A unified cloud management service for device security
HW/SW listing & Exporting | Listing HW/SW inventory. The data can be exported by CSV. |
License Management Report/Summary | Reporting MS-Office /Adobe apps Utilization. |
Standalone PCs Handling | Inventorying Standalone PCs. |
Application Portal | A portal site with a list of apps which users can download. |
Diagnosing Security Vulnerability | Diagnosing security vulnerability of client devices and indicating security in one of the 5 security levels. |
Antivirus SW INSTL Statuses Report | Reporting antivirus SW installation status. |
SW Forcible Updating | Applying the policy to enforce updating Wins OS, Adobe Reader and so forth on client devices. |
Banned Apps Detect & Launch Control | Detecting banned Apps and controlling launching them. |
NTWK Connection Control | Controlling access connections to Wi-Fi and VPN networks. |
SD card /Bluetooth Control | Restricting access the data on SD card/Bluetooth. |
ISM Client Program Restarting | Restarting the ISM client program automatically whenever it is stopped. |
Detecting the CNFIG Profile Deletion | Detecting the CNFIG profile is deleted. |
Apps Launching Control | Restricting the usage of specified apps when a device is lost or stolen. |
Locating the client devices | Locating the lost device on Google Maps/BingMaps, helped by GPS. |
Remote Lock/Wipe | Remote Locking or wiping out the lost/stolen devices or a failure in compliance. |
Rooted/Jail broken Device Findings | Finding rooted /jail broken devices and notifying the ADMIN by mail. |
Setting Up Stringent Policy | Assigning or switching to the pre-defined stringent policy on a failure in compliance. |
Defender Control | Allows you to control Windows Defender settings and see the existing settings and malware detected for each managed device. |
Communication device restrictions | 1. Restrict communication with Bluetooth devices 2. Restrict communication by specifying IP addresses 3. Restrict access point connectivity with SSID specifications |
External Media Control*1 | Placing restrictions on external media such as USB memory devices. |
Collecting User Operation Logs*1 | Collecting user operation logs from PCs via the Internet to reveal policy-violating activities on those PCs. |
HDD Encryption*1 | Encrypting an entire hard drive, not only the OS, which provides stronger security and protects managed devices from data theft. |
Behavioral detection*1 | Unknown threats are detected,stopped and removed using engines that predict malware behavior. |
Log analytics*1 | Collect PC operation logs that show who did what and when. Check PC operational status, or take advantage of various features including logs of when webconferences were held. Long-term storage (up to 7 years' worth of logs) lets you quickly investigate even past incidents. |
Remote control (simplified version) | Allows operation of (remote control) and file transfer to client devices via the Internet. |
Software Distribution Folder Transfer | Distributing software, folders and files via the premise network. |
App Distribution & Uninstallation | Distributing and uninstalling apps on client devices. |
Quick Remote Control (high-performance version) | Enables administrators to perform high-speed, stress-free remote control of PCs at regional offices or of those working from home. |
Monthly reports | Each month, inventory data for the start of that month is provided in a report file (Excel format) |
*1 | Option |
* | Depending on the node to be used, the functionality that can be provided and the price of service vary. Please contact us for details. |
What is the best solution for your problem?
Please consult a KDDI consultant.
Office Hours:9:00~18:00
(Closed Saturdays, Sundays, and National Holidays)