Viimeisin kampanjatiedotteemme on ilmestynyt 2.12.19, kts tarkemmat tiedot KAMPANJA-linkistä!

Softa SuperStore

15.12.2019 • • 07:47

Asiakaspalvelu
ark. 10.30 - 16
09 - 3424 370
 

              TUOTEHAKU

 TUOTERYHMÄT
Powered by
DataCenter Finland Oy

Näytä ostoskori
PÄÄVALIKKO
 
Luotettava Kumppani –yritys
 
Softa SuperStore - yksi Suomen vahvimmista!

 

CurrentWare AccessPatrol

Endpoint Device Security
  • Protect access to endpoint devices including USB’s, Bluetooth and iPods
  • Create allowed list of company approved USB’s and external hard drives
  • Schedule access privileges at specific times of the day

With an increasing popularity of portable storage devices, theft of proprietary data is becoming a growing security challenge in today’s computing environments. Portable devices also provide an easy entryway for infecting systems with viruses, spyware, Trojans and other damaging malware, thus compromising an organization’s network.

AccessPatrol, provides a proactive solution for securing company endpoints (USBs, CD/DVDs, BlueTooth, WiFi, FireWire, iPods, MP3s) to prevent illicit transfer of data to unauthorized devices.

View AccessPatrol Datasheet

Overview:

Manage data leakage and system infection
AccessPatrol manages endpoint device access both on and off the network. Unauthorized access or transfer of data through USB flash drives, CDs, iPods, MP3s, FireWire, WiFi, Bluetooth on all company systems, can be managed centrally through AccessPatrol's web console.

Security Levels
Security levels to devices include full access, read only or no access. With a few simple clicks, endpoint security can be readily implemented through the centralized console. The web based console, provides the additional benefit of being able to access the console from any location.

Offsite Device Management
When a laptop or computer is offsite, AccessPatrol can still manage the security of endpoint devices. If access to blocked devices is legitimately required, then AccessPatrol can be easily configured to grant permissions.

Allowed List
While AccessPatrol can restrict access to all endpoint devices, the Allowed List feature restricts access to only company authorized devices of USBs, FireWire and External Hard Drives. This minimizes leakage of sensitive data or infection of systems through unapproved or personal employee devices.

Additional Device Support
AccessPatrol now supports the blocking/unblocking of iPhones and SD/MM Card slots.

Download a Free Trial of AccessPatrol

Features:

1. Manage data leakage and system infection

AccessPatrol manages endpoint device access both on and off the network. Unauthorized access or transfer of data through USB flash drives, CDs, iPods, MP3s, FireWire, WiFi, Bluetooth on all company systems, can be managed centrally through AccessPatrol’s web console. The web based management console, gives administrators the added flexibility of remotely implementing endpoint security.

AccessPatrol manages the security of the following types of devices:

Storage Devices:
  • USB (Removable disk, iPod)
  • CD/DVD
  • Floppy
  • Tape
  • External Hard Drives
  • Firewire
  • SD Card
  • MM Card
Wireless Devices:
  • Bluetooth
  • Infrared
  • Wi-Fi

Communication Ports

  • Serial
  • Parallel

Other Devices

  • Imaging Devices (Digital Camera, Webcam and Scanner)
  • Portable Devices (iPhone, Mobile Phones)
  • Sound Cards


2. Set Security Levels

With a few simple clicks, endpoint security can be readily implemented through the centralized console. The web based console, provides the additional benefit of being able to access the console from any location.

3. Endpoint Device Reporter

The AccessPatrol reporting utility addresses an organization’s security compliance of mobile and storage devices. It serves as an effective tool for analyzing removable device usage and policy enforcement. Effectively identify employees that frequently abuse the endpoint device policies. Through the intuitive reporting tool, generate comprehensive reports highlighting device usage by computer or by user.

The AccessPatrol reports are clear and easy to understand, ranging from executive level summaries to drill down detailed reports for administrators. The reports include:

  • All Devices Accessed
  • Allowed Devices
  • Blocked Devices
  • Allowed vs. Denied Access

4. Email Reports Automatically

Endpoint Device Reports can be automatically generated and emailed to the administrator or a distribution list on a scheduled basis.  

5. Offsite Device Management

By default, the endpoint security of systems that are offline or offsite will still be managed by the AccessPatrol policies. Offsite laptops/computers that need to have access to blocked devices can be configured easily to allow access to these devices. 

6. Allowed List

Total blockage of all endpoint devices may be the choice of security, however, there may be times when specific users may need access to some devices. For example the IT team would need CD/DVD access to install software, the marketing department may need USB flash access to store presentations etc.c.

Through the Allowed List feature, permission policies of authorized devices can be assigned to specific users. Depending on the device type, permissions of read, write or no access can be assigned to the users. This minimizes leakage of sensitive data or infection of systems through unapproved or personal employee devices.

Devices that are added to the Allowed List can allow users access to only company authorized devices. Users would have read/write privileges to those devices listed under the Allowed List. 

7. Scheduler

Users can be assigned access to devices at specific times. Through the Scheduler feature, access privileges can be allocated for all or specific devices. 

8. Remote Client Install

AccessPatrol clients can be pushed out remotely from the Console, thereby eliminating the need to visit individual clients.

Download AccessPatrol

We help businesses improve productivity:

  • Totally block access to any portable devices such as USBs, CDs, DVDs, iPods, MP3 players, WiFi, FireWire, Bluetooth etc., thus reducing any incidences of confidential data leakage or virus infections of the network.
  • Through the Allowed List, permit use of only company authorized USBs, FireWire and External Hard Drive devices.
  • Assign security levels of full access, read mode or no access.
  • Allow use of specific portable devices at allocated day/time slots, through the Scheduler.
  • Control which Groups or PCs, have permissions to access the endpoint devices.
  • Prevent unauthorized administrative users from stopping or uninstalling the AccessPatrol client service.
  • AccessPatrol policies apply to both on site and offsite systems. Even when laptops are not connected to the central network, access permissions to endpoint devices are still maintained.
System Requirements:
AccessPatrol is compatible with the following operating systems.
  • Windows 8* Professional, Enterprise and Ultimate

  • Windows 7* Professional, Enterprise and Ultimate

  • Windows XP* Professional

  • Windows Server 2003/2008 R2

  • Windows Vista*

*Both 32-bit and 64-bit operating systems are supported. Not tested on Home edition operating systems
 



To use the AccessPatrol Solution, you must install the CurrentWare Server, Console and Clients.

CurrentWare can be installed on most Windows workstations and servers. Here are the system requirements for CurrentWare.

CW Server and CW Console
  • Windows 8

  • Windows 7

  • Windows XP

  • Windows Server (2003/2008/2012)

  • Windows Vista

CW Client
  • Windows 8

  • Windows 7

  • Windows XP

  • Windows Server (2003/2008/2012)

  • Windows Vista

Other related products:



BrowseControl from CurrentWare is an Internet management program that enforces Internet usage policies across your enterprise. Use BrowseControl to completely block the Internet, allow access to authorised web sites, block offensive sites, schedule access to the Internet during specific times of the day/week - all conveniently from a central console.

Also included is an Application Blocker, which restricts users from running unauthorized programs such as games, messaging programs, P2P applications etc.



BrowseReporter is a powerful web-monitoring tool that allows you to monitor the browsing activity of your employees or students. It is a non-intrusive tool, running in stealth mode, without the users knowing that their systems are being monitored.

BrowseReporter captures the URLs of every visited web site. It includes a powerful reporting utility for generating tabular and graphical reports. URLS deemed to be a threat to the organization can readily be identified from the reports. In addition, unproductive employee spending too much company time browsing the net can readily be isolated.

Creating an effective energy conservation policy is a financial and environmental priority for organizations today. Computers that are left running unnecessarily after work hours are both a drain to the pocket book and the carbon footprint. Administrators are therefore, turning to more effective solutions for managing energy consumption in the workplace.

enPowerManager provides an effective method for energy management across an enterprise. With a simple click of the mouse, computers can be remotely shutdown or booted. This function can also be scheduled to force a shutdown of the computers at a specific time or schedule a boot of the computers at the beginning of a work day.

Conserve energy, reduce costs, and help protect the environment—all from the central CurrentWare console.

CurrentWare Suite includes the following solutions: Internet Access Control, Internet Usage Monitoring, Endpoint Security and Power Management Solutions

Softa SuperStore
Softa SuperStore
Softa SuperStore