Data Resource Manager

The DRM platform allows you to perform virtually unlimited tasks on local and remote devices. Your tasks may include:

  • Application patching
  • Process automation
  • Asset management
  • Device and software inventory
  • File transfers
  • Remote system health monitoring
  • Automation of support procedures

With DRM, you may initiate a pre-defined series of work lists, or create and execute tasks custom tailored to your environment.

DRM Interface:

The graphical interface provides the means to configure DRM’s many features. Its intuitive layout includes context sensitive tool-tip help everywhere, facilitating training and reducing staff errors. The DRM interface features include:

  • DRM system configuration
  • User access control
  • User activity audit reporting
  • Extensive communications/event reporting
  • Location, Worklist and Schedule creation
  • Event/Communication control
  • Abnormal event recovery
man working on a laptop

DRM is an event driven system. Events can be initiated either by a schedule or on an ad-hoc basis.


These easily customizable objects define the work that will be performed during an event. Data movement and processing, both local and remote, reside here. You can create any number of unique work flows using one or more Worklists.


Each remote node is defined so it may be accessed individually or as part of a Location Group. Location Groups allow you to combine many devices into logical associations.


DRM provides the ability to control event execution using Schedule Parameters. You determine whether those events should occur every day at 3:30AM, just once, every Sunday at midnight, once a week, the third Thursday in November or any combination of parameters. Schedules may be set up for individual Locations or for Location Groups. Any combination of Worklists may be assigned to a Schedule.

Remote Initiated Schedules:

The DRM client may initiate scheduled or ad-hoc events. This is particularly useful for situations where remote stores have variable closing times and need the ability to perform end of day processing prior to exporting data to headquarters.


DRM’s design permits easy and rapid changes to communication protocols as technology and the threat landscape evolve. All DRM communications are secured using state-of-the-art encryption standards. on Laptop Screen
Application Integration:

DRM contains powerful tools which allow for integration with external systems, greatly enhancing the usefulness of DRM and 3rd party applications.

  • DRM monitors events so you may follow activity as it occurs.
  • Real-time communications activity monitor
  • Schedule summary report, last use and status by Location or Location Group
  • Real-time status of active vs queued events
  • Location status
  • Event failure report
  • Date/time/port/Location and keyword search

The DRM dashboard provides a view into system activity with live displays and charts, disk usage, active port and Location counts, and other pertinent information.

Contact us for more info about
Data Resource Manager