Trusted by
& many more
Trusted by
& many more
Prevent the Use of Unauthorized USB Devices
AccessPatrol USB blocking software gives you the features you need to prevent data loss to portable devices.
- Block USB Storage, HID, Cloud Storage, and More!
Effortlessly block all unapproved peripheral devices from connecting to USB ports - Whitelist Trusted Devices
Use the Allowed List to whitelist trusted devices for specific users - Simple to Use
Block and unblock USB ports in just a click!
Manage USB Storage Devices Policies From a Central Console
Block and unblock USB ports and other peripheral ports from a centralized dashboard with an interactive user interface.
- Role-Based Access Control
Give trusted team members customized access rights to specific features and groups of users/computers—The admin activity log makes auditing policy updates for compliance purposes simple and intuitive - Active Directory Sync
Import OUs to set policies without the need to manage unwieldy Group Policy Objects - Manage Remote Devices
USB device control policies continue to apply even when endpoints disconnect from the network
Limit Data Transfer Over USB Ports
With AccessPatrol’s USB file transfer blocking feature you can prevent files from being transferred via USB ports based on their filename or extension.
- Allowed List
Limit what files can be transferred to storage devices based on file extensions and keywords in filenames - Block File Transfers
Prevent file transfers between storage devices and PCs, even when trusted users use authorized USB drives - Renamed File Extension Blocking
AccessPatrol uses file signatures to detect the original file extension of a file, preventing users from renaming files to bypass your DLP policies
Prevent Data Loss to Cloud Storage Services
Having sensitive data stored on unmanaged cloud services is a significant risk. Control access to cloud apps and websites with CurrentWare.
- Block Cloud Services
Prevent malicious insiders from accessing cloud storage websites and apps - Prevent Uploads/Downloads
Block the downloading and uploading of specific file types - File Transfer Tracking
Track file transfers to/from cloud storage services for evidence of insider threats
Temporarily Bypass Restrictions for USB Storage Devices
Want to temporarily provide unrestricted access to USB devices use on a specific endpoint? Use AccessPatrol’s Access Code Generator to provide a time-limited bypass of AccessPatrol’s device policy settings.
- Works on remote computers, even without an internet connection
- Balance security and productivity by providing limited access for edge-cases such as trusted vendors and other third-parties
- Access codes are single-use, unique to a specific computer, and automatically expire to prevent misuse
Get Advanced Insights Into File Transfers to USBs, Cloud Storage, and More
AccessPatrol’s file activity reports, alerts, and dashboards give you the insights you need to keep your sensitive data safe against theft and misuse
How to Block USB Devices With AccessPatrol USB Blocking Software
- Open the CurrentWare Console
- Select the group(s) of computers or users you would like to control.
- Under the AccessPatrol tab, select Device Permissions then select the group of users or computers you would like to disable USB devices for.
- Under Storage Devices, select USB
- Under Access Permissions set the desired level of restriction (Full Access, Read Only, No Access)
- Click Apply and then click OK
FREE DOWNLOAD
Removable Media Policy Template
Download this data security policy template to prevent data leakage to USB flash drives and other removable storage devices.
- Set data security standards for portable storage
- Define the acceptable use of removable media
- Inform your users about their security responsibilities
AccessPatrol’s USB Control & Data Loss Prevention Features
Block USB & Other Devices
Set full access, read only or no access on storage devices
Whitelist USB Devices
Allow only authorized storage devices to be used
Block File Transfers
Prevent files from being transferred to portable storage
Access Code Generator
Provide temporary access to peripheral devices
DLP Activity Reports
Track file transfers, storage device use, file operations, and more
File Transfer Monitoring
Monitor files that are copied to USBs, cloud storage, and more
Alerts & Reports
Automatically send USB activity reports to designated inboxes
Transparent & Stealth Modes
Run silently in the background or provide notice of monitoring
Centralized Console
Manage all your users from the
centralized console with Active
Directory import or syncing
Platform Security
Protect your CurrentWare console
with 2FA, passwords, privilege
management, and more
Offsite Management
Extend onsite security
policies to laptops running outside
the corporate network
SQL Server Supported
Database scaled for enterprise and
large business operations using
Microsoft SQL Server