Access Control for Removable Storage Devices

AccessPatrol is a convenient USB Access Control software for setting custom permissions for removable media devices. From the CurrentWare Console you can effortlessly enable or disable access to removable storage devices for each user, endpoint device, and organizational unit (OU).

Assign full access, read-only, and no access permissions for flash drives, external hard drives, optical media, and more

Protect sensitive data from theft and mismanagement by unauthorized users

Manage device permissions to enforce the exclusive use of authorized USBs

Thanks to AccessPatrol’s granular permissions you can bolster your data loss prevention strategy without impeding on workplace productivity. Simply block unauthorized users from accessing USB devices and use AccessPatrol’s endpoint activity monitoring features to track how authorized personnel are using their USB devices.

All of CurrentWare’s products continue to enforce policies even when managed devices lose connection to the CurrentWare server, allowing users to be monitored and managed when they are working offline or on another network.

AccessPatrol’s Device Permissions

AccessPatrol lets administrators easily control device access permissions for the users and endpoints in their network by assigning Full Access, Read Only, and No Access permissions.

Full Access: The computer with this access permission can read and write to the specified external devices that are connected to the computer.

Read Only: The computer with this access permission can only read the information from the specified external device that is connected to the computer. The user will not be able to copy any information to the specified external device. This option is only available to storage devices.

No Access: The computer with this access permission cannot read or write to the specified external devices that are connected to the computer.

For even greater device control, AccessPatrol includes an Allowed List to whitelist trusted devices and a Device Scheduler to automate changes to access permissions based on a predetermined schedule.

Why use a USB blocker?

As part of a multi-layered data loss prevention strategy you will need access control measures to protect against USB storage devices. AccessPatrol provides the critical security controls you need to prevent employees, guests, and contractors from stealing sensitive data such as personally identifiable information (PII), trade secrets, and financial records.

USB Security: Enforce the exclusive use of authorized USB devices. Combine AccessPatrol’s software-based policies with existing administrative safeguards to prevent employees from using personal USB devices.

Prevent Data Breaches: Flash drives are portable and easy to hide. AccessPatrol’s technical safeguards stop insider threats from transferring sensitive data to all forms of removable media.

Endpoint Security: USB devices can unknowingly infect company computers with ransomware and other malicious software. AccessPatrol protects these endpoints against rogue USB devices by proactively preventing the transmission of data.

Combine this feature with AccessPatrol’s full suite of external device policy management features for full control over how removable media and other peripherals are used in your organization.

Get Started with AccessPatrol Today

Control USB Device Access
Quick & Easy Setup

AccessPatrol’s Endpoint Security Features

Block USB

Block USB

One click to block USB devices completely
Learn More
Block External Devices

Block External Devices

Easily block DVDs, iPods, external hard drives and more from being accessed on your computers
Learn More

Device Permissions

Set full access, read only or no access on storage devices
Learn More

Allowed List

Allow specific storage devices to be always allowed on your network
Learn More


Device Report

Report on devices accessed or blocked on your network
Learn More
Track File Transfers

Log USB File Transfer

Prevent data theft by monitoring files created and deleted on USB devices
Learn More
Deivce Access Code

Access Code Generator

Provide end users with temporary access to their devices
Learn More
Email Alert

Email Alerts

Alert administrators of unauthorized file transfers and devices access
Learn More

Email Reports

Email device reports directly to your administrator's inbox
Learn More

Block Phones

Prevent users from connecting their phones to company computers
Learn More
Block Files

Block File Transfers

Prevent users from transferring restricted file types to their devices
Learn More