Viimeisin kampanjatiedotteemme on ilmestynyt 18.3.24, kts tarkemmat tiedot KAMPANJA-linkistä!

Softa SuperStore

19.03.2024 • • 06:34

Asiakaspalvelu
ark. 10.30 - 16
09 - 3424 370
 

          TUOTEHAKU

 TUOTERYHMÄT

 Muokkaa evästevalintoja
Näytä ostoskori
PÄÄVALIKKO
 
Luotettava Kumppani –yritys
 
Veloitukseton päivitysmuistutuspalvelu!
 
Softa SuperStore - yksi Suomen vahvimmista!

 

CurrentWare AccessPatrol

Business Values
  • Keep our products simple to use with a user friendly interface – but not at the cost of limited functionality.
  • The customer is the foundation of our solutions, we are totally focused on providing excellent customer support and we value their feedback for product improvements.
  • We are driven by innovation, which is critical for our continued success of delivering solutions that are not only highly reliable that but are also cost-effective.
  • At CurrentWare we strive to provide 100% of the functionality of the big corporations, for half a fraction of the cost.

Our locations

We have offices in the USA, Canada, Australia and Asia. We have a master distributor in the UK that distributes our products to the European, Middle-East and African Markets. We are focused to meet the diverse needs of today’s technology demands globally.

Data Loss Prevention - Endpoint Security

Companies around the world are falling victim to data breaches and malware attacks because they are not implementing endpoint security software to protect their computers.

AccessPatrol is a proactive solution for securing company endpoints to prevent the illicit transfer of data and download of malwares from unauthorized devices, resulting in an increase of network security for businesses of all sizes.

  • Restrict Endpoint Devices
  • Report on Endpoint Activity
  • Prevent Malware Attacks
  • Prevent Data Breaches

View AccessPatrol Datasheet

Securing Endpoint Devices

Restrict or permit device access to your computers

Control what type and which specific endpoint devices are able to connect to your computers on your network. Administrators can configure different security levels for each unique endpoint device, giving the ability to customize endpoint device policies for departments and individual employees.

Prevent Data Leakage

Protect your valuable data
Protect your data by controlling who has access to it, how it is handled, and where it is stored. Create an allowed list of authorized endpoint devices and users, and configure modification restrictions for existing files and data. Grant temporary device access to authorized administrators by using the access code generator.

File Transfer Visibility

Investigate file transfer activity on demand
Investigate endpoint activity on your network with the click of a button. Generate reports to investigate and determine where a file or program was modified and gain more insight as to how employees are handling sensitive company data and files.

Generate on demand or schedule reports to be emailed daily or weekly, and search through reports fast with the built-in table of contents and search bar.

Centralized Endpoint Security

Conveniently manage your endpoints
From a centralized console, endpoint security policies can be applied instantly to all endpoint devices and computers on your network. The console is intuitive and easy-to-use for even the most novice of administrators.

Download a Free Trial of AccessPatrol

AccessPatrol Features

Block USB
One Click to block USB devices completely

Block External Devices
Easily block DVDs, iPods, external harddrive and etc from being accessed on your computers.

Device Permissions
Set full access, read only or no access on storage devices

Allowed List
Allow specific storage device to be always allowed on your network

Device Report
Report on devices accessed or blocked

Log USB File Transfer
Prevent data theft by monitoring files created and deleted on USB devices.

Access Code Generator
Provide end users with temporarily access to their endpoints

Email Alerts
Alert administrators of unauthorized file transfers and devices access.

Email Reports
Email device reports directly to your administrator's inbox.

Block Phones
Prevent users to plug their phones into the company's computer.

Devices Scheduler
Schedule device restrictions at specific time of the day

Stealth Mode
The CurrentWare client is running in the background in stealth mode

Centralized Console
Manage all your users and computers from a centralized Console

Remote Client Install
Easily deploy the CurrentWare Client remotely

Offsite Management
Keep device access policy enforced even when laptop is outside the network

SQL Server Supported
Database scaled for enterprise and large business operations

Download AccessPatrol

Block USB and Device Access?

With the rise of portable storage devices and removable media, data theft is becoming an increasing threat to organizations.

Devices such as USB keys, Wi-Fi connections, FireWire ports, Bluetooth devices, iPod, mobile phones and MP3 players are connecting seamlessly to the company networks. Most IT administrators have no control over the connection of these portable storage devices, leaving company confidential information exposed.

Access Patrol provides a comprehensive solution for securing company computers to restrict unauthorized access from personal external storage media to steal your company's proprietary information.

System Requirements:
  • Compatible on any Windows OS

Other related products:



BrowseControl from CurrentWare is an Internet management program that enforces Internet usage policies across your enterprise. Use BrowseControl to completely block the Internet, allow access to authorised web sites, block offensive sites, schedule access to the Internet during specific times of the day/week - all conveniently from a central console.

Also included is an Application Blocker, which restricts users from running unauthorized programs such as games, messaging programs, P2P applications etc.



BrowseReporter is a powerful web-monitoring tool that allows you to monitor the browsing activity of your employees or students. It is a non-intrusive tool, running in stealth mode, without the users knowing that their systems are being monitored.

BrowseReporter captures the URLs of every visited web site. It includes a powerful reporting utility for generating tabular and graphical reports. URLS deemed to be a threat to the organization can readily be identified from the reports. In addition, unproductive employee spending too much company time browsing the net can readily be isolated.

Creating an effective energy conservation policy is a financial and environmental priority for organizations today. Computers that are left running unnecessarily after work hours are both a drain to the pocket book and the carbon footprint. Administrators are therefore, turning to more effective solutions for managing energy consumption in the workplace.

enPowerManager provides an effective method for energy management across an enterprise. With a simple click of the mouse, computers can be remotely shutdown or booted. This function can also be scheduled to force a shutdown of the computers at a specific time or schedule a boot of the computers at the beginning of a work day.

Conserve energy, reduce costs, and help protect the environment—all from the central CurrentWare console.

CurrentWare Suite includes the following solutions: Internet Access Control, Internet Usage Monitoring, Endpoint Security and Power Management Solutions

Softa SuperStore
Softa SuperStore
Softa SuperStore