ISO 27001 Compliance Software
The CurrentWare Suite provides organizations with capabilities that help ensure that their ISMS is aligned with information security best practices
- Control Removable Media & Other Peripherals
Prevent the unauthorized use of high-risk wireless and peripheral devices
- Endpoint Security Controls for Defense-in-Depth
Minimize the attack surface of endpoints to protect sensitive data - Insider Threat Prevention
Mitigate the risks of insider threats with advanced awareness and control
Trusted by
& many more
Trusted by
and many more
ISO 27001 & ISO 27002 Compliance Requirements
You Can Address With CurrentWare
ISO 27001 Control | CurrentWare Modules & Features |
Annex A.8.3 — Media Handling
Annex A.8.3 is about media handling. The objective in this Annex is to prevent unauthorized disclosure, modification, removal or destruction of information stored on media. | AccessPatrol
|
Annex A.12.1 — Operations Security
A.12.4 — Logging and Monitoring Annex A.12.1 is about Operational Procedures and Responsibilities. The objective of A.12.1 is to ensure the secure operation of information processing facilities. Annex A.12.4 is about logging and monitoring. The objective in this Annex A area is to record events and generate evidence.
| AccessPatrol
BrowseControl
BrowseReporter
enPowerManager
|
ISO 27002 Control | CurrentWare Modules & Features |
8.12 Data Leakage Prevention (DLP) ISO 27002 control 8.12 modifies risk by implementing technical measures that proactively detect and prevent the disclosure and/or extraction of information. | AccessPatrol
BrowseControl
BrowseReporter
Learn More: CurrentWare’s data loss prevention solutions |
8.16 Monitoring Activities ISO 27002 Control 8.16 modifies risk by optimizing monitoring activities to identify anomalous behavior and assists in the prompt analysis of information security events and incidents. | AccessPatrol
BrowseReporter
enPowerManager
|
8.22 Web Filtering If employees visit websites that contain viruses, phishing materials, or other types of illegal information, this may expose corporate networks and information systems to security risks. With BrowseControl you can restrict the websites that employees can access to mitigate the risk of malicious sites.
| BrowseControl
|
Case Study
Viking Yachts Protects Sensitive Information From a Departing Employee
“CurrentWare saved us a lot of time and money. If we didn’t have AccessPatrol we would have never known what was going on. I cannot thank all of you enough for this software.”
The reporting feature offers accurate insights on internet activities in order to ensure compliance & organization policies are met. The offsite management feature makes it easy to monitor those working from home.
Carroline Achieng O., Sales Consultant
Absa Life Assurance, 10,001+ Employees
We have experienced data leaks by dishonest employees in the past and AccessPatrol has helped us avoid them and work with greater security and peace of mind for us and our customers.
Julio V., Head of Information Technology
Financial Services Industry, 10,001+ employees
As a ‘novice’ I was able to set up with help from support in about an hour. Previous software took forever and didn’t work as advertised. This software worked right out of the box.
Dr. Gerard B, Office Manager
2-10 Employees
The software actually does what was advertised and the support is great! We were able to have the software up and running on the same day with no issues or even a call/email to their support.
Ken W, IT Manager
201-500 Employees
FREE DOWNLOAD
Removable Media Policy
Download this data security policy template to prevent data leakage to USB flash drives and other removable storage devices.
- Set data security standards for portable storage
- Define the acceptable use of removable media
- Inform your users about their security responsibilities
Flexible Deployment Options
With CurrentWare’s user activity monitoring solutions you’re in complete control of how your data is stored, secured, and retained. Your employees' data cannot be accessed by CurrentWare.
On Premises
Have Complete Control of Your Data
Install the management software on a standard computer, then deploy the client software to your users' computers
Remote Workers
Manage Users on Any Network
Connect your remote employees’ computers to the management software with simple port forwarding rules
Self-Managed Cloud
Citrix, Azure, AWS, GCP, and More!
Enjoy the scalability and availability of the cloud alongside the security, control, and flexibility of our on-premises solution.
Get Advanced Activity Insights
BrowseReporter is a versatile employee monitoring software to track productivity and efficiency.
- Make informed decisions
- Enforce company policies
- Improve productivity
Block Harmful Websites
BrowseControl is an easy-to-use website blocking software for restricting internet access.
- Block URLs & categories
- Block unwanted apps
- Website allow & block lists
Stop Data Theft to USB Devices
AccessPatrol is USB control software to protect sensitive data against theft to portable storage devices.
- Block USB devices
- USB file activity alerts
- Block file transfers
CurrentWare Features
Internet ON/OFF
One click to completely block
the Internet
URL Filter
Allow or block specific URLs;
customize policies for each group
Category Filtering
Block websites based on
content categories
Internet Scheduler
Set unique restrictions at specific
times of the day
Internet Monitoring
Monitor web browsing,
keyword searches, and more
Computer Activity Reports
15+ different detailed web
activity reports
Track Application Use
See what applications are being
used by employees
Email Reports
Automatically email user activity
reports to designated inboxes
Block USB
Block unauthorized USBs to protect
against data theft
Block External Devices
Easily block DVDs, external drives
& other peripherals
Device Permissions
Set full access, read only or no
access on storage devices
Allowed List
Allow specific storage devices on
your network
Centralized Console
Manage all your users from the
centralized console with Active
Directory import or syncing
Platform Security
Protect your CurrentWare console
with 2FA, passwords, privilege
management, and more
Offsite Management
Extend onsite security policies to any remote computer running outside the corporate network
SQL Server Supported
Database scaled for enterprise and
large business operations using
Microsoft SQL Server
Learn How to Meet These
Compliance Requirements With CurrentWare
NERC CIP Compliance
Protect TCAs & BCSI From Insider Threats
ISO 27001 Compliance
Critical Security Controls for Your ISMS
CIPA Compliance for Education
Qualify for the FCC’s E-Rate program
NIST 800-171 & 800-53
Protect Controlled Unclassified Information