Data Loss Prevention Software

  • Stop Data Theft

    Restrict access to cloud storage, apps, removable media devices, and other data egress points

  • Monitor User Activity

    Monitor file transfers, web browsing, app usage, and more for evidence of high-risk activity

  • Meet Regulatory Compliance Requirements

    Address critical cybersecurity gaps to strengthen your security posture

Trusted by

CW_AXA_logo
pepsi cola logo
mitsubishi electric
New York City Department of Transportation Logo

& many more

Trusted by

mitsubishi electric
pepsi cola logo
Viking Yachts
New York City Department of Transportation DOT Logo

and many more

Protect Sensitive Data Against Theft to Insider Threats

Use CurrentWare’s data loss prevention solutions to protect sensitive customer data, trade secrets, and PII against data breaches to insider threats.

  • Collect evidence of data exfiltration and potential data breaches
  • Prevent the use of unauthorized USB storage devices and cloud storage services
  • Track and restrict file movements across portable storage devices, network share drives, and websites such as cloud storage services
AccessPatrol USB activity dashboard for a single user. Showcasing a timeline of file activities, top file types, and top device types
Cloud storage server

Prevent Data Loss to Cloud Storage Services

Having sensitive data stored on unmanaged cloud services is a significant risk. Control access to cloud apps and websites with CurrentWare.

  • Prevent malicious insiders from accessing cloud storage websites and apps
  • Block the downloading and uploading of specific file types
  • Track file transfers to/from cloud storage services for evidence of insider threats

Monitor User Devices for Events That Pose Security Risks

CurrentWare’s DLP solutions provide visibility into high-risk behavior with intuitive user activity reports, alerts, and dashboards.

  • Track file transfers to/from network share drives, removable media devices, and websites
  • Monitor network traffic on endpoints for attempts to access high-risk websites and other policy violations
  • Alert your network administrator, IT department, and other trusted users when high-risk events occur
Screenshot of AccessPatrol's email alerts with alerts for USB file transfers and use of blocked devices
AccessPatrol central web console close up

Centralized Management for Scalable Data Protection

Implement data security policies from the convenience of a central management server. Easily monitor and control your entire workforce in just a few clicks.

  • Monitor & control each managed endpoint device from a central  management console
  • Place users/PCs in their own policy groups to apply a unique security policy to them
  • Integrate with Active Directory to import & sync your Windows users to the CurrentWare Console
viking yachts

Case Study

Viking Yachts Protects Sensitive Information From a Departing Employee

“CurrentWare saved us a lot of time and money. If we didn’t have AccessPatrol we would have never known what was going on. I cannot thank all of you enough for this software.”

A departing employee was caught stealing classified files! If we didn’t have AccessPatrol we would never have known.

Why Use Data Loss Prevention (DLP) Software?

Technical safeguards are required by data security and privacy frameworks such as GDPR, HIPAA, SOX, ITAR, and PIPEDA. 

A DLP solution is a critical data security measure to protect sensitive data such as PII, PHI, EHRs, and intellectual property from being shared outside the corporate network.

With DLP software insider threat risks can be mitigated by enforcing data security policies that restrict sensitive data from being exfiltrated from the network.

USB flash drive next to laptop
Financial_ServicesBreach_Icon

Over 64% of financial services companies have 1,000+ sensitive files open to every employee.1

Without data loss prevention measures in place, stealing these sensitive files is as simple as a transfer to a  USB flash drive.

70% of consumers believe that businesses aren’t doing enough to secure their personal information.2

DLP software protects sensitive personal information by preventing data leakage to key egress points.

63% of employees have brought data from their previous employer to their current employer.3

Data loss prevention tools offer the insider threat protection features you need to prevent data theft.

How to Improve Data Security With CurrentWare

The CurrentWare Suite provides critical security controls for protecting your network, endpoints, and sensitive data against a variety of high-risk activities.

Device Blocking window Screenshot of CurrentWare's USB device control software AccessPatrol

Block & Audit Storage Devices

Control who can use portable storage devices and set security policies to limit what devices are allowed. Monitor data transfers to removable media and network storage devices to ensure that your data security policies are being followed.

Data loss prevention cloud storage DLP security tips

Prevent Data Loss to Cloud Platforms

Protect sensitive data against the risks of cloud file sharing sites. Block cloud storage sites/apps, restrict uploads/downloads, and monitor file transfers for high-risk or anomalous activity.

accesspatrol USB file operations history activity log

Audit User Activity for Insider Threat Risks

Monitor employee computer usage for signs of insider threats. Track file transfers, web browsing, app use, and login/logout times for high-risk, anomalous, or inappropriate activity. Receive automated alerts straight to your inbox when specific events occur.

Screenshot of AccessPatrol's USB file transfer blocking feature

Block Data Transfers to Removable Media

Go beyond simply blocking unauthorized USB devices; ensure optimal data protection with your trusted devices, too. Block file transfers to portable storage devices based on file extension and file name.

Screenshot of BrowseControl's Port Filter for blocking TCP/UDP ports

Block High-Risk Network Ports

Block unused TCP/UDP ports to reduce the attack surface of your network. Improve data protection by mitigating the threat of data leakage over FTP, SFTP, IRC, and other high-risk network ports.

Screenshot of category filtering window from BrowseControl web filter. Porn and social media categories blocked.

Block Risky Sites

BrowseControl’s web content category filtering database provides you with a convenient way to block millions of websites across over 100 URL categories. Easily block users from accessing social media, porn, games, known virus-infected websites, and more!

CurrentWare

Get Started Today
With a Free Trial

Fully functional. Easy to use. Install in minutes.

Flexible Deployment Options

With CurrentWare’s user activity monitoring solutions you’re in complete control of how your data is stored, secured, and retained. Your employees' data cannot be accessed by CurrentWare.

hp-on-premise

On Premises

Have Complete Control of Your Data

 

Install the management software on a standard computer, then deploy the client software to your users' computers

hp-private-cloud

Remote Workers

Monitor & Manage on Any Network

 

Connect your remote employees’ computers to the management software with simple port forwarding rules

manage-remote-workers-and-users

Self-Managed Cloud & VDI

Citrix, Azure, AWS, GCP, and More!

 

Enjoy the scalability and availability of the cloud alongside the security, control, and flexibility of our on-premises solution

CurrentWare Suite

Get all 4 modules for the best value or choose the exact solutions you need

Get Advanced Activity Insights

BrowseReporter is a versatile employee monitoring software to track productivity and efficiency.

  • Make informed decisions
  • Enforce company policies
  • Improve productivity
today's insights user score cards

Block Harmful Websites

BrowseControl is an easy-to-use website blocking software for restricting internet access.

  • Block URLs & categories
  • Block unwanted apps
  • Website allow & block lists
Screenshot of category filtering window from BrowseControl web filter. Porn and social media categories blocked.

Stop Data Theft to USB Devices

AccessPatrol is USB control software to protect sensitive data against theft to portable storage devices.

  • Block USB devices
  • USB file activity alerts
  • Block file transfers
AccessPatrol peripheral device permissions mockup block usb

Control PC Power States

enPowerManager is a remote PC power manager for centrally managing power settings across all endpoints.

  • Track logon and logoff times
  • Log PC power event history
  • Remotely shutdown PCs
Screenshot of enPowerManager's PC power schedule with weekly boot, restart, and shutdown events scheduled

We’re Here to Help

The CurrentWare team prides itself on its high-quality customer support. We will support you every step of the way—whether you’re just starting your free trial or actively using CurrentWare in your network.

At CurrentWare, customer success is our priority at every stage of your journey. We take pride in providing high-quality and reliable pre and post-sale support to make your experience exceptional.

We offer the same level of high-quality support to all of our customers—no extra fees or packages necessary!

Mike Noseworthy
Customer Support Lead

Product Training

CurrentWare provides the documentation, training, and other resources you need to take full advantage of the capabilities of our products.

Technical Support

Our expert support team is here to help you. Reach out to us over email, live chat, or phone from 8:00 AM – 7:00 PM EST, Monday to Friday.

Check Out Our Great Reviews!

This software helps us to achieve compliance with industry and government requirements with respect to controlling the use of removable storage media. It fits the bill perfectly.

Matthew W., Project Manager
Aviation & Aerospace Industry, 11-50 employees

In my nearly 40 years in the IT business I’ve worked with a lot of support teams. I really appreciate CurrentWare going the extra mile to help me get the most out of the product. They’ve definitely outweighed any of the other competitors that I’ve looked at.

Jerry Slocum, Managed Services Provider
Haggerty Auto Group, 150-200 Employees

Data leaks have been thwarted by AccessPatrol. When an unauthorized device is detected, an email alert is sent immediately. It enables real-time audit reports on accessed and blocked devices.

Karen M., Senior Director of Marketing
Construction Industry, 10,001+ employees

We have experienced data leaks by dishonest employees in the past and AccessPatrol has helped us avoid them and work with greater security and peace of mind for us and our customers.

Julio V., Head of Information Technology
Financial Services Industry, 10,001+ employees

Expand your capabilities with CurrentWare's award-winning productivity and security software

FREE DOWNLOAD
How to Keep Data Safe When Offboarding Employees

70% of intellectual property theft occurs within 90 days of an employee’s resignation.

Are you concerned about the damage a terminated employee could cause with access to sensitive corporate information, account passwords, and other proprietary data?

Follow these best practices to ensure data security when offboarding employees.

CurrentWare Features

Internet Off

Internet ON/OFF

One click to completely block
the Internet

Internet Off

URL Filter

Allow or block specific URLs;
customize policies for each group

Internet Off

Category Filtering

Block websites based on
content categories

Internet Off

Internet Scheduler

Set unique restrictions at specific
times of the day

Internet Off

Internet Monitoring

Monitor web browsing,
keyword searches, and more

Internet Off

Computer Activity Reports

15+ different detailed web
activity reports

Internet Off

Track Application Use

See what applications are being
used by employees

Internet Off

Email Reports

Automatically email user activity
reports to designated inboxes

Internet Off

Block USB

Block unauthorized USBs to protect
against data theft

Internet Off

Block External Devices

Easily block DVDs, external drives
& other peripherals

Internet Off

Device Permissions

Set full access, read only or no
access on storage devices

Internet Off

Allowed List

Allow specific storage devices on
your network

Internet Off

Centralized Console

Manage all your users from the
centralized console with Active
Directory import or syncing

Internet Off

Platform Security

Protect your CurrentWare console
with 2FA, passwords, privilege
management, and more

Internet Off

Offsite Management

Extend onsite security policies to any remote computer running outside the corporate network

Internet Off

SQL Server Supported

Database scaled for enterprise and
large business operations using
Microsoft SQL Server

DLP Software Frequently Asked Questions

Can I Use Your Data Loss Prevention Software With Remote Workers?

Yes. CurrentWare’s data loss prevention software solutions support a variety of deployment options that allow you to control USB devices, block websites, and monitor user activity no matter where they are.

To learn more about using data loss prevention with remote workers, visit this article:

How to Set Up Data Loss Prevention Software for Remote Teams

Are There Any Limits to the Free Trial?

The free trial of our data loss prevention software is fully functional. You can deploy it on up to 10 computers for 14 days. If you need more time or more computers to properly evaluate the best data loss prevention software for your organization, reach out to our support team.

Will My Employees Know They Are Being Monitored?

As with any CurrentWare Suite product, your organization is in control of how visible the data loss prevention software is.

The CurrentWare software client operates in stealth mode by default.

In stealth mode, the CurrentWare software client is not visible in the system tray or control panel of the user’s computer. Your users will not be able to uninstall the program or stop it without administrator privileges.

If you would like your users to be aware that they are being monitored, you can choose to show the CurrentWare software client in their system tray by enabling it in the client software settings.

AccessPatrol does not disclose when its USB activity monitoring feature is active. When your employees attempt to use an unauthorized USB device they can be presented with an optional warning message.

When BrowseControl blocks a website you can choose to show a warning message, redirect to another website, or simply have the connection fail.

When monitoring user activity with BrowseReporter you can choose to enable the End-User Reports feature to provide users with access to their activity data. You can also display optional notifications that periodically remind them that they are being monitored.

Does CurrentWare Have Access to Employee Data?

No, CurrentWare cannot access your employee’s computer monitoring data. CurrentWare’s software does not send your user’s computer usage data to CurrentWare. They are installed and managed by your organization.

All of the data collected by CurrentWare’s software is stored on a database that is installed in your organization’s data center or cloud service provider.

With CurrentWare’s on-premises & self-managed cloud deployment options, you’re in complete control of your data.

  • Sensitive employee data stays secured to your standards rather than being sent to a third party.
  • Maintain data localization and residency compliance requirements by keeping employee data exactly where it needs to be.
  • Retain auditable records of user activity for as long as you need

For more information please refer to our Terms of Service.

What is Data Loss Prevention (DLP)?

Data loss prevention (DLP) is a set of tools and processes that prevent confidential data from being leaked, deleted, or misused.

DLP tools work to detect and prevent sensitive data from leaving the network. To protect the confidentiality and security of data, DLP software stops employees and other end-users from copying sensitive data to unauthorized USB drives.

The security policies defined by DLP software helps to prevent end users from accidentally or maliciously sharing data that could put the organization at risk.

Can I Set Unique Device Restrictions for Different Computers or Users?

Yes. You can assign unique security policies for each computer, user, department, or other organizational unit (OU) in your company.

To do this, CurrentWare allows you to create group folders with separate policies. This feature is perfect for restricting users while providing greater access for trusted administrators.

In terms of device control, you can also use the access code generator to temporarily grant access to all peripherals or use the device scheduler to automatically allow/block devices at specific times.

In terms of internet and application restriction, you can use the internet scheduler and app blocker scheduler to temporarily allow access to blocked websites and applications at specific times.

Can I Block Specific File Types from Being Transferred?

Yes. CurrentWare has the ability to prevent your end-users from copying specific files to their storage devices. These file transfer restrictions can be configured based on the file name or file extension.

The file transfer blocking feature can also be used on devices that are on the Allowed List. This lets you provide access to company-authorized USB devices while still protecting the sensitive data in your network against exfiltration to portable storage hardware.

Who Uses This DLP Solution?

CurrentWare has a global client base across a variety of industries including government, healthcare, finance, nonprofit, and manufacturing.

CurrentWare’s customers use our computer monitoring, web filtering, and data loss prevention solutions to protect their business against time theft, data leakage, and web-based threats by monitoring and controlling computer usage.

Learn more by reading our customer case studies.

How Can I Start Protecting Sensitive Data?

  1. Download & install CurrentWare
    Download the files for your free trial. On the administrator’s computer, run CurrentWare.exe to begin the installation of the endpoint security solutions.
  2. Deploy the security software clients
    Deploy the CurrentWare software client (cwClientSetup.exe) on all the computers you want to control. You can deploy the software client with a local install or by using Active Directory, SCCM, or our built-in remote deployment tool.
  3. Monitor & control your endpoint devices
    After the installation, you will see all of your user’s computers on the CurrentWare Console. From this console, you can generate detailed reports on your user’s activities and assign data loss prevention policies to protect data against insider security threats.

Is This a Cloud Product?

The CurrentWare Suite can be deployed on-premises or on a cloud platform of your choice. Both deployment option are compatible with remote workers with a few configuration changes.

Learn More:

How is the CurrentWare Suite Secured?

CurrentWare is committed to the security of its platform, its users and their data. 

 

  • All of the data collected by CurrentWare’s solutions is stored in your organization’s data center or cloud service provider; the data is not sent to CurrentWare.
  • The web console cannot be accessed without a username and password. For an added layer of authentication security you can enable two-factor authentication.
  • You can selectively enable/disable what data is tracked and delete old records automatically.

 

For a complete overview of the security measures that CurrentWare has in place, check out the CurrentWare platform security overview page.

What Peripheral Devices Can CurrentWare Control?

In addition to USB device control, CurrentWare’s data loss prevention tool AccessPatrol allows you to control the following peripheral devices on your users’ computers.

Devices You Can Control Device Access Permissions
USB Full / Read only / No access
DVD /CD Full / Read only / No access
Floppy Full / Read only / No access
Tape Full / Read only / No access
External Hard drive Full / Read only / No access
Firewire Full / Read only / No access
SD Card Full / Read only / No access
MM Card Full / Read only / No access
Bluetooth Devices Full / Audio Only/ No access
Infrared Full / No access
Wifi Full / No access
Serial Full / No access
Parallel Full / No access
Scanners Full / No access
Cameras, Webcams & Others Full / No access
Printers Full / No access
USB Ethernet Adapter Full / No access
Sound Cards Full / No access
Portable Devices (iPhones, Mobile Devices) Full / No access
Network Share Full / No access

Learn More: USB control with AccessPatrol

Protect Your Sensitive Data With CurrentWare

1 2021 Data Risk Report – Varonis. https://info.varonis.com/hubfs/docs/research_reports/2021-Financial-Data-Risk-Report.pdf.
2 2020 Data Attack Surface Report – Arcserve https://info.arcserve.com/en/the-2020-data-attack-surface-report.
3 2019 Global Data Exposure Report – Code42 https://www.code42.com/news-releases/code42-global-data-exposure-report/.