Apricorn Aegis Configurator security configurator

Article-No.:
151673
Manufacturer-No.:
AP-CONFIG-CDB-EMEA
EAN/GTIN:
0708326914895
Technical specifications

General

Product Type
Security configurator
Packaged Quantity
1

System Requirements

OS Required
Microsoft Windows 7, Windows 8, Windows 10

Service & Support

Type
3-year warranty

Miscellaneous

Product Material
Aluminum
Color Category
Black
Description
Quickly create master profiles, customize settings, and preload data onto multiple Apricorn drives. Intuitive, simple, and secure. This Windows-based application quickly programs features and PINs into compatible Aegis secure devices. The Configurator will recognize compatible devices and allow administrators to program/configure/provision all of Apricorn's compatible USB 3.0 and later security devices.
With Central Database access - via on-premise active directory or Azure - various members of an organization's system admin group can access log files within the database for all configured device information. For help desk and support staff, lesser levels of information access and permissions can be granted. Multiple Admin roles can be permitted by geographic or logical divisions within an organization. For example, a departmental Admin would be granted access to the highest level information and permissions within their division such as viewing User and Recovery PINs, editing local profiles and device settings, whereas the Help Desk role is limited to less critical information and permissions like viewing recovery PINs and reporting lost / stolen devices. All of these various user groups and roles are defined within an organization by the Super Admin at initial installation. There is no limit to the number of Admins, Help Desk, and Support Users that can be added.
  • Secure implementation
    All data is encrypted and once a device has been configured, the Configuration pathway is locked down from the inside of the individual device by its firmware. For a device to be reconfigurable, it must be completely reset and returned to its "out of box" state.
  • Log files
    Create and maintain secure log files of User PINs, recovery PINs, and device settings created at time of configuration. Master Log File exists on centralized database and can be accessed via SSL from local workstations with access permission.
  • Forced-enrollment /user forced enrollment
    Requires creation of a unique Admin PIN in configuration; additionally allows forced enrollment feature to be extended to User to create User PIN after device configuration.
  • Multiple Admin control
    Unlimited number of Admins defines and control hierarchal roles and permissions granted within designated groups in the organization.
AlertBrowse fileDownload file