top of page

AccessPatrol

Data Loss Prevention - Endpoint Security

access-patrol-block-usb-software.png

Companies around the world are falling victim to data breaches and malware attacks because they are not implementing endpoint security software to protect their computers.

AccessPatrol is a proactive solution for securing company endpoints to prevent the illicit transfer of data and download of malwares from unauthorized devices, resulting in an increase of network security for businesses of all sizes.

  • Protect access to endpoint devices including USBs, phones and iPads

  • Create allowed list of company approved USBs and external hard drives

  • Schedule access privileges at specific times of the day

With an increasing popularity of portable storage devices, theft of proprietary data is be-coming a growing security challenge in today’s computing environments. Portable devices also provide an easy entryway for infecting systems with viruses, spyware, Trojans and other damaging malware, thus compromising an organization’s network.

AccessPatrol, provides a proactive solution for securing company endpoints (USBs, CD/DVDs, Bluetooth, WiFi, FireWire, iPods, MP3s) to prevent illicit transfer of data to unauthorized devices.

  • Manage data leakage and system infection

AccessPatrol manages endpoint device access both on and off the network. Unauthorized access or transfer of data through USB flash drives, CDs, iPods, MP3s, FireWire, WiFi, Bluetooth on all company systems, can be managed centrally through AccessPatrol's web console.

  • Security Levels

Security levels to devices include full access, read only or no access. With a few simple clicks, endpoint security can be readily implemented through the centralized console.

  • Allowed List

While AccessPatrol can restrict access to all endpoint devices, the Allowed List feature restricts access to only company authorized devices of USBs. This minimizes leakage of sensitive data or infection of systems through unapproved or personal employee

  • Offsite Device Management

When a laptop or computer is offsite, AccessPatrol can still manage the security of endpoint devices. If access to blocked devices is legitimately required, then AccessPatrol can be easily configured to grant permissions.

  • Device Usage Reporting

With AccessPatrols comprehensive reporting utility, an organization can address it’s security compliance of mobile and storage devices.

  • Email Reports

For additional analysis of removable device access, make use of the handy email reports function. Schedule a time and date for a report to be sent directly to your inbox.

AccessPatrol Features

email-report.png

Email Reports

Email device reports directly to your administrator's inbox.

block-phone.png
block-sound.png

Block Sound

Disable your sound card to prevent sound to be played.

stealth-mode.png

Stealth Mode

The CurrentWare client runs as stealth mode in the background

remote-client-install.png

Remote Client Install

Easily deploy the CurrentWare Client remotely

offsite-laptops.png

Offsite Management

Monitor remote workers and
offsite staffs

centralized-console.png

Centralized Console

Manage all your users and computers from a centralized Console

database-backup.png

SQL Server Supported

Database scaled for enterprise and large business operations

SYSTEM REQUIREMENTS

SOFTWARE REQUIREMENT

  • Windows 7 SP1 Pro/Enterprise and Ultimate

  • 32-bit or 64-bit

  • Windows 8 & 8.1 Pro/Enterprise 32-bit or 64-bit

  • Windows 10 Home/Pro/Enterprise

  • 32-bit or 64-bit

  • Windows Server 2008 R2, 2012 and 2016

HARDWARE REQUIREMENT
All components of CurrentWare are supported on desktops and servers with the following specs:

  • Processor: Any CPU running i3 or similar or faster

  • Memory: At least 4GB of RAM

  • Disk Space: At least 500MB of disk space

bottom of page