KDDI Cloud Inventory
A unified cloud management service for device security
KDDI Cloud Inventory provides centralized endpoint security, such as IT asset management and detection of security policy-violating clients.
An optimal solution for those troubled by these issues
How can I manage the security of
PCs taken off company grounds?
How can I check for devices
that violate company policy?
How can I stop privately-owned
smartphones from connecting
to the company network?
Product overview
Unifies your device
security process
Usable from anywhere
Manage from anywhere in the world where you have an Internet connection
Multi-device support
Manage multiple device types, including Windows devices, Mac devices, and mobile devices
Automated security management
Automatic detection and display of devices with security vulnerabilities
3 languages supported
A Web console available in Chinese, English and Japanese
Global contracts
Purchase with a single Japan contract, or purchase through local contracts in other countries’ currencies
Wide variety of security controls
External device restrictions, unauthorized device detection and blocking, behavioral detection and other security features
Features
FunctionalityA wide variety of security-related functions
In addition to security management, KDDI Cloud Inventory provides HDD encryption, external device (USB memory, etc.) restrictions, PC operational log acquisition, behavioral detection (malware detection), and more.
EfficiencyMake large reductions in your workload
Automation of security management (automatic vulnerability diagnoses) and asset management frees up your busy system administrators and makes usage easy.
Automatic vulnerability diagnoses
Provides a list of PCs lacking the latest OS and software*2 updates. By automatically located at-risk PCs, your management workload is greatly reduced.
Asset management
Once a day, information is collected from your managed devices, allowing you to manage your assets with accurate information, without the work of collecting it yourself.
- *2Software such as Java, Flash, Adobe Reader/Flash Player, Internet browsers, etc.
FlexibilityCloud-based system means you can start small
All you need is an Internet connection. Easily scale as needed, from managing a few dozen devices to tens of thousands.
Free trial
30 day free trial service
Take this opportunity to check your security level with a free trial, and experience security management using KDDI Cloud Inventory.
IT Asset Management | |||
---|---|---|---|
HW/SW listing & Exporting | License Management Report/Summary |
Standalone PCs Handling |
Application Portal |
Listing HW/SW inventory. The data can be exported by CSV. | Reporting MS-Office /Adobe apps Utilization. | Inventorying Standalone PCs. | A portal site with a list of apps which users can download. |
Security Management | |||
---|---|---|---|
Diagnosing Security Vulnerability |
Antivirus SW INSTL Statuses Report |
SW Forcible Updating |
Banned Apps Detect & Launch Control |
Diagnosing security vulnerability of client devices and indicating security in one of the 5 security levels. | Reporting antivirus SW installation status. | Applying the policy to enforce updating Wins OS, Adobe Reader and so forth on client devices. | Detecting banned Apps and controlling launching them. |
NTWK Connection Control |
SD card /Bluetooth Control |
ISM Client Program Restarting |
Detecting the CNFIG Profile Deletion |
Controlling access connections to Wi-Fi and VPN networks. | Restricting access the data on SD card/Bluetooth. | Restarting the ISM client program automatically whenever it is stopped. | Detecting the CNFIG profile is deleted. |
Apps Launching Control |
Locating the client devices | Remote Lock/Wipe | Rooted/Jail broken Device Findings |
Restricting the usage of specified apps when a device is lost or stolen. | Locating the lost device on Google Maps/BingMaps, helped by GPS. | Remote Locking or wiping out the lost/stolen devices or a failure in compliance. | Finding rooted /jail broken devices and notifying the ADMIN by mail. |
Setting Up Stringent Policy |
|||
Assigning or switching to the pre-defined stringent policy on a failure in compliance. |
Remote Management | |||
---|---|---|---|
Remote Control | Software Distribution Folder Transfer |
App Distribution & Uninstallation |
|
Remote controlling client PCs via the premise network. | Distributing software, folders and files via the premise network. | Distributing and uninstalling apps on client devices. |
Other | |||
---|---|---|---|
Lease/Rental Management | IT Asset Searching | Gathering Questionnaire Data Entries | |
Inventorying lease/rental assets and notifying/alerting about terminations in advance. | Finding assets by serial number, user name, software, etc. | Gathering questionnaire answers that users have provided and storing them as inventory data. |
Option | |||
---|---|---|---|
External Media Control | Collecting User Operation Logs | HDD Encryption | |
Placing restrictions on external media such as USB memory devices. | Collecting user operation logs from PCs via the Internet to reveal policy-violating activities on those PCs. | Encrypting an entire hard drive, not only the OS, which provides stronger security and protects managed devices from data theft. | |
Behavioral detection | Monthly reports | ||
Unknown threats are detected,stopped and removed using engines that predict malware behavior. | Each month, inventory data for the start of that month is provided in a report file (Excel format) |
- * Depending on the node to be used, the functionality that can be provided and the price of service vary. Please contact us for details.