CurrentWare

Toronto, Canada
2003
  |  By Guest Contributor
Navigating the line between workplace privacy restrictions and employee rights is getting more complicated as employees shift to hybrid and remote settings. According to Code42’s 2023 Data Exposure Report, data loss caused by business insiders costs companies an average of $16 million per incident. Moreover, 81% of companies believe that hybrid work is one of the main reasons data security training is necessary.
  |  By Dale Strickland
As a CurrentWare customer, these quarterly product updates are included at no additional cost as a part of your subscription. Need help upgrading? Our team is here to assist you every step of the way. We offer comprehensive documentation, training resources, and personalized support to ensure a smooth transition. Should you have any questions or need further assistance, please reach out to our support team.
  |  By Sai Kit Chu
CurrentWare version 9.0.1 is here! This update brings a streamlined Access Code Generator process for AccessPatrol, Bulk URL Reclassification for BrowseReporter and BrowseControl, and new security and quality-of-life updates to the CurrentWare Suite. As always, we recommend keeping your CurrentWare deployment up-to-date to take advantage of the latest functionality, stability, and security developments.
  |  By Dale Strickland
CurrentWare version 9.0 is here! This update introduces Advanced HTTPS transparent packet filtering technology, allowing for significant enhancements to the tracking and restriction capabilities of the CurrentWare Suite. By upgrading to CurrentWare v9.0 you will have greater protection against the data security risks of cloud storage services, potentially malicious file downloads, network share drives, and more!
  |  By Dale Strickland
Experts in the cybersecurity industry are becoming increasingly concerned about artificial intelligence attacks. A 2020 report from Forrester Consulting found that 88% of decision-makers in the security industry believed offensive AI was on the horizon, and almost two-thirds of them expected AI to lead new attacks.
  |  By Guest Contributor
Being a business leader in today’s business environment is no walk in the park. With over 2,200 cybersecurity attacks occurring daily, the task of protecting valuable business data adds an extra layer of complexity to your plate. How do you safeguard your crucial data, ensuring it’s not lost or compromised? You need a comprehensive Data Loss Prevention (DLP) strategy fortified by the best IT security software.
  |  By Guest Contributor
Privileged access management was designed to prevent human errors and reinforce security in general. However, even though this approach has been used for decades, studies still show that human error contributes to 95% of cyber attacks. So what are organizations doing wrong? Are they using privileged data access in the best way possible? Sadly, many companies don’t put much thought into using their security systems correctly, but there is an easy way to fix this.
  |  By Sai Kit Chu
Need a USB blocker to protect sensitive files against theft to portable storage? In this article you will learn why you need to block USB devices and the best USB device management tools to prevent data loss to removable media. Looking for more tools? Check out our list of the best internet filters and the best employee monitoring software Ready to prevent data loss? Get started immediately with a free trial of AccessPatrol, CurrentWare’s USB blocking software.
  |  By Dale Strickland
Are your trade secrets safe against corporate spies? These examples of corporate espionage highlight the great lengths that foreign governments and competing companies will go to to maintain an advantage over their competitors. If you like this article be certain to check out our article on the Worst Examples of Data Theft by Employees. Table of Contents.
  |  By Dale Strickland
Phishing is a constant threat to data and endpoint security. Cybercriminals use phishing attacks to break into accounts, steal company funds, and compromise sensitive data. In this article I will introduce you to the dangers of phishing and guide you through the process of running your very own phishing simulation using BrowseReporter, CurrentWare’s employee computer monitoring software. Table of Contents.
  |  By CurrentWare
Don’t let internet abuse run rampant in your organization. Take back control over web browsing with a free trial of BrowseControl. BrowseControl is an easy-to-use web content filtering software that helps organizations enforce policies, improve productivity, reduce bandwidth consumption, and meet compliance requirements - no matter where their users are located.
  |  By CurrentWare
Don’t let a preventable data leak ruin your organization. Take back control over portable storage devices with a free trial of AccessPatrol USB device control software.
  |  By CurrentWare
CurrentWare version 9.0 is here! This update introduces transparent packet filtering technology, allowing for significant enhancements to the tracking and restriction capabilities of the CurrentWare Suite. By upgrading to CurrentWare v9.0 you will have greater protection against the data security risks of cloud storage services, potentially malicious file downloads, network share drives, and more!
  |  By CurrentWare
Don’t let a preventable data leak ruin your organization. Take back control over portable storage devices with a free trial of AccessPatrol USB device control software.
  |  By CurrentWare
This is a live recording of the CurrentWare version 7.0.1 webinar that took place on June 08, 2022.
  |  By CurrentWare
“CurrentWare saved us a lot of time and money; when the employee was questioned about the data transfer they folded. I cannot thank all of you enough for this software. Being able to audit removable drives is invaluable.” A lot has changed in the world since our first case study interview in 2021 with Vincent (Vinny) Pecoreno, the Network Administrator for Viking Yachts.
  |  By CurrentWare
This video will teach you how to set up two-factor authentication (2FA) in CurrentWare version 7.0.1. Two-factor authentication provides an extra layer of security if anyone other than you attempts to log in to your CurrentWare web console using your account.
  |  By CurrentWare
In this video you will learn how to easily upgrade from the legacy desktop version of the CurrentWare Suite to the new web console. By upgrading to the web console you'll gain access to a variety of new capabilities.
  |  By CurrentWare
This is a live recording of the CurrentWare version 7.0 webinar that took place on March 10, 2022.
  |  By CurrentWare
In this video, we provide an overview of the features available in the CurrentWare suite.

CurrentWare’s user activity monitoring, web filtering, and device control software gives you advanced control and visibility over your entire workforce.

Improve employee productivity, data security, and business intelligence with advanced awareness and control over how technology is used in your organization. Each solution operates from the same central console, allowing you to easily manage the entire CurrentWare Suite from the convenience of a web browser.

Discover Our Products:

  • Employee Monitoring: BrowseReporter is a versatile employee monitoring software to track productivity and efficiency. Easily monitor web browsing and application usage with intuitive user activity reports.
  • Web Filtering: BrowseControl is an easy-to-use website blocking software for restricting internet access. Enforce internet use policies, block distracting websites, and improve internet security with granular internet access control policies.
  • Device Control: AccessPatrol is a data loss prevention and USB control software to protect sensitive data against theft to portable storage devices. Block USB devices and other peripherals to mitigate the threat of USB malware and data leakage.
  • PC Power Manager: enPowerManager is an effective solution for remotely managing PC power policies across an enterprise to conserve energy and reduce costs. With a simple click of the mouse computers can be remotely shutdown or booted automatically at different times during the day.

Intuitive and Flexible Solutions.