Mark the page

DataLocker Sentry 5 - uncompromised security

USB Sentry 5

The DataLocker Sentry® 5 is a flash drive that is designed to withstand harsh operating conditions, featuring a reinforced and waterproof design that protects against access to components. This makes it a reliable solution for organizations that need strict security compliance.

Sentry 5 is FIPS 140-3 Level 3 certified (pending) and TAA compliant. The device offers robust security features, including XESES-mode password, which guarantees compliance with CMMC, HIPAA, SOX, SOC2, ISO 27001, NIS2, CCPA and RODO. Sentry 5 is available as standalone (manageable) or integrated with a SafeConsole license (sold separately), which simplifies administration by automating inventory management, policy imposition and auditing processes.

Main features and benefits of USB device management:

Enforce rules set by the administrator, such as password rules, file type restrictions, and geofencing. The feature allows you to remotely reset passwords, put devices into read-only mode, and even remotely wipe in case of theft or disk loss.

Monitor all your encrypted drives, including their location, anywhere in the world. Integrate it with Active Directory to easily monitor users, assigned devices and connected computers.

Check which files have been saved or deleted from your encrypted devices whenever you want. Use device history to find out about connections, failed logins, resets and device losses.

Analyze the status of your devices running with SafeConsole - See connections, device inventory, geolocation table, all in one place. In addition, it is possible to integrate SIEM with Splunk or Graylog.

Automatic inventory: Easily accessible overview of all drives in use including information about their type, serial number, software version, user, assigned security policies, etc. Such a list can be exported and used, for example, in RODO cases as an attachment to a procedure catalog.

Management and enforcement of security guidelines

Guidelines can vary widely, from those that specify under what conditions data can be accessed at all to those that say what sanctions follow in the event of non-compliance.

Remote reset to factory settings

If a drive is lost, stolen, or an employee leaves the company and the data remains in his or her possession, the administrator can remotely and irreversibly remove the data and AES key from the drive by resetting the drive to factory settings.

Remote password reset

Every employee, from time to time, will happen to forget the passwords to their devices. The administrator can use challenge response procedures to help employees assign new passwords without losing data on disk.

Compliance Reports

Everything we mentioned earlier, and many other events, are recorded in compliance reports. This means that at any time you can prove who, when, where and what device, caused an event. The extent of the recorded information can be adjusted through settings in the admin panel.

Additional features

With additional licenses, the range of available services can be expanded to include USB port control (USB port blocking/white list of authorized drives), malware protection (direct integration with USB media software) and virtual disks (data stored locally, is backed up to the cloud).

 

Want to know more about the USB media management system from DataLocker?