Data Security, Privacy, & Compliance
CurrentWare awarded 'Easiest to Do Business With' by G2, fall 2024
CurrentWare received Capterra's 2024 shortlist award
CurrentWare is certified Citrix Ready

CurrentWare’s Controls For Cyber Essentials Compliance

Seeking to become certified to the Cyber Essentials standard? CurrentWare’s solutions help you safeguard your business with advanced awareness and control over computer activity.

  • Essential Cybersecurity Controls
    Address critical cybersecurity gaps to strengthen your security posture
  • Advanced Awareness & Control
    Monitor and restrict user activity to protect your business against malicious and negligent insider threats
  • Software Usage Monitoring
    Ensure no unauthorized apps are being used with granular insights into application usage

Trusted by

Cushing Terrell Logo
Veterans Evaluation Services logo
Morris, Manning, and Martin LLP Logo
Viking Yachts Logo

& many more

Trusted by

Cushing Terrell Logo
Viking Yachts Logo
Bristol Health logo

& many more

How CurrentWare’s Security Solutions Align With Cyber Essentials Compliance Goals

Monitor Activity on Privileged Accounts

Prevent administrator accounts from being used to carry out every day tasks with CurrentWare’s user activity monitoring and restriction capabilities

  • Audit privileged account activity for excessive use
  • Get automated user activity reports in your inbox
  • Proactively restrict access to unnecessary websites to limit exposure to the internet

“Use separate accounts to perform administrative activities only (no emailing, web browsing or other standard user activities that may expose administrative privileges to avoidable risks)”

— Cyber Essentials v3.1 (Montpellier)

Metromont logo

Enforce the Principle of Least Privilege

Leverage CurrentWare’s understanding of user activities to design granular RBAC policies

  • Restrict access to applications, websites, peripheral devices, and more to further enforce user access restrictions
  • Monitor user activity to see who is accessing sensitive applications and websites
  • Assign specific access permissions to user groups based on their job functions

“Provide access to only those applications, computers and networks the user needs to carry out their role”

“Remove or disable special access privileges when no longer required (when a member of staff changes role, for example)”

— Cyber Essentials v3.1 (Montpellier)

Metromont logo

Restrict Access to High-Risk Sites

Enforce internet use policies and improve internet security with granular internet access control policies

  • Block websites based on URLs and content categories
  • Effortlessly block millions of websites across 100+ URL categories
  • Limit internet use to an Allow List for optimal endpoint security

Screenshot of category filtering window from BrowseControl web filter. Porn and social media categories blocked.

Monitor & Control Software Usage

CurrentWare monitors software usage, helping you identify unauthorized applications running on devices.

  • Audit user activity to identify the use of unauthorized software
  • Proactively block the launching of specific applications
  • Prevent the downloading of executable files such as .msi and .exe

“Have you removed any software installed on your devices that is no longer supported and no longer receives regular updates for security problems?”

“Where you are able to do so, have you removed or disabled all the software and services that you do not use”

“Do you ensure that users only install applications that have been approved by your organisation?”

    — Cyber Essentials Question Set (Montpellier)

    Metromont logo

    Ensure the Integrity of Airgapped Devices

    While airgapped computers are protected from internet-based threats, there are still threats such as infected peripherals that need to be mitigated to truly keep them secure.

    • Prevent the use of unauthorized USB storage devices to mitigate the risk of introducing malware to air-gapped systems
    • Restrict network ports, WiFi, and internet access to further enforce airgaps
    • Evaluate user behavior on airgapped systems for potential security threats

    “Software that is not removed from devices when it becomes un-supported will need to be placed onto its own sub-set with no internet access. 

    If the out-of-scope subset remains connected to the internet, you will not be able to achieve whole company certification”

      — Cyber Essentials Question Set (Montpellier)

      Metromont logo

      The Benefits of Cyber Essentials Certification

      Cybersecurity Threats Are on the Rise

       74% of large and 70% of medium businesses in a 2024 DSIT survey reported experiencing a recent cyber attack

      Ensure Business Continuity

      59% of buyers in an Arcserve report said they are likely to avoid companies that suffered from a recent cyberattack

      Build Trust

      70% of consumers believe that businesses aren’t doing enough to keep their personal information secure

      How to Improve Data Security With CurrentWare

      Go beyond the minimum Cyber Essentials compliance requirements with all of the security controls available in the CurrentWare Suite

      Device Blocking window Screenshot of CurrentWare's USB device control software AccessPatrol

      Block & Audit Storage Devices

      Control who can use portable storage devices and set security policies to limit what devices are allowed. Monitor data transfers to removable media and network storage devices to ensure that your data security policies are being followed.

      Data loss prevention cloud storage DLP security tips

      Prevent Data Loss to Cloud Platforms

      Protect sensitive data against the risks of cloud file sharing sites. Block cloud storage sites/apps, restrict uploads/downloads, and monitor file transfers for high-risk or anomalous activity.

      AccessPatrol sensitive file transfers alert

      Audit User Activity for Insider Threat Risks

      Monitor employee computer usage for signs of insider threats. Track file transfers, web browsing, app use, and login/logout times for high-risk, anomalous, or inappropriate activity. Receive automated alerts straight to your inbox when specific events occur.

      Screenshot of AccessPatrol's USB file transfer blocking feature

      Block Data Transfers to Portable Storage & Uploads/Downloads

      Go beyond simply blocking unauthorized devices; ensure optimal data protection with your trusted devices, too. Block file transfers to portable storage devices based on file extension and file name.

      Use the File Filter to prevent the uploading and downloading of specific files such as EXEs. 

       

      Screenshot of BrowseControl's Port Filter for blocking TCP/UDP ports

      Block High-Risk Network Ports

      Block unused TCP/UDP ports to reduce the attack surface of your network. Improve data protection by mitigating the threat of data leakage over FTP, SFTP, IRC, and other high-risk network ports.​

      Screenshot of category filtering window from BrowseControl web filter. Porn and social media categories blocked.

      Block Risky Sites

      BrowseControl’s web content category filtering database provides you with a convenient way to block millions of websites across over 100 URL categories. Easily block users from accessing social media, porn, games, known virus-infected websites, and more!

      CASE STUDY

      Boston Centerless Scales Production & Secures Their Remote Workforce

      CurrentWare has been nothing but supportive of us since we started. This is probably one of the best systems that we’ve ever invested in.

      Once we got CurrentWare installed it opened the door for remote work for us; we could control the equipment and make sure our people were being productive and safe.

      It’s easy to overlook the threat that can arise from within the company, especially when devices are being taken off site. The damage that data breaches can cause is enormous!

      CurrentWare's Key Features

      Internet Off

      User Activity Monitoring

      Track web browsing, software use, search queries, and more

      Remote Screen Capture

      Screenshot Monitoring

      Take automatic screenshots or remotely view desktops

      Application Blocker

      Track Software Usage

      Get insights into software usage trends in your organization

      Stealth

      Transparent & Stealth Modes

      Run silently in the background or provide notice of monitoring

      Block USB

      Block USB & Other Devices

      Set full access, read only or no access on storage devices

      Allowed List

      Device Whitelist

      Allow only authorized storage devices to be used

      Block Files

      Block File Transfers

      Prevent files from being transferred to portable storage

      Reports

      DLP Activity Reports

      Track file transfers, storage device use, file operations, and more

      Internet Off

      Block Websites

      Block websites based on
      URLs & content categories

      Download Filter
      Block Downloads/Uploads

      Prevent uploading and downloading based on file type

      Application Blocker
      Application Blacklisting

      Block specific Windows
      applications from launching

      Internet Off

      PC Power Management

      Remotely track and control PC power states

      Internet Off

      Central Web Console

      Save time with a central admin console; optionally integrate Active
      Directory OUs or security groups

      Internet Off

      Platform Security

      Protect your CurrentWare console
      with 2FA, passwords, privilege
      management, and more

      Internet Off

      Offsite Management

      Extend onsite security policies to computers running outside the corporate network

      Internet Off

      SQL Server Supported

      Database scaled for enterprise and
      large business operations using
      Microsoft SQL Server

      CurrentWare

      Get Started Today
      With a Free Trial

      Fully functional. Easy to use. Install in minutes.

      Learn How to Meet These Compliance Requirements With CurrentWare

      NERC CIP

      Protect TCAs & BCSI From Insider Threats

      Learn More

      ISO 27001

      Increase the Maturity of Your ISO27K ISMS

      Learn More

      NIST logo

      NIST 800-171/53

      Protect Controlled Unclassified Information

      Learn More

      CIPA for Education

      Qualify for the FCC’s
      E-Rate Program

      Learn More

      Cyber Essentials

      Critical Security Controls For Your Assessment

      Learn More

      Cybersecurity Maturity Model Certification CMMC Logo

      CMMC

      Protect CUI to qualify for DoD contracts

      Learn More

      CurrentWare

      Meet Cyber Essentials Compliance With CurrentWare

      Fully functional. Easy to use. Install in minutes.