SafeConsole

Instantly gain complete and granular control
over all of your encrypted USB flash drives and portable hard drives
with the SafeConsole central management server software:

  • Achieve compliance for USB storage usage, with full control and audit.
  • Keep the productivity benefits of USB storage devices – without the risks of malware, data leaks and breaches.

Available as an on-premise software or as a DataLocker hosted cloud service with worldwide locations.

Click Here for Evaluation Request

SafeConsole Features Overview

SafeConsoleReady Secure USB Flash Drives

A SafeConsoleReady secure USB drive can be managed by the SafeConsole central device management server software.

3 Major Reasons to Choose SafeConsoleReady Devices

  • Unsecure USB Drives Spread Malware.
    SafeConsoleReady secure USB drives fight malware.
  • Unsecure USB Drives are Data Leak Tools.
    SafeConsoleReady secure USB drives are audited and can be remotely killed by the organization using SafeConsole.
  • Unsecure USB Drives Cause Data Breaches.
    SafeConsoleReady hardware encrypted secure USB drives enforce protection of all stored data.

SafeConsoleReady Vendors

DataLocker offers a full range of SafeConsoleReady secure USB flash drives and encrypted hard drives.

Kingston Digital, Inc. (“KDI”) is the Flash memory affiliate of Kingston Technology Company, Inc., the world’s largest independent manufacturer of memory products. Kingston offers two SafeConsoleReady devices. Ensure that you purchase the correct products by double-checking the part number (SKU).

DataTraveler Vault Privacy 3.0 – FIPS197 – SKUs
DTVP30DM/4GB, DTVP30DM/8GB, DTVP30DM/16GB, DTVP30DM/32GB, DTVP30DM/64GB

DataTraveler 4000 G2 – FIPS 140-2 level 3 – SKUs
DT4000G2DM/4GB, DT4000G2DM/8GB, DT4000G2DM/16GB, DT4000G2DM/32GB, DT4000G2DM/64GB

SafeToGo secure USB flash drives from Cardwave has been designed and manufactured to achieve the highest levels of quality, performance and security. Ensure that you purchase the correct product by double-checking the part number (SKU).

English and French language support – SKUs
STG-4GB-E, STG-8GB-E, STG-16GB-E, STG-32GB-E, STG-64GB-E

German language support – SKUs
STG-4GB-G, STG-8GB-E, STG-16GB-E, STG-32GB-E, STG-64GB-E

Core Features of a SafeConsole Ready Device

SafeConsole Deployment Options

SafeConsole Cloud  – SaaS hosted by DataLocker world-wide

  • Up and running in minutes
  • No user content is stored on the cloud
  • Your dedicated server can be hosted in your choice of cities around the globe
  • Ideal for deployments of 1-500 endpoints

SafeConsole On-Prem – installed on your own Windows server

SafeConsole On-Prem is easy to deploy if your organization requires an on-premise or hybrid cloud solution:

  • Requires a dedicated Windows-based server
  • Log in and manage from anywhere
  • Administrators can authenticate to access SafeConsole with their AD credentials.
  • Ideal for deployments of 300+ endpoints

Minimum Requirements

  • Pentium Quad Core or higher class system
  • 2GHz or faster CPU minimum
  • Windows Server 2003, Windows
  • Server 2008 or Windows Server 2012
  • 4GB of free RAM
  • 20GB of free hard disk space required

SafeConsole Features by Category

Remote Password Reset

Reset passwords remotely over any channel. Administrators can get remote offline users back to work within minutes, without any loss of stored data. The short 8-character recovery codes are easily read over the phone yet maintaining the robust security of a 128-character code using a pre-buffer method. No data is lost and the process is protected against social engineering directed against the helpdesk. The user password is never exposed and there is NO master password. Read the Password Management Best Practice Paper.

Password Policy

Ensure that all data is protected by strong, compliant passwords by enforcing password policies on the devices.

Device Auditing – See Who Did What, When and Where

Device auditing makes taking stock of the entire portfolio of SafeConsoleReady devices easy as it creates an automatic inventory list. The logs then include unsuccessful unlocking attempts, device states and log-ins. This gives the administrator a full overview of all drives in use in the organization.

Detailed File Auditing – Achieve Compliance Requirements

Detailed File Auditing is an extension of the Device Audit. It allows an administrator to see what files have been copied to or deleted from the devices, as well as a trail of the files that have had their names changed.

Device State Management – Full Control Over Devices

As an extra security precaution when drives are lost, or to protect your organization’s sensitive information from access by former employees, you can remotely ‘kill’ rogue drives and erase them of all data. In the Device Overview in SafeConsole, an authorized administrator can set the device state to ‘killed’, ‘disabled’ and ‘lost’. Devices can later be recovered using the Remote Password Reset and/or Backup features. SafeConsole can also be set to handle the devices’ states entirely on autopilot. This will require the drives to return to base by connecting to the SafeConsole server within a configurable time period.

Inactivity Lock – Forgotten Drives Lock Down

Lock down a secure USB drive after a configurable period of inactivity. Forgotten drives that are left behind in a computer will automatically lock down according to the set policy.

File Restrictor – Restrict File Types to be Stored EXE, MP3

A white-list approach prevents the storage of unauthorized file-types. Rogue files cannot reside on a SafeConsoleReady Device as it only allows storage of file-types specified by the administrator in the SafeConsole settings.

Authorized Autorun – Stop Autorun Viruses

The onboard autorun-protection that chokes self-copying viruses such as StuxNet and Conficker – by denying unauthorized autorun files from residing on the drive altogether.

Write Protection – Set Devices in Read-Only Mode

With Write Protection, users can set their drive in a read-only mode when unlocking it on non trusted machines and thereby gain protection from malware trying to infect the drive or its content. It is also possible for an administrator to enforce this protection when a user leaves the company network ensuring that no malware can be copied to the drives and brought back to the company.

Geolocation and Geofencing

Using IP-based location tracking, pinpoint the exact location of your encrypted endpoints anywhere in the world. With SafeConsole, you can also geofence your devices making them accessible only within specific geographic boundaries.

Authorized Autorun – Stop Autorun Viruses

To prevent the spread of autorun malware, SafeConsoleReady devices overwrite the autorun.inf files stored on the encrypted storage volume, choking the effect of viruses such as Conficker. Specify trusted commmands to enable authorized applications to autorun off the devices, allowing you to keep the benefits and convenience of autostarting working-tools while blocking gateways for malware infection.

Device User Information

Save time and pain – customize devices with user information for easy identification and secure lost and found.

By defining “token” questions, SafeConsole administrators can ask device users to enter unique information about themselves. The “token” information allows the administrator to create a custom message about the user under the About window to easily identify lost devices without requiring permission to unlock the drive.

Autostart applications that require a password to start can also make use of “token” information by assigning a token as a necessary password. This allows the application to launch without interruption.

The information is collected to the server and can be used to sort and search users and their devices.

Device User Settings

Configure device settings to tailor the SafeConsoleReady device to your needs (e.g. disallow users from factory-resetting their devices). It is also possible to enforce a user interface language and pre-approve the device warranty for quicker device deployment.

     Feature Listing

US based datacenter
Private cloud server SaaS
World-wide cloud hosting options
Available as an On-Prem installationYes, Windows installable
Compatible DevicesCardware SafetoGo, Kingston DTVP30DM, DT4000DM, DataLocker Sentry, DataLocker DL3 hard drives
Crossplatform Windows, Mac and select devices for Linux
Forced management available ?
Browser based service interface
Automatic inventory directory of all users and devices
Self-service plug-and-play device deployment
Centrally enforce security policies of devices
Accessible from mobile device
Filter and sort data tables
Search for devices and users
Two-factor authentication to management system
Deployment Wizard
Information Dashboard
Optimized for large enterprises
Admin and role management
Multiple administrator roles
Dynamic licensing
Integrated help text in the user interface
Export data in CSV format
Active directory integration
Automated server updates
Server/device locked to organization with a certificate
Custom device password policy
Device remote password reset over phone or Internet (Challenge/Response - PKI).
Local device self-service password reset (PKI) using ZoneBuilder.
ZoneBuilder (automatic unlock on trusted user accounts)
Remotely set device as disabled.
Remotely reset device.
Remotely set device as lost or to deny access to the device.
Manage the device states. Automate with rules.
Self-service mark a device as “found” on sucessful unlock.
Offline restrictions for device usage
Custom return-to-owner message displayed on device if lost.
File Restrictions (white-list accepted file-types) anti-malware
Inactivity Lock management
Device/User audit (Excel, XML)
File audit (Excel, XML, Syslog)
Audit reports
Publisher file distribution
ZoneRestrictor – only allow devices to work on select machines
Autorun applications
Enable users to unlock drives in write protected mode
Collect and use device user information. Sort and search based on collected information in the Device Overview.
Customize device “about” screen
Manage portable antivirus on the devicesESET
Geo location of devices
Geo fencing of devices

   Resources

SafeConsole On-Prem installation manual (5.0.5)
New Account Application
ZoneBuilder Functionality Specifications
ESET AntiVirus Drive Security Installation Guide
Download latest version of SafeConsole On-Prem

SafeConsole Part Numbers

A one time Cloud Starter (base) + Device Licenses are REQUIRED for SafeConsole Cloud

You can select from three options:

  • Base (SCC-BASE) + 1 year (SCC-DEV-1)
  • Base(SCC-BASE) + 2 years (SCC-DEV-2)
  • Base(SCC-BASE) + 3 years (SCC-DEV-3) of device license.

The Base is a ‘one-time’ fee.

SafeConsole Cloud Base – one-time fee SCC-BASE
SafeConsole Cloud Device License – 1 year SCC-DEV-1
SafeConsole Cloud Device License – 2 years SCC-DEV-2
SafeConsole Cloud Device License – 3 years SCC-DEV-3
SafeConsole Cloud Device License Renewal- 1 year SCC-DEV-1R
SafeConsole Cloud Device License Renewal- 2 years SCC-DEV-2R
SafeConsole Cloud Device License Renewal- 3 years SCC-DEV-3R
A one time On-Prem Starter (base) + Device Licenses are REQUIRED for SafeConsole On-Premises

You can select from three options:

  • Base (SCOP-BASE) + 1 year (SCOP-DEV-1)
  • Base(SCOP-BASE) + 2 years (SCOP-DEV-2)
  • Base(SCOP-BASE) + 3 years (SCOP-DEV-3) of device license.

The Base is a ‘one-time’ fee.

SafeConsole On-Prem – one-time fee SCOP-BASE
SafeConsole On-Prem Device License – 1 year SCOP-DEV-1
SafeConsole On-Prem Device License – 2 years SCOP-DEV-2
SafeConsole On-Prem Device License – 3 years SCOP-DEV-3
SafeConsole On-Prem Device License Renewal- 1 year SCOP-DEV-1R
SafeConsole On-Prem Device License Renewal- 2 years SCOP-DEV-2R
SafeConsole On-Prem Device License Renewal- 3 years SCOP-DEV-3R