Logo of AccessPatrol USB control and DLP software AccessPatrol
USB Device Control Software —Prevent Employee Data Theft

  • Stop Data Theft to Removable Storage
    Block unauthorized USB storage devices to limit illicit file transfers and protect confidential data
  • USB Activity Dashboards & Reports
    Get advanced insights into peripheral device usage and file operations
  • Protection On Any Network
    USB security policies travel with your devices, keeping sensitive data safe when users leave the network

Trusted by

Cushing Terrell Logo
HBCS Revenue Cycle Logo
HBCS Revenue Cycle Logo
Morris, Manning, and Martin LLP Logo
Viking Yachts Logo

& many more

Trusted by

HBCS Revenue Cycle Logo
VES Veteran Evaluation Services Logo
Viking Yachts Logo

& many more

Intuitive & Flexible USB Blocking Software

Protect sensitive data with AccessPatrol’s device control solutions.

Block or limit the use of a USB port based on storage devices, wireless connectivity, communication ports, imaging devices, and other peripherals.

Device control policies can be uniquely configured for each user, endpoint, and department.

  • Easily block USBs, optical media, mobile devices, SD cards, and other removable media
  • Disable wireless connections through Bluetooth devices, infrared, and WiFi
  • Block employees from using scanners, printers, and cameras to steal sensitive data
Device Blocking window Screenshot of CurrentWare's USB device control software AccessPatrol

Monitor File Activity for Suspicious and High-risk Behaviour

AccessPatrol’s device control features include a file and USB activity monitor for increased visibility into high-risk data transfers.

  • Receive real time email alerts when employees violate your endpoint security policies
  • USB file tracing features allow you to see files that have been copied, created, deleted, or renamed on removable media devices
  • Review activity logs to trace data breaches back to their source

Allow Only Trusted USB Devices to Be Used

AccessPatrol’s device control solutions give you the features you need to ensure data protection against portable devices.

  • Effortlessly block all peripheral devices that fall outside of your allowed devices lists
  • Provide greater USB access to tech support and other trusted users
  • Temporarily grant time-limited access to blocked devices using the Access Code Generator
AccessPatrol's USB allowed list with a list of trusted USB devices
AccessPatrol central web console close up

Centralized USB Management for Scalable Device Control

AccessPatrol’s centralized monitoring and management console lets you implement device control policies from the convenience of a web browser.

  • Precise and Granular Control
    Control portable devices based on groups of users or computers
  • Active Directory Sync
    Use Active Directory sync to import your existing organizational units
  • Protect Remote Devices
    Device control policies travel with laptops, allowing you to easily enforce security policies for remote teams

Restrict File Transfers to Storage Devices

With AccessPatrol’s USB file transfer blocking feature you can prevent files from being transferred to portable storage devices based on their filename or extension.

  • USB Whitelist
    Limit what files can be transferred to storage devices based on file extensions and keywords in filenames
  • Block File Transfers: Prevent file transfers between storage devices and PCs, even on trusted storage devices
  • Renamed File Extension Blocking
    AccessPatrol uses file signatures to detect the original file extension of a file, preventing users from renaming files to bypass your DLP policies
AccessPatrol Block File Transfer Whitelist

CASE STUDY

Viking Yachts Stops Departing Employee From Stealing Intellectual Property

CurrentWare saved us a lot of time and money. If we didn’t have them we would have never known what was going on. I cannot thank them enough for this software; being able to audit removable drives is invaluable.

Tennessee College of Applied Technology

Check Out Our Great Reviews

This software helps us to achieve compliance with industry and government requirements with respect to controlling the use of removable storage media. It fits the bill perfectly.

Matthew W., Project Manager
Aviation & Aerospace Industry, 11-50 employees

In my nearly 40 years in the IT business I’ve worked with a lot of support teams. I really appreciate CurrentWare going the extra mile to help me get the most out of the product. They’ve definitely outweighed any of the other competitors that I’ve looked at.

Jerry Slocum, Managed Services Provider
Haggerty Auto Group, 150-200 Employees

The reports are very easy to understand and the fact that they can  be emailed to you on a schedule is amazing. Customer support has been fantastic every time I've had to reach out to them; I highly recommend them!

Kristen S., Associate IT Director
Specialty Coding Services Broker, 51-1000+ Employees

We have experienced data leaks by dishonest employees in the past and AccessPatrol has helped us avoid them and work with greater security and peace of mind for us and our customers.

Julio V., Head of Information Technology
Financial Services Industry, 10,001+ employees

Expand your capabilities with CurrentWare's award-winning productivity and security software

AccessPatrol’s USB Control & Data Loss Prevention Features

Block USB

Block USB & Other Devices

Set full access, read only or no access on storage devices

Allowed List

Whitelist USB Devices

Allow only authorized storage devices to be used

Block Files

Block File Transfers

Prevent files from being transferred to portable storage

Deivce Access Code

Access Code Generator

Provide temporary access to peripheral devices

Reports

DLP Activity Reports

Track file transfers, storage device use, file operations, and more

Track File Transfers

File Transfer Monitoring

Monitor files that are copied to USBs, cloud storage, and more

Email Alert

Alerts & Reports

Automatically send USB activity reports to designated inboxes

Stealth

Transparent & Stealth Modes

Run silently in the background or provide notice of monitoring

Internet Off

Centralized Console

Manage all your users from the
centralized console with Active
Directory import or syncing

Internet Off

Platform Security

Protect your CurrentWare console
with 2FA, passwords, privilege
management, and more

Internet Off

Offsite Management

Extend onsite security
policies to laptops running outside
the corporate network

Internet Off

SQL Server Supported

Database scaled for enterprise and
large business operations using
Microsoft SQL Server