- Book a demo
The Secure Administration System (SAS) is a mobile device management (MDM) solution that provides comprehensive and intuitive management tools for Secure OS-powered devices, including device monitoring, configuration, and fleet administration. It allows IT teams to manage single or multiple mission-critical devices from a centralized command center.
Our secure mobile devices come preloaded with our proprietary encrypted apps designed to deliver maximum security. However, you can also whitelist third-party apps through SAS, and install, for example, a project management app.
Create policies for a group of accounts, plus custom ones for specific users
Set up firewall rules with blacklisted IPs and ports
Disable and enable separate Secure Group apps on a device
Through SAS you can push and assign policies to both individual users and whole groups of devices, easing the process of managing large fleets of secure mobile devices.
Organize groups of users into groups
Push mass actions
Erase devices remotely
Depending on the circumstances, you may need a part of your devices configured for extreme security and the other part configured for interoperability. Disable or enable different hardware components and functionalities such as USB, Bluetooth, Wi-Fi, location, drivers, camera, etc.
Create, edit, assign and push device policies
Enable or disable software options
Enable or disable hardware components
Through SAS you can securely backup and restore devices. Encrypted backups of settings, contacts, and files can be saved serverside and restored on demand.
Securely upload device backups to SAS
Backup your settings, contacts, and information
Restore in a manner of minutes
IMSI-catchers are devices that act like fake cell towers, which trick a device to connect to them to collect sensitive information, such as calls, text messages, Internet traffic, etc. The built-in network monitoring system detects and alerts administrators of any suspicious activity and allows them to take immediate action.
Monitor network activity
Detect when a device connects to a fake tower
Alert users of a potential threat
Enforce the security settings your organization requires. Control options such as the minimum password length, the password expiration time, and the number of times devices can fail to sync back to SAS before they are automatically erased.
Automatically erase devices that fail to sync a number of times
Set password strength requirements
Choose between different security methods
Take full control over your mission-critical communications with our self-hosted solutions.
Amazon Web Services
Dedicated organizations' servers
Our partners are an essential part of our extended corporate family. Their success is our success. We value and trust them the same way they value and trust us.
The biggest advantage of SAS is the ability to control devices from a distance - wipe the phones, give them additional permissions, upload new necessary applications, disable/enable functions... No need to open a ticket with Secure Group, no need to call support, no need to delay user requests. This is a true 21-century service!
Secure Group is an invaluable partner in our business. They helped us by not only developing a highly competitive solution, we can offer our customers, but also by providing us with powerful market insights, and promotional materials.
We were looking for a complex solution to fit our business model and operate within our infrastructure. When contacting Secure Group, they proved to be highly flexible and right away offered us an option to host the solution on our server. Moreover, the company developed a custom MDM for our project, allowing us to manage multiple devices and control the communication process.
At the beginning I was a bit worried whether Secure OS will fit the needs of my comapny, using it proved there was no reason for that. The OS is really great, super easy to use and pretty intuitive.