CurrentWare awarded 'Easiest to Do Business With' by G2, fall 2024
CurrentWare received Capterra's 2024 shortlist award
CurrentWare is certified Citrix Ready

Logo of AccessPatrol USB control and DLP software AccessPatrol
USB Blocking Software to Protect Endpoints & Sensitive Data Against Insider Threats

  • Block Unauthorized USB Devices
  • Monitor File Transfers to Portable Storage
  • Enforce USB Security Policies On Any Network
  • Starting at $5 USD user/month

Trusted by

Cushing Terrell Logo
Veterans Evaluation Services logo
Morris, Manning, and Martin LLP Logo
Viking Yachts Logo

& many more

Trusted by

Cushing Terrell Logo
Viking Yachts Logo
Bristol Health logo

& many more

Prevent the Use of Unauthorized USB Devices

AccessPatrol USB blocking software gives you the features you need to prevent data loss to portable devices.

  • Block USB Storage, HID, Cloud Storage, and More!
    Effortlessly block all unapproved peripheral devices from connecting to USB ports
  • Whitelist Trusted Devices
    Use the Allowed List to whitelist trusted devices for specific users
  • Simple to Use
    Block and unblock USB ports in just a click!
Device Blocking window Screenshot of CurrentWare's USB device control software AccessPatrol
AccessPatrol central web console close up

Manage USB Storage Devices Policies From a Central Console

Block and unblock USB ports and other peripheral ports from a centralized dashboard with an interactive user interface.

  • Role-Based Access Control
    Give trusted team members customized access rights to specific features and groups of users/computers—The admin activity log makes auditing policy updates for compliance purposes simple and intuitive
  • Active Directory Sync
    Import OUs to set policies without the need to manage unwieldy Group Policy Objects
  • Manage Remote Devices
    USB device control policies continue to apply even when endpoints disconnect from the network

Limit Data Transfer Over USB Ports

With AccessPatrol’s USB file transfer blocking feature you can prevent files from being transferred via USB ports based on their filename or extension.

  • Allowed List
    Limit what files can be transferred to storage devices based on file extensions and keywords in filenames
  • Block File Transfers
    Prevent file transfers between storage devices and PCs, even when trusted users use authorized USB drives
  • Renamed File Extension Blocking
    AccessPatrol uses file signatures to detect the original file extension of a file, preventing users from renaming files to bypass your DLP policies
AccessPatrol Block File Transfer Whitelist
Cloud storage server

Prevent Data Loss to Cloud Storage Services

Having sensitive data stored on unmanaged cloud services is a significant risk. Control access to cloud apps and websites with CurrentWare.

  • Block Cloud Services
    Prevent malicious insiders from accessing cloud storage websites and apps
  • Prevent Uploads/Downloads
    Block the downloading and uploading of specific file types
  • File Transfer Tracking
    Track file transfers to/from cloud storage services for evidence of insider threats

Temporarily Bypass Restrictions for USB Storage Devices

Want to temporarily provide unrestricted access to USB devices use on a specific endpoint? Use AccessPatrol’s Access Code Generator to provide a time-limited bypass of AccessPatrol’s device policy settings.

  • Works on remote computers, even without an internet connection
  • Balance security and productivity by providing limited access for edge-cases such as trusted vendors and other third-parties
  • Access codes are single-use, unique to a specific computer, and automatically expire to prevent misuse
Cloud storage server

CASE STUDY

Viking Yachts Stops Departing Employee From Stealing Intellectual Property

CurrentWare saved us a lot of time and money. If we didn’t have them we would have never known what was going on. I cannot thank them enough for this software; being able to audit removable drives is invaluable.

Tennessee College of Applied Technology
Cloud storage file transfers log

Get Advanced Insights Into File Transfers to USBs, Cloud Storage, and More

AccessPatrol’s file activity reports, alerts, and dashboards give you the insights you need to keep your sensitive data safe against theft and misuse

Access Patrol

Try AccessPatrol for Free

Fully functional. Easy to use. Install in minutes.

How to Block USB Devices With AccessPatrol USB Blocking Software

  1. Open the CurrentWare Console
  2. Select the group(s) of computers or users you would like to control.
  3. Under the AccessPatrol tab, select Device Permissions then select the group of users or computers you would like to disable USB devices for.
  4. Under Storage Devices, select USB
  5. Under Access Permissions set the desired level of restriction (Full Access, Read Only, No Access)
  6. Click Apply and then click OK
Free removable media policy template from CurrentWare

FREE DOWNLOAD
Removable Media Policy Template 

Download this data security policy template to prevent data leakage to USB flash drives and other removable storage devices.

  • Set data security standards for portable storage
  • Define the acceptable use of removable media
  • Inform your users about their security responsibilities

AccessPatrol’s USB Control & Data Loss Prevention Features

Block USB

Block USB & Other Devices

Set full access, read only or no access on storage devices

Allowed List

Whitelist USB Devices

Allow only authorized storage devices to be used

Block Files

Block File Transfers

Prevent files from being transferred to portable storage

Deivce Access Code

Access Code Generator

Provide temporary access to peripheral devices

Reports

DLP Activity Reports

Track file transfers, storage device use, file operations, and more

Track File Transfers

File Transfer Monitoring

Monitor files that are copied to USBs, cloud storage, and more

Email Alert

Alerts & Reports

Automatically send USB activity reports to designated inboxes

Stealth

Transparent & Stealth Modes

Run silently in the background or provide notice of monitoring

Internet Off

Centralized Console

Manage all your users from the
centralized console with Active
Directory import or syncing

Internet Off

Platform Security

Protect your CurrentWare console
with 2FA, passwords, privilege
management, and more

Internet Off

Offsite Management

Extend onsite security
policies to laptops running outside
the corporate network

Internet Off

SQL Server Supported

Database scaled for enterprise and
large business operations using
Microsoft SQL Server