Data Loss Prevention - Endpoint Security
Companies around the world are falling victim to data breaches and malware attacks because they are not implementing endpoint security software to protect their computers.
AccessPatrol is a proactive solution for securing company endpoints to prevent the illicit transfer of data and download of malwares from unauthorized devices, resulting in an increase of network security for businesses of all sizes.
Protect access to endpoint devices including USBs, phones and iPads
Create allowed list of company approved USBs and external hard drives
Schedule access privileges at specific times of the day
With an increasing popularity of portable storage devices, theft of proprietary data is be-coming a growing security challenge in today’s computing environments. Portable devices also provide an easy entryway for infecting systems with viruses, spyware, Trojans and other damaging malware, thus compromising an organization’s network.
AccessPatrol, provides a proactive solution for securing company endpoints (USBs, CD/DVDs, Bluetooth, WiFi, FireWire, iPods, MP3s) to prevent illicit transfer of data to unauthorized devices.
Manage data leakage and system infection
AccessPatrol manages endpoint device access both on and off the network. Unauthorized access or transfer of data through USB flash drives, CDs, iPods, MP3s, FireWire, WiFi, Bluetooth on all company systems, can be managed centrally through AccessPatrol's web console.
Security levels to devices include full access, read only or no access. With a few simple clicks, endpoint security can be readily implemented through the centralized console.
While AccessPatrol can restrict access to all endpoint devices, the Allowed List feature restricts access to only company authorized devices of USBs. This minimizes leakage of sensitive data or infection of systems through unapproved or personal employee
Offsite Device Management
When a laptop or computer is offsite, AccessPatrol can still manage the security of endpoint devices. If access to blocked devices is legitimately required, then AccessPatrol can be easily configured to grant permissions.
Device Usage Reporting
With AccessPatrols comprehensive reporting utility, an organization can address it’s security compliance of mobile and storage devices.
For additional analysis of removable device access, make use of the handy email reports function. Schedule a time and date for a report to be sent directly to your inbox.
Report on devices accessed or blocked
Provide end users with temporarily access to their endpoints
Email device reports directly to your administrator's inbox.
Disable your sound card to prevent sound to be played.
The CurrentWare client runs as stealth mode in the background
Remote Client Install
Easily deploy the CurrentWare Client remotely
Monitor remote workers and
Manage all your users and computers from a centralized Console
SQL Server Supported
Database scaled for enterprise and large business operations
Windows 7 SP1 Pro/Enterprise and Ultimate
32-bit or 64-bit
Windows 8 & 8.1 Pro/Enterprise 32-bit or 64-bit
Windows 10 Home/Pro/Enterprise
32-bit or 64-bit
Windows Server 2008 R2, 2012 and 2016
All components of CurrentWare are supported on desktops and servers with the following specs:
Processor: Any CPU running i3 or similar or faster
Memory: At least 4GB of RAM
Disk Space: At least 500MB of disk space