Secure Administration System (SAS)

A secure way to manage Secure OS-powered devices

SAS gives your IT teams complete control over Secure OS-powered devices. Secure, manage and monitor all your mission-critical devices used within your organization.
Monitor showing SAS interface

Mobile device management made easy

The Secure Administration System (SAS) is a mobile device management (MDM) solution that provides comprehensive and intuitive management tools for Secure OS-powered devices, including device monitoring, configuration, and fleet administration. It allows IT teams to manage single or multiple mission-critical devices from a centralized command center.

Deploy apps and installer packages

Our secure mobile devices come preloaded with our proprietary encrypted apps designed to deliver maximum security. However, you can also whitelist third-party apps through SAS, and install, for example, a project management app.

  • Icon

    Create policies for a group of accounts, plus custom ones for specific users

  • Icon

    Set up firewall rules with blacklisted IPs and ports

  • Icon

    Disable and enable separate Secure Group apps on a device

Apps management screenshot

Set up and manage fleets of secure devices

Through SAS you can push and assign policies to both individual users and whole groups of devices, easing the process of managing large fleets of secure mobile devices.

  • Icon

    Organize groups of users into groups

  • Icon

    Push mass actions

  • Icon

    Erase devices remotely

Fleet management screenshot

Configure every option

Depending on the circumstances, you may need a part of your devices configured for extreme security and the other part configured for interoperability. Disable or enable different hardware components and functionalities such as USB, Bluetooth, Wi-Fi, location, drivers, camera, etc.

  • Icon

    Create, edit, assign and push device policies

  • Icon

    Enable or disable software options

  • Icon

    Enable or disable hardware components

SAS configuration screenshot

Backup and restore devices

Through SAS you can securely backup and restore devices. Encrypted backups of settings, contacts, and files can be saved serverside and restored on demand.

  • Icon

    Securely upload device backups to SAS

  • Icon

    Backup your settings, contacts, and information

  • Icon

    Restore in a manner of minutes

Backups screenshot

Monitor network security and detect fake towers

IMSI-catchers are devices that act like fake cell towers, which trick a device to connect to them to collect sensitive information, such as calls, text messages, Internet traffic, etc. The built-in network monitoring system detects and alerts administrators of any suspicious activity and allows them to take immediate action.

  • Icon

    Monitor network activity

  • Icon

    Detect when a device connects to a fake tower

  • Icon

    Alert users of a potential threat

Monitor networks UI

Keep your devices secure

Enforce the security settings your organization requires. Control options such as the minimum password length, the password expiration time, and the number of times devices can fail to sync back to SAS before they are automatically erased.

  • Icon

    Automatically erase devices that fail to sync a number of times

  • Icon

    Set password strength requirements

  • Icon

    Choose between different security methods

Data security UI

Turnkey deployment

Take full control over your mission-critical communications with our self-hosted solutions.

Deployment options
On cloud
On premise

What our partners say

Our partners are an essential part of our extended corporate family. Their success is our success. We value and trust them the same way they value and trust us.

Book a personalized demo

Two Secure Group Phones