To order under the Department of
Homeland Security BPA, please contact:
Direct | 240-280-8056
Phone | 800-634-0255 x216
Email | email@example.com
Direct | 240-280-8043
Phone | 800-634-0255 x203
For technical questions about
these products, please contact:
Kanguru’s Remote Management for Enterprise offers powerful, easy-to-use security features designed to remotely manage one, or an entire fleet of secure Kanguru Defender USB devices. With remote management, your hardware encrypted flash drives meet stringent government, healthcare and financial industry standards by being able to:
• Track And Manage USB Drives Worldwide
• Disable / Delete Lost Or Stolen Devices
• Set Up Online & Offline Permissions
• Notify Users And Roll Out Policy Updates
• Schedule Password Changes
• Restrict Drives To Trusted IP Address(es)
Full Product Description
Kanguru’s Remote Management Console (KRMC)™ for Enterprise offers a powerful, easy-to-use security application designed to remotely manage one, or an entire fleet of secure Kanguru Defender USB devices. With KRMC, a security officer or administrator can enforce, verify, and audit security policies from a central enterprise server or web interface to its devices from anywhere in the world, making KRMC Enterprise the perfect solution for any organization to comply with even the most stringent of security regulations.
A Kanguru drive configured with KRMC will automatically connect to a remote server when the device is plugged in. The drive checks for pending actions, messages and software updates even before the user logs in. KRMC also allows an administrator to quickly locate a particular drive anywhere in the world. This powerful tool can help organizations be in compliance, and significantly reduce the risk of a data breach.
KRMC is designed to work with Kanguru Defender 2000™, Defender Elite™, and Defender V2™ Flash Drives, as well as Defender HDD™ and Defender SSD™.
When a supported Kanguru USB secure device is connected to a computer with a network or internet connection, an administrator will be able to view detailed information and activity reports about the device. KRMC allows the administrator to monitor where the device is connected and the hostname of the computer. If the administrator has chosen to delete a device's data, the audit function will verify when the remote deletion occurs. An administrator can export audit logs, allowing compatibility with applications such as Excel and databases. User and administrator activities can be logged for various regulatory compliance.
Additional security is available when KRMC is combined with Kanguru USB Device Control, adding endpoint security to control which devices are allowed to access your workstations or network. When used together, they create a turn-key solution with unmatched security at a fraction of the cost of a la carte solutions.
When you purchase KRMC you also need to purchase a KRMC Maintenance Contract, for 1, 2 or 3 years.
Remote Disable/Delete – KRMC allows administrators to remotely disable or delete lost, stolen or compromised devices to protect sensitive information and prevent data breaches.
Password Management – KRMC allows administrators to manage a variety of password functions including: password length, strength, expiration, invalid login attempts, and master password. Passwords can also be changed or updated remotely to help users recover forgotten passwords and also meet new security policies.
Remote Provisioning – Remotely manage security policy changes from a single location. Control password complexity, password expiration, online and offline access, and more.
Offline Restrictions – Control whether devices can be used offline. Prevent unauthorized use in external networks.
IP and Domain Control – Manage which IP and/or domains are allowable for devices to access via whitelist and blacklist methodology.
Auditing and Reporting – KRMC enforces a full audit trail with detailed graphical reporting and the ability to export both customizable audit logs and graphs for external analysis to ensure proper compliance.
Advanced Filtering – Quickly locate devices within the management console for efficient work flow. Advanced filters allow an administrator to quickly navigate through thousands devices within a matter of seconds.
Active Directory Support – Improve initial provisioning and deployment with Microsoft Active Directory support.
Messaging/E-mail Alerts – Remotely send messages to devices in the field with informative messages or announcements for workers to see when they have their Kanguru device connected. Also, setup e-mail alerts to notify administrators when certain events take place. (i.e.- device deleted, password changed, etc.)
Secure Tunnel - All communication occurs over secure SSL or TLS channel.
• Remote Delete (Deletes all data on the target drive)
• Scheduling of actions (present or future times)
• Auditing at administrator and super administrator level
• Locate via IP address (IP Address / network location)
• Locate via hostname
• Remote policy modifications:
• Password Strength and Length (i.e. 10 characters: 2 upper, 2 numbers, etc)
• Limit Invalid Login Attempts (i.e. 3 retries before drive is wiped)
• Rate at which password should be changed (i.e. every 30, 60, or 90 days)
• Change user password
• Change master password
• User groups (Admin & Super Admin)
• Device import - Support for single or batch import of device(s)
• License import - Support for single or batch import of license(s)
• Advanced Users & Groups management
• IP & Domain Control
• Active Directory Support
• Support for TLS & SSL communication
• Export audit log data to XLS
• Advanced filtering
• Real time graphical reports
• Uses ANSI X9.31 Random Number Generator
|Server System Requirements||
|Admin System Requirements||
o Windows XP Home or Professional (Service Pack 2 is recommended)
o Windows Vista (All Versions)
o Windows 2000 (Service Pack 4)
|Shipping Weight||1 lbs|
1 Kanguru Solutions defines a megabyte (MB) as 1,000,000 bytes
2 a gigabyte (GB) as 1,000,000,000 bytes.