NIST 800-171 Compliance Software
Protect controlled unclassified information with the robust data loss prevention, endpoint security, and user activity monitoring features in the CurrentWare Suite.
- Control Removable Media & Other Peripherals Prevent the unauthorized use of high-risk wireless and peripheral devices
- Endpoint Security Controls for Defense-in-Depth Minimize the attack surface of endpoints within information systems
- Advanced Awareness & Access Control
Monitor and restrict user activity to protect sensitive information
Trusted by
& many more
Trusted by
and many more
NIST 800-53 & NIST 800-171 Compliance Requirements
You Can Address With CurrentWare
Requirement | CurrentWare Modules & Features |
Access Control AC-6 Least Privilege The organization employs the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions.
| BrowseControl
AccessPatrol
|
AC-18 Wireless Access The organization: a. Establishes usage restrictions, configuration/connection requirements, and implementation guidance for wireless access; and b. Authorizes wireless access to the information system prior to allowing such connections. AC-18 (3) Disable Wireless Networking | AccessPatrol
|
AC-19 (4)(c) Restricts the connection of classified mobile devices to classified information systems in accordance with [Assignment: organization-defined security policies]. | AccessPatrol
|
Requirement | CurrentWare Modules & Features |
Audit and Accountability AU-3 Content of Audit Records The information system generates audit records containing information that establishes what type of event occurred, when the event occurred, where the event occurred, the source of the event, the outcome of the event, and the identity of any individuals or subjects associated with the event. AU-6 Audit Review, Analysis, and Reporting The organization: a. Reviews and analyzes information system audit records [Assignment: organization-defined frequency] for indications of [Assignment: organization-defined inappropriate or unusual activity]; and b. Reports findings to [Assignment: organization-defined personnel or roles]. AU-8 Time Stamps: The information system: b. Records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT) and meets [Assignment: organization-defined granularity of time measurement]. AU-14 Session Audit: Session audits include, for example, tracking websites visited and recording information and/or file transfers
| BrowseReporter
AccessPatrol
enPowerManager
CurrentWare Web Console
|
AU-4 Audit Storage Capacity
AU-11 Audit Record Retention: | The CurrentWare Suite is hosted and managed by your company either on-premises or via a cloud service provider of your choice, giving you full control over data retention. Data can be culled automatically after a set time period; which data types are retained can also be customized.
|
AU-15 Alternate Audit Capability: The organization provides an alternate audit capability in the event of a failure in primary audit capability that provides [Assignment: organization-defined alternate audit functionality]. | All of CurrentWare’s security policies and user activity data have a local cache failsafe in the event that a connection to the server is lost. All user activity is still captured and will sync with the primary database once a connection is reestablished. |
Requirement | CurrentWare Modules & Features |
Configuration Management CM-7 Least Functionality a. Configures the information system to provide only essential capabilities; and b. Prohibits or restricts the use of the following functions, ports, protocols, and/or services: [Assignment: organization-defined prohibited or restricted functions, ports, protocols, and/or services]. CM-7 (4)(b) The organization employs an allow-all, deny-by-exception policy to prohibit the execution of unauthorized software programs on the information system
| BrowseControl
|
CM-10 Software Usage Restrictions The organization: a. Uses software and associated documentation in accordance with contract agreements and copyright laws; b. Tracks the use of software and associated documentation protected by quantity licenses to control copying and distribution; and c. Controls and documents the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work. | AccessPatrol
BrowseReporter
BrowseControl
|
CM-11 User-Installed Software The organization: a. Establishes [Assignment: organization-defined policies] governing the installation of software by users; b. Enforces software installation policies through [Assignment: organization-defined methods]; and c. Monitors policy compliance at [Assignment: organization-defined frequency]. | AccessPatrol
BrowseReporter
BrowseControl
|
Requirement | CurrentWare Modules & Features |
Incident Response IR-5 Incident Monitoring The organization tracks and documents information system security incidents. IR-5 (1) | BrowseReporter
AccessPatrol
enPowerManager
CurrentWare Web Console
|
Requirement | CurrentWare Modules & Features |
Media Protection MP-7 Media Use: | AccessPatrol
Learn More: Which devices can I control with AccessPatrol?
|
Requirement | CurrentWare Modules & Features |
Systems and Services Acquisition
SA-9 External Information System Services | Processing, Storage, and Service Location The organization restricts the location of [Selection (one or more): information processing; information/data; information system services] to [Assignment: organization-defined locations] based on [Assignment: organization-defined requirements or conditions]. Supplemental Guidance: The location of information processing, information/data storage, or information system services that are critical to organizations can have a direct impact on the ability of those organizations to successfully execute their missions/business functions. This situation exists when external providers control the location of processing, storage or services. The criteria external providers use for the selection of processing, storage, or service locations may be different from organizational criteria. For example, organizations may want to ensure that data/information storage locations are restricted to certain locations to facilitate incident response activities (e.g., forensic analyses, after-the-fact investigations) in case of information security breaches/compromises. | All data collected by the CurrentWare Suite is controlled and managed by the organization with no reliance on third-party data processors or controllers required.
The organization can host the data on-premises or with a trusted cloud services provider of their choice. |
Requirement | CurrentWare Modules & Features |
System and Communications Protection SC-43 Usage Restrictions The organization: a. Establishes usage restrictions and implementation guidance for [Assignment: organization-defined information system components] based on the potential to cause damage to the information system if used maliciously; and b. Authorizes, monitors, and controls the use of such components within the information system. Information system components include hardware, software, or firmware components (e.g., Voice Over Internet Protocol, mobile code, digital copiers, printers, scanners, optical devices, wireless technologies, mobile devices). | AccessPatrol
BrowseControl
BrowseReporter
|
Case Study
Viking Yachts Protects Sensitive Information From a Departing Employee
“CurrentWare saved us a lot of time and money. If we didn’t have AccessPatrol we would have never known what was going on. I cannot thank all of you enough for this software.”
Flexible Deployment Options
With CurrentWare’s user activity monitoring solutions you’re in complete control of how your data is stored, secured, and retained. Your employees' data cannot be accessed by CurrentWare.
On Premises
Have Complete Control of Your Data
Install the management software on a standard computer, then deploy the client software to your users' computers
Remote Workers
Monitor & Manage on Any Network
Connect your remote employees’ computers to the management software with simple port forwarding rules
Self-Managed Cloud & VDI
Citrix, Azure, AWS, GCP, and More!
Enjoy the scalability and availability of the cloud alongside the security, control, and flexibility of our on-premises solution
FREE DOWNLOAD
Removable Media Policy
Download this data security policy template to prevent data leakage to USB flash drives and other removable storage devices.
- Set data security standards for portable storage
- Define the acceptable use of removable media
- Inform your users about their security responsibilities
We’re Here to Help
The CurrentWare team prides itself on its high-quality customer support. We will support you every step of the way—whether you’re just starting your free trial or actively using CurrentWare in your network.
At CurrentWare, customer success is our priority at every stage of your journey. We take pride in providing high-quality and reliable pre and post-sale support to make your experience exceptional.
We offer the same level of high-quality support to all of our customers—no extra fees or packages necessary!
Mike Noseworthy
Customer Support Lead
Product Training
CurrentWare provides the documentation, training, and other resources you need to take full advantage of the capabilities of our products.
Technical Support
Our expert support team is here to help you. Reach out to us over email, live chat, or phone from 8:00 AM – 6:30 PM EST, Monday to Friday.
This software helps us to achieve compliance with industry and government requirements with respect to controlling the use of removable storage media. It fits the bill perfectly.
Matthew W., Project Manager
Aviation & Aerospace Industry, 11-50 employees
In my nearly 40 years in the IT business I’ve worked with a lot of support teams. I really appreciate CurrentWare going the extra mile to help me get the most out of the product. They’ve definitely outweighed any of the other competitors that I’ve looked at.
Jerry Slocum, Managed Services Provider
Haggerty Auto Group, 150-200 Employees
Data leaks have been thwarted by AccessPatrol. When an unauthorized device is detected, an email alert is sent immediately. It enables real-time audit reports on accessed and blocked devices.
Karen M., Senior Director of Marketing
Construction Industry, 10,001+ employees
We have experienced data leaks by dishonest employees in the past and AccessPatrol has helped us avoid them and work with greater security and peace of mind for us and our customers.
Julio V., Head of Information Technology
Financial Services Industry, 10,001+ employees
Get Advanced Activity Insights
BrowseReporter is a versatile employee monitoring software to track productivity and efficiency.
- Make informed decisions
- Enforce company policies
- Improve productivity
Block Harmful Websites
BrowseControl is an easy-to-use website blocking software for restricting internet access.
- Block URLs & categories
- Block unwanted apps
- Website allow & block lists
Stop Data Theft to USB Devices
AccessPatrol is USB control software to protect sensitive data against theft to portable storage devices.
- Block USB devices
- USB file activity alerts
- Block file transfers
CurrentWare Features
Internet ON/OFF
One click to completely block
the Internet
URL Filter
Allow or block specific URLs;
customize policies for each group
Category Filtering
Block websites based on
content categories
Internet Scheduler
Set unique restrictions at specific
times of the day
Internet Monitoring
Monitor web browsing,
keyword searches, and more
Computer Activity Reports
15+ different detailed web
activity reports
Track Application Use
See what applications are being
used by employees
Email Reports
Automatically email user activity
reports to designated inboxes
Block USB
Block unauthorized USBs to protect
against data theft
Block External Devices
Easily block DVDs, external drives
& other peripherals
Device Permissions
Set full access, read only or no
access on storage devices
Allowed List
Allow specific storage devices on
your network
Centralized Console
Manage all your users from the
centralized console with Active
Directory import or syncing
Platform Security
Protect your CurrentWare console
with 2FA, passwords, privilege
management, and more
Offsite Management
Extend onsite security policies to any remote computer running outside the corporate network
SQL Server Supported
Database scaled for enterprise and
large business operations using
Microsoft SQL Server
Learn How to Meet These
Compliance Requirements With CurrentWare
NERC CIP Compliance
Protect TCAs & BCSI From Insider Threats
ISO 27001 Compliance
Critical Security Controls for Your ISMS
CIPA Compliance for Education
Qualify for the FCC’s E-Rate program
NIST 800-171 & 800-53
Protect Controlled Unclassified Information