A unified cloud management service for device security
| HW/SW listing & Exporting | Listing HW/SW inventory. The data can be exported by CSV. |
| License Management Report/Summary | Reporting MS-Office /Adobe apps Utilization. |
| Standalone PCs Handling | Inventorying Standalone PCs. |
| Application Portal | A portal site with a list of apps which users can download. |
| Diagnosing Security Vulnerability | Diagnosing security vulnerability of client devices and indicating security in one of the 5 security levels. |
| Antivirus SW INSTL Statuses Report | Reporting antivirus SW installation status. |
| SW Forcible Updating | Applying the policy to enforce updating Wins OS, Adobe Reader and so forth on client devices. |
| Banned Apps Detect & Launch Control | Detecting banned Apps and controlling launching them. |
| NTWK Connection Control | Controlling access connections to Wi-Fi and VPN networks. |
| SD card /Bluetooth Control | Restricting access the data on SD card/Bluetooth. |
| ISM Client Program Restarting | Restarting the ISM client program automatically whenever it is stopped. |
| Detecting the CNFIG Profile Deletion | Detecting the CNFIG profile is deleted. |
| Apps Launching Control | Restricting the usage of specified apps when a device is lost or stolen. |
| Locating the client devices | Locating the lost device on Google Maps/BingMaps, helped by GPS. |
| Remote Lock/Wipe | Remote Locking or wiping out the lost/stolen devices or a failure in compliance. |
| Rooted/Jail broken Device Findings | Finding rooted /jail broken devices and notifying the ADMIN by mail. |
| Setting Up Stringent Policy | Assigning or switching to the pre-defined stringent policy on a failure in compliance. |
| Defender Control | Allows you to control Windows Defender settings and see the existing settings and malware detected for each managed device. |
| Communication device restrictions | 1. Restrict communication with Bluetooth devices 2. Restrict communication by specifying IP addresses 3. Restrict access point connectivity with SSID specifications |
| External Media Control*1 | Placing restrictions on external media such as USB memory devices. |
| Collecting User Operation Logs*1 | Collecting user operation logs from PCs via the Internet to reveal policy-violating activities on those PCs. |
| HDD Encryption*1 | Encrypting an entire hard drive, not only the OS, which provides stronger security and protects managed devices from data theft. |
| Behavioral detection*1 | Unknown threats are detected,stopped and removed using engines that predict malware behavior. |
| Log analytics*1 | Collect PC operation logs that show who did what and when. Check PC operational status, or take advantage of various features including logs of when webconferences were held. Long-term storage (up to 7 years' worth of logs) lets you quickly investigate even past incidents. |
| Remote control (simplified version) | Allows operation of (remote control) and file transfer to client devices via the Internet. |
| Software Distribution Folder Transfer | Distributing software, folders and files via the premise network. |
| App Distribution & Uninstallation | Distributing and uninstalling apps on client devices. |
| Quick Remote Control (high-performance version) | Enables administrators to perform high-speed, stress-free remote control of PCs at regional offices or of those working from home. |
| Monthly reports | Each month, inventory data for the start of that month is provided in a report file (Excel format) |
| *1 | Option |
| * | Depending on the node to be used, the functionality that can be provided and the price of service vary. Please contact us for details. |
Please consult a KDDI consultant.
What is the best solution for your problem?
Please consult a KDDI consultant.