ACCESS PATROL

The Endpoint Security Solution
With the necessity and popularity of portable storage devices, theft of proprietary data is a growing security challenge in today’s world of digital storage. Portable devices also provide an easy entryway for infecting systems with viruses, spyware, Trojans and other damaging malware that could potentially compromise an entire organization’s network.
AccessPatrol provides a proactive and efficient solution for securing company endpoints (USBs, CD/DVDs, BlueTooth devices, WiFi, iPods, etc) to prevent the illicit transfer of data to unauthorized devices.

shadowBottom

Manage data leakage and system infection
AccessPatrol manages endpoint device access both on and off the network. Unauthorized access or transfer of data through USB flash drives, CDs, iPods, MP3s, FireWire, WiFi, Bluetooth on all company systems, can be managed centrally through AccessPatrol’s web console.
The web based management console, gives administrators the added flexibility of remotely implementing endpoint security.
AccessPatrol manages the security of the following types of devices:
Storage Devices:
• USB (Removable disk, iPod)
• CD/DVD
• Floppy
• Tape
• External Hard Drives
• Firewire
• SD Card
• MM Card
Wireless Devices:
• Bluetooth
• Infrared
• Wi-Fi
Communication Ports
• Serial
• Parallel
Other Devices
• Imaging Devices (Digital Camera, Webcam and Scanner)
• Portable Devices (iPhone, Mobile Phones)
• Sound Cards

Set Security Levels
With a few simple clicks, endpoint security can be readily implemented through the centralized console. The web based console, provides the additional benefit of being able to access the console from any location.

Endpoint Device Reporter
The AccessPatrol reporting utility addresses an organization’s security compliance of mobile and storage devices. It serves as an effective tool for analyzing removable device usage and policy enforcement. Effectively identify employees that frequently abuse the endpoint device policies. Through the intuitive reporting tool, generate comprehensive reports highlighting device usage by computer or by user.
The AccessPatrol reports are clear and easy to understand, ranging from executive level summaries to drill down detailed reports for administrators. The reports include:
• All Devices Accessed
• Allowed Devices
• Blocked Devices
• Allowed vs. Denied Access

Email Reports Automatically
Endpoint Device Reports can be automatically generated and emailed to the administrator or a distribution list on a scheduled basis.

Offsite Device Management
By default, the endpoint security of systems that are offline or offsite will still be managed by the AccessPatrol policies. Offsite laptops/computers that need to have access to blocked devices can be configured easily to allow access to these devices.

Allowed List
Total blockage of all endpoint devices may be the choice of security, however, there may be times when specific users may need access to some devices. For example the IT team would need CD/DVD access to install software, the marketing department may need USB flash access to store presentations etc.
Through the Allowed List feature, permission policies of authorized devices can be assigned to specific users. Depending on the device type, permissions of read, write or no access can be assigned to the users. This minimizes leakage of sensitive data or infection of systems through unapproved or personal employee devices.
Devices that are added to the Allowed List can allow users access to only company authorized devices. Users would have read/write privileges to those devices listed under the Allowed List.

Scheduler
Users can be assigned access to devices at specific times. Through the Scheduler feature, access privileges can be allocated for all or specific devices.

Remote Client Install
AccessPatrol clients can be pushed out remotely from the Console, thereby eliminating the need to visit individual clients.

shadowBottom

Device Reports
The AccessPatrol reporting utility addresses an organization.s security compliance of mobile and storage devices.
It serves as an effective tool for analyzing removable device usage and policy enforcement. Effectively identify employees that frequently abuse the endpoint device policies. Through the intuitive reporting tool, generate comprehensive reports highlighting device usage by computer or by user.
The AccessPatrol reports are clear and easy to understand, ranging from executive level summaries to drill down detailed reports for administrators. The reports include:
• All Devices Accessed
• Allowed Devices
• Blocked Devices
• Allowed vs. Denied Access
• Top N Active Machines

shadowBottom

We help businesses improve productivity
• Totally block access to any portable devices such as USBs, CDs, DVDs, iPods, MP3 players, WiFi, FireWire, Bluetooth etc., thus reducing any incidences of confidential data leakage or virus infections of the network.
• Through the Allowed List, permit use of only company authorized USBs, FireWire and External Hard Drive devices.
• Assign security levels of full access, read mode or no access.
• Allow use of specific portable devices at allocated day/time slots, through the Scheduler.
• Control which Groups or PCs, have permissions to access the endpoint devices.
• Prevent unauthorized administrative users from stopping or uninstalling the AccessPatrol client service.
• AccessPatrol policies apply to both on site and offsite systems. Even when laptops are not connected to the central network, access permissions to endpoint devices are still maintained.