Endpoint Device Security
- Protect access to endpoint devices including USB’s, Bluetooth
- Create allowed list of company approved USB’s and external hard
- Schedule access privileges at specific times of the day
With an increasing popularity of portable storage devices, theft of proprietary data is becoming a growing security challenge in today’s computing environments. Portable devices also provide an easy entryway for infecting systems with viruses, spyware, Trojans and other damaging malware, thus compromising an organization’s network.
AccessPatrol, provides a proactive solution for securing company endpoints (USBs, CD/DVDs, BlueTooth, WiFi, FireWire, iPods, MP3s) to prevent illicit transfer of data to unauthorized devices.
View AccessPatrol Datasheet
Manage data leakage and system infection
AccessPatrol manages endpoint device access both on and off the network. Unauthorized access or transfer of data through USB flash drives, CDs, iPods, MP3s, FireWire, WiFi, Bluetooth on all company systems, can be managed centrally through AccessPatrol's web console.
Security levels to devices include full access, read only or no access. With a few simple clicks, endpoint security can be readily implemented through the centralized console. The web based console, provides the additional benefit of being able to access the console from any location.
Offsite Device Management
When a laptop or computer is offsite, AccessPatrol can still manage the security of endpoint devices. If access to blocked devices is legitimately required, then AccessPatrol can be easily configured to grant permissions.
While AccessPatrol can restrict access to all endpoint devices, the Allowed List feature restricts access to only company authorized devices of USBs, FireWire and External Hard Drives. This minimizes leakage of sensitive data or infection of systems through unapproved or personal employee devices.
Additional Device Support
AccessPatrol now supports the blocking/unblocking of iPhones and SD/MM Card slots.
Download a Free
Trial of AccessPatrol
leakage and system infection
manages endpoint device access both on and
off the network. Unauthorized access or
transfer of data through USB flash drives,
CDs, iPods, MP3s, FireWire, WiFi, Bluetooth
on all company systems, can be managed
centrally through AccessPatrol’s web
console. The web based
management console, gives administrators the
added flexibility of remotely implementing
manages the security of the following types
(Removable disk, iPod)
External Hard Drives
Devices (Digital Camera, Webcam and
Devices (iPhone, Mobile Phones)
Set Security Levels
few simple clicks, endpoint security can
be readily implemented through the
centralized console. The web based
console, provides the additional benefit
of being able to access the console from
Endpoint Device Reporter
AccessPatrol reporting utility addresses an
organization’s security compliance of mobile
and storage devices. It serves as an
effective tool for analyzing removable
device usage and policy enforcement.
Effectively identify employees that
frequently abuse the endpoint device
policies. Through the intuitive reporting
tool, generate comprehensive reports
highlighting device usage by computer or by
AccessPatrol reports are clear and easy to
understand, ranging from executive level
summaries to drill down detailed reports for
administrators. The reports include:
vs. Denied Access
Device Reports can be automatically
generated and emailed to the administrator
or a distribution list on a scheduled basis.
Offsite Device Management
default, the endpoint security of
systems that are offline or offsite will
still be managed by the AccessPatrol
policies. Offsite laptops/computers that
need to have access to blocked devices
can be configured easily to allow access
to these devices.
blockage of all endpoint devices may be
the choice of security, however, there
may be times when specific users may
need access to some devices. For example
the IT team would need CD/DVD access to
install software, the marketing
department may need USB flash access to
store presentations etc.c.
the Allowed List feature, permission
policies of authorized devices can be
assigned to specific users. Depending on
the device type, permissions of read,
write or no access can be assigned to
the users. This minimizes leakage of
sensitive data or infection of systems
through unapproved or personal employee
that are added to the Allowed List can
allow users access to only company
authorized devices. Users would have
read/write privileges to those devices
listed under the Allowed List.
be assigned access to devices at
specific times. Through the Scheduler
feature, access privileges can be
allocated for all or specific devices.
Remote Client Install
AccessPatrol clients can be pushed out
remotely from the Console, thereby
eliminating the need to visit individual
businesses improve productivity:
access to any portable devices such as USBs,
CDs, DVDs, iPods, MP3 players, WiFi,
FireWire, Bluetooth etc., thus reducing any
incidences of confidential data leakage or
virus infections of the network.
Allowed List, permit use of only company
authorized USBs, FireWire and External Hard
levels of full access, read mode or no
Allow use of
specific portable devices at allocated
day/time slots, through the Scheduler.
Groups or PCs, have permissions to access
the endpoint devices.
unauthorized administrative users from
stopping or uninstalling the AccessPatrol
policies apply to both on site and offsite
systems. Even when laptops are not connected
to the central network, access permissions
to endpoint devices are still maintained.
compatible with the following operating
8* Professional, Enterprise and Ultimate
7* Professional, Enterprise and Ultimate
Server 2003/2008 R2
and 64-bit operating systems are supported.
Not tested on Home edition operating systems
To use the AccessPatrol Solution, you must
Console and Clients.
CurrentWare can be
installed on most
and servers. Here
are the system
Other related products:
BrowseControl from CurrentWare is an Internet management program that enforces Internet usage policies across your enterprise. Use BrowseControl to completely block the Internet, allow access to authorised web sites, block offensive sites, schedule access to the Internet during specific times of the day/week - all conveniently from a central console.
Also included is an Application Blocker, which restricts users from running unauthorized programs such as games, messaging programs, P2P applications etc.
BrowseReporter is a powerful web-monitoring tool that allows you to monitor the browsing activity of your employees or students. It is a non-intrusive tool, running in stealth mode, without the users knowing that their systems are being monitored.
BrowseReporter captures the URLs of every visited web site. It includes a powerful reporting utility for generating tabular and graphical reports. URLS deemed to be a threat to the organization can readily be identified from the reports. In addition, unproductive employee spending too much company time browsing the net can readily be isolated.
Creating an effective energy conservation policy is a financial and environmental priority for organizations today. Computers that are left running unnecessarily after work hours are both a drain to the pocket book and the carbon footprint. Administrators are therefore, turning to more effective solutions for managing energy consumption in the workplace.
enPowerManager provides an effective method for energy management across an enterprise. With a simple click of the mouse, computers can be remotely shutdown or booted. This function can also be scheduled to force a shutdown of the computers at a specific time or schedule a boot of the computers at the beginning of a work day.
Conserve energy, reduce costs, and help protect the environment—all from the central CurrentWare console.
CurrentWare Suite includes the following solutions: Internet Access Control, Internet Usage Monitoring, Endpoint Security and Power Management Solutions