Download (77.52MB)

AccessPatrol (64-bit) About

AccessPatrol (64-bit) Specifications
Version:
5.4.200
File size:
77.52MB
Date added:
Dec. 22, 2019
Date released:
Oct. 4, 2019
Price:
Free to try
Operating system:
Windows XP/2003/Vista/Server 2008/7/8/Server 2016/10,
Downloads last week:
203
Additional Requirements
None

AccessPatrol (64-bit) v5.4.200

Protect access to endpoint devices and prevent theft of company data.

AccessPatrol (64-bit) Screenshots


AccessPatrol (64-bit) Editor's review

AccessPatrol is a proactive solution for securing company endpoints to prevent the illicit transfer of data and download of malware from unauthorized devices, resulting in an increase of network security for businesses of all sizes. Control what type and which specific endpoint devices are able to connect to your computers on your network. Administrators can configure different security levels for each unique endpoint device, giving the ability to customize endpoint device policies for departments and individual employees.

Protect your data by controlling who has access to it, how it is handled, and where it is stored. Create an allowed list of authorized endpoint devices and users, and configure modification restrictions for existing files and data. Grant temporary device access to authorized administrators by using the access code generator. Investigate endpoint activity on your network with the click of a button. Generate reports to investigate and determine where a file or program was modified and gain more insight as to how employees are handling sensitive company data and files. Generate on-demand or schedule reports to be emailed daily or weekly, and search through reports fast with the built-in table of contents and search bar.


Download (77.52MB)






Similar Suggested Software

Enforce device protection policies on organization computers.

Protect your PC against the latest security threats.

Protect your system and all removable media against viruses, Trojans, and spyware.

Detect IDS and prevent IPS to protect networks from unauthorized network connections.

Control access to devices on a local computer and network protocols and prevent data leaks.

Preserve your desired computer configuration and settings.