites based on
    content categories

    Internet Off

    Internet Scheduler

    Set unique restrictions at specific
    times of the day

    Internet Off

    Internet Monitoring

    Track what websites are being
    visited by employees

    Internet Off

    Web Activity Reports

    15+ different detailed web
    activity reports

    Internet Off

    Track Application Use

    See what applications are being
    used by employees

    Internet Off

    Email Reports

    Automatically email reports of web
    usage to managers

    Internet Off

    Block USB

    Block unauthorized USBs to protect
    against data theft

    Internet Off

    Block External Devices

    Easily block DVDs, external drives
    & other peripherals

    Internet Off

    Device Permissions

    Set full access, read only or no
    access on storage devices

    Internet Off

    Allowed List

    Allow specific storage devices on
    your network

    Internet Off

    Centralized Console

    Manage all your users from the
    centralized console with Active
    Directory import or syncing

    Internet Off

    Platform Security

    Protect your CurrentWare console
    with 2FA, passwords, privilege
    management, and more

    Internet Off

    Offsite Management

    Extend onsite Internet usage
    policies to laptops running outside
    the corporate network

    Internet Off

    SQL Server Supported

    Database scaled for enterprise and
    large business operations using
    Microsoft SQL Server

    CurrentWare

    Get Started Today
    With a Free Trial

    Fully functional. Easy to use. Install in minutes.

    Learn How to Meet These
    Compliance Requirements With CurrentWare

    NERC CIP Compliance

    Protect TCAs & BCSI From Insider Threats

    Learn More

    ISO 27001 Compliance

    Critical Security Controls for Your ISMS

    Learn More

    CIPA Compliance for Education

    Qualify for the FCC’s E-Rate program

    Learn More

    NIST logo

    NIST 800-171 & 800-53

    Protect Controlled Unclassified Information

    Learn More

    Meet ISO 27001 Compliance With CurrentWare