Manufacturer:
SKU:
RM-1-LICENSE
PART #:
RM-LICENSE
Request Evaluation
1 YEAR
RM-1-LICENSE
$
49.95
Price Per Drive
$ 49.95 USD

Remote Management

Centralized Encrypted Drive Management. Cloud or On-Premises. No software installs. No OS compatibility issues.
  • Manage SecureUSB KP, BT, DUO and SecureDrive BT and DUO
  • Assign users and enable/disable drive access
  • Set policies and update settings remotely (BT/DUO)
  • Remote Security – Remote wipe, unlock, and PIN reset (BT/DUO)
  • Access & Authentication Support – SSO (OKTA, AD, etc.)
  • Supports biometrics or remember password (BT/DUO)
  • Keypad unlock for air-gapped use or when phone is not allowed (DUO)
  • SecureUSB KP uses the keypad and host app to verify the user
  • Every authentication attempt is logged with coordinates, providing a complete audit trail

Take advantage of our risk-free "try before you buy" options. When you're satisfied with the repaired results, you can proceed to purchase.

No data to recover detected in your damaged file?  In some cases it is possible to retrieve data only manually by our technical team. Request a file review
Included with purchase:
No items found.

Take Command of Every Encrypted Drive Across Your Organization

Managing encrypted USB devices at scale demands more than a password policy. It requires real-time visibility, granular access controls, and the ability to act instantly when a device goes missing. SecureData's Remote Management Console gives IT administrators a centralized, browser-based platform to enforce security policies across every managed drive in your organization, from any location, at any time.

Enforce the Access Policies That Matter

Remote Management puts IT teams in full control of how, when, and where encrypted drives can be used. Geo-fencing restricts drive authentication to administrator-defined geographic boundaries, while time-fencing limits access to approved hours, ensuring drives cannot be used outside of sanctioned locations or business hours. For organizations subject to HIPAA, CMMC, or GDPR audit requirements, every access event is captured in a detailed Access Log, giving administrators a complete, time-stamped record of when and where each drive was successfully authenticated.

Act Instantly When Devices Are Lost or Compromised

When a managed device goes missing, every second counts. Remote Management enables administrators to remotely wipe, lock, or force a password reset on any drive in the account, immediately neutralizing the risk of unauthorized data access. Multiple drives can be tracked and managed from a single console account, giving IT teams the oversight and response capability needed to meet regulatory obligations without delay.

Frictionless for Employees. Powerful for IT.

Remote Management requires no software installation on host systems and is fully OS-independent, eliminating compatibility concerns across mixed device environments. Employees activate drives using the free SecureData Lock mobile app, leveraging the familiar convenience of their smartphone, removing the friction that leads to policy workarounds and keeping your organization consistently compliant.

Request a Live Demo and see how Remote Management can strengthen your data security posture today.

SecureData Remote Management Console

The SecureData Remote Management Console gives IT administrators complete, centralized control over every managed encrypted drive in their organization. Compatible with any SecureData DUO or BT drive and available to add at any time after purchase, Remote Management is entirely software-free and requires no installation on host systems, making deployment straightforward across any operating system environment.

Multi-Factor Authentication

Every drive access requires dual-factor authentication, combining a validated user account credential with the device PIN. The Remote Management server first authenticates the user's username and password before the drive PIN is accepted. Until both factors are verified, the drive remains fully locked and invisible to the host system, ensuring protected data is never exposed to an unauthenticated device or user.

Geo-Fencing

Administrators can restrict drive access by geographic location, limiting use to a defined continent, country, state, city, zip code, or specific address. A configurable radius in kilometers or miles sets the maximum distance from the approved location within which a drive can be unlocked, preventing use outside of sanctioned facilities or regions.

Time-Fencing

Administrators can enforce time-based access restrictions by setting specific start and end times within any time zone, ensuring drives can only be authenticated during approved business hours and cannot be accessed outside of defined operational windows.

Super Admin Mode

Super Admin Mode provides a designated senior administrator elevated privileges over lower-ranking administrators, including the ability to add or remove Remote Management administrators. This establishes a clear chain-of-command hierarchy and ensures that access to the management console itself remains tightly controlled.

User Logging and Reporting

Every authentication attempt is logged and retained, capturing the outcome of each access event along with the precise geographic coordinates of the user at the time of authentication. This provides IT and compliance teams with a complete, auditable record to support regulatory reporting, incident response, and chain-of-custody documentation requirements.

Product Overview

Standard License - Intended for small businesses and/or individuals.

  • One installation of the product.

Standard license limitations:

  • The product may not be used while rendering services to third parties.

Business License - Intended for small or medium businesses.

  • Three installations of the product.
  • Remote Management (RM) enforces the following IT security policies:
  • Where and when drives allowed to be used
  • Wipe drives or disable access
  • Remotely unlock/force password reset
  • Track and manage multiple drives on one account
  • Remote access to drives via cloud-based console
  • Admin can view Access Log to see when a drive was successfully used
  • Geo-fencing to restrict drive use within geographic parameters set by Admin
  • Time-fencing to restrict drive use within start and stop times set by Admin
  • Remote wiping
  • Free SecureData Lock® mobile app to activate drives
  • Software-free
techbuzzireland.com

techbuzzireland.com

5/5
I have covered several drives here in the past and to be fair some of these are quite the kit with James Bond ringing about them and this one is no different but it has a trick up its sleeve compared to others when it comes to the tech aspect.
Jim O Brien

Heading

This is some text inside of a div block.
Block Quote
This is some text inside of a div block.
Read Review

Trusted by 3,000+ happy Customers & Organizations.

No items found.

Need Online File Repair?

As an alternative to downloadable utility, you can get instant results with our breakthrough online file repair. With no software to download and install it's easier and faster than ever.

Repair your corrupt files by uploading them to our cloud-based platform. After upload, processing typically takes from a few seconds to a minute, after which the user is offered free and paid options for downloading the results of the recovery.

Dozens of file formats are supported, including Microsoft Word documents, Excel spreadsheets, PowerPoint presentations, Access databases, JPEG, GIF, TIFF, BMP, PNG and RAW images.

Product Documents

SecureData RM Best Practices

SecureData RM Best Practices

SecureData Lock Managed App

SecureData Lock Managed App

Frequently asked questions

Request Manual File Review

Our data repair experts can solve the most difficult data corruption situations. Corrupted files are taken apart bit by bit, and recoverable data is reconstructed into a new file.

To learn more please submit this form and one of our technicians will contact you to go over the process.

Thank you!
Your submission has been received!
Oops! Something went wrong while submitting the form.
By clicking "Send Request", I agree to receive information, suggestions and offers about SecureData products and services.

featured insights & articles

Your privacy is important to us. Our privacy statement explains how SecureData processes personal data.

Privacy Statement

Thank you!

Please download the free demo version via the link below. In the demo version, the results will be watermarked but will allow you to determine if the target file is repaired to your satisfaction. Once you see your repaired files you may opt to purchase a full license to receive the target files without a watermark.
Please download via the link below.
Oops! Something went wrong while submitting the form.