Everest Cloud Inventory (Endpoint security service)

Rich features combined with simple operation enables integrated and streamlined IT management


IT asset management work has been extended recently to cover smartphones, virtual machines and more. The Everest Cloud Inventory centralizes global multi-device management services over endpoints such as Android, iOS mobiles, desktops and notebooks (Windows/Macintosh) both within and external to your business offices.

  • The cloud approach makes endpoint management operations global and transparent.
  • A single web-console covers all endpoints from desktops to mobile devices.
  • Endpoint management tasks are easily streamlined into automated actions.
  • Trilingual user interfaces extend endpoint management tasks to English, Chinese and Japanese speaking IT staff.
  • Centrally managed security policies reach diverse global endpoints.


Centralized Multi-Device Management Endpoints Over the World

From a single web console, "Everest Cloud Inventory" allows the centralized management of endpoints including Windows PCs, Macintosh computers, and both Android and iOS mobile operating systems. The endpoints are under the management of headquarters or subsidiaries, whether located in the office or anywhere in the world.
The versatility of Everest Cloud Inventory is based on the Internet and cloud computing. In other words, Internet connectivity is the only prerequisite for Everest Cloud Inventory to function.
Everest Cloud Inventory is a cloud solution that keeps endpoint configurations and applications secure thus providing stable usability for workforces in line with your organization's security policy, public regulations and compliance directives. The solution will cut costs and complexities; plus, it will reduce your IT department's daily workload by optimizing the endpoint management tasks.

Management workload reduction through automatic device security diagnosis

Based on the Security Profile that we develop and update daily, our viable anti-threat definitions including malware and vulnerability countermeasures, your organization as a whole is automatically rated in a scheme of security levels and has easy access to detailed reports. Those responsible for security view the dashboard to view present corporate risk levels . The dashboard, with its use of colours and scales, provides easy-to-read diagnosis.

A Free 30-Day Trial

We can offer the free trial of Everest Cloud Inventory for 30 days

Detail Summaries

IT Asset Management
HW/SW listing & Exporting License Management
Standalone PCs
Application Portal
Listing HW/SW inventory. The data can be exported by CSV. Reporting MS-Office /Adobe apps Utilization. Inventorying Standalone PCs. A portal site with a list of apps which users can download.
Security Management
Diagnosing Security
Antivirus SW
INSTL Statuses Report
SW Forcible
Banned Apps Detect
& Launch CNTRL
Diagnosing security vulnerability of client devices and indicating security in one of the 5 security levels. Reporting antivirus SW installation status. Applying the policy to enforce updating Wins OS, Adobe Reader and so forth on client devices. Detecting banned Apps and controlling launching them.
NTWK Connection
SD card
/Bluetooth CNTRL
ISM Client Program
Detecting the CNFIG
Profile Deletion
Controlling access connections to Wi-Fi and VPN networks. Restricting access the data on SD card/Bluetooth. Restarting the ISM client program automatically whenever it is stopped. Detecting the CNFIG profile is deleted.
Apps Launching
Locating the client devices Remote Lock/Wipe Rooted/Jail broken
Device Findings
Restricting the usage of specified apps when a device is lost or stolen. Locating the lost device on Google Maps/BingMaps, helped by GPS. Remote Locking or wiping out the lost/stolen devices or a failure in compliance. Finding rooted /jail broken devices and notifying the ADMIN by mail.
Setting Up
Stringent Policy
Assigning or switching to the pre-defined stringent policy on a failure in compliance.      
Remote Management
Remote CNTRL Software Distribution
Folder Transfer
Apps Distribution
& Uninstallation
Remote controlling client PCs via the premise network. Distributing software, folders and files via the premise network. Distributing and uninstalling apps on client devices.
Lease/Rental MGMT IT Asset Searching Gathering Questionnaire Data Entries URL Filtering
Inventorying lease /rental assets and checking for terminations in advance for notification or alert. Finding the assets by serial No, user name, software, etc Gathering questionnaire data that users have provided on a form, and putting them into other inventory data. Finding the target clients by common properties or keywords.
External Media CNTL Collecting user operation logs HDD Encryption
Controlling external media such as USB memory devices. Collecting user operation logs on PCs via the internet and makes clear the inappropriate activities of PC. Encryption the whole hard disk. Certification before the OS start.

Endpoint system requirements


Windows XP
Windows Vista
Windows 7
Windows 8
Windows 8.1
Windows 10
10.4 - 10.11
2.2 or later
4.3 - 8.1

Contact Us

If you have questions about prices and product details, please contact us at:

Contact Us