Data Loss Prevention and Endpoint Management

Manage Data Leakage and Data Loss Prevention

Prevent USB Drive Access

Centralized Endpoint Security

Device Access Control

accesspatrol
SECURING ENDPOINT DEVICES

With the rise of portable storage devices and removable media, data theft is becoming an increasing threat to organizations. Devices such as USB keys, Wi-Fi connections, FireWire ports, Bluetooth devices, iPod, mobile phones and MP3 players are connecting seamlessly to the company networks. Most IT administrators have no control over the connection of these portable storage devices, leaving company confidential information exposed. 

Access Patrol provides a comprehensive solution for securing company computers to restrict unauthorized access from personal external storage media to steal your company’s proprietary information.

Control External Device access

AccessPatrol manages endpoint device access both on and off the network. Unauthorised access or transfer of data can be managed centrally through AccessPatrol’s web console.

Set Different Security Levels

The AccessPatrol reporting utility addresses an organization’s security compliance of mobile and storage devices. It serves as an effective tool for analyzing removable device usage and policy enforcement.

Centralized Security Management

From a centralised web console, endpoint security can be applied to all device entry points across the company. The web based console can be accessed by authorised administrators from any location.

Key Features

Device Reports

The AccessPatrol reporting utility addresses an organization’s security compliance of mobile and storage devices. It serves as an effective tool for analyzing removable device usage and policy enforcement.

Allowed List

With AccessPatrol, you have the freedom to select which devices to block, and which ones to allow. Create a list of company authorized devices by simply adding them to the allowed list.

remote Install

Get up and running fast with AccessPatrol’s remote installation feature. Have your PC’s equipped with AccessPatrol’s client agent most efficiently by installing it remotely on your machines.

Email reports

Manage your endpoint device policies with efficiency by having our detailed device reports delivered directly to your inbox.

Offsite Management

Rest assured that company devices and sensitive information is secured even when a device leaves the company network.

Device Scheduler

AccessPatrol’s scheduling feature can pinpoint the exact days and times that you want to restrict access to endpoint devices.