Product - Endpoint Data Leakage Prevention Solution....Access Patrol

With an increasing popularity of portable storage devices, theft of proprietary data is becoming a growing security challenge in today’s computing environments. Portable devices also provide an easy entryway for infecting systems with viruses, spyware, Trojans and other damaging malware, thus compromising an organization’s network.

AccessPatrol, provides a proactive solution for securing company endpoints (USBs, CD/DVDs, BlueTooth, WiFi, FireWire, iPods, MP3s) to prevent illicit transfer of data to unauthorized devices.

Prevent Data Theft
Restrict leakage of proprietary data to vulnerable endpoints such as USBs, CDs, iPods, MP3s, BlueTooth etc. with minimal administration.
Reporting & Analysis Tool
Easily generate device usage reports through an intuitive reporting manager. Identify endpoint security breaches on a per computer or per user basis.
Reduce System Infections
Protect the introduction of malicious software and viruses by securing the entry way of portable devices, thus minimizing the threat of compromising an organization’s network.
Allowed List
Authorize access to only company approved USB devices and external hard drives through the Allowed List to prevent the access of personal devices onto the network.
Manage access to devices through a scheduler. Assign “full access”, “read” or “no access” privileges by date/time.
Manage Device Offsite
Apply endpoint device policies to offsite workstations/laptops, ensuring that remote users do not compromise the security of proprietary information through the local endpoints.
We help businesses improve productivity
Totally block access to any portable devices such as USBs, CDs, DVDs, iPods, MP3 players, WiFi, FireWire, Bluetooth etc., thus reducing any incidences of confidential data leakage or virus infections of the network.
Through the Allowed List, permit use of only company authorized USBs, FireWire and External Hard Drive devices.
Assign security levels of full access, read mode or no access.
Allow use of specific portable devices at allocated day/time slots, through the Scheduler.
Control which Groups or PCs, have permissions to access the endpoint devices.
Prevent unauthorized administrative users from stopping or uninstalling the AccessPatrol client service.
AccessPatrol policies apply to both on site and offsite systems. Even when laptops are not connected to the central network, access permissions to endpoint devices are still maintained.

Client Speak
Instant Touch Base