Everest Cloud Inventory (Endpoint security service)
Rich features combined with simple operation enables integrated and streamlined IT management
IT asset management work has been extended recently to cover smartphones, virtual machines and more. The Everest Cloud Inventory centralizes global multi-device management services over endpoints such as Android, iOS mobiles, desktops and notebooks (Windows/Macintosh) both within and external to your business offices.
- The cloud approach makes endpoint management operations global and transparent.
- A single web-console covers all endpoints from desktops to mobile devices.
- Endpoint management tasks are easily streamlined into automated actions.
- Trilingual user interfaces extend endpoint management tasks to English, Chinese and Japanese speaking IT staff.
- Centrally managed security policies reach diverse global endpoints.
Centralized Multi-Device Management Endpoints Over the World
From a single web console, "Everest Cloud Inventory" allows the centralized management of endpoints including Windows PCs, Macintosh computers, and both Android and iOS mobile operating systems. The endpoints are under the management of headquarters or subsidiaries, whether located in the office or anywhere in the world.
The versatility of Everest Cloud Inventory is based on the Internet and cloud computing. In other words, Internet connectivity is the only prerequisite for Everest Cloud Inventory to function.
Everest Cloud Inventory is a cloud solution that keeps endpoint configurations and applications secure thus providing stable usability for workforces in line with your organization's security policy, public regulations and compliance directives. The solution will cut costs and complexities; plus, it will reduce your IT department's daily workload by optimizing the endpoint management tasks.
Management workload reduction through automatic device security diagnosis
Based on the Security Profile that we develop and update daily, our viable anti-threat definitions including malware and vulnerability countermeasures, your organization as a whole is automatically rated in a scheme of security levels and has easy access to detailed reports. Those responsible for security view the dashboard to view present corporate risk levels . The dashboard, with its use of colours and scales, provides easy-to-read diagnosis.
A Free 30-Day Trial
We can offer the free trial of Everest Cloud Inventory for 30 days
|IT Asset Management|
|HW/SW listing & Exporting||License Management
|Listing HW/SW inventory. The data can be exported by CSV.||Reporting MS-Office /Adobe apps Utilization.||Inventorying Standalone PCs.||A portal site with a list of apps which users can download.|
INSTL Statuses Report
|Banned Apps Detect
& Launch CNTRL
|Diagnosing security vulnerability of client devices and indicating security in one of the 5 security levels.||Reporting antivirus SW installation status.||Applying the policy to enforce updating Wins OS, Adobe Reader and so forth on client devices.||Detecting banned Apps and controlling launching them.|
|ISM Client Program
|Detecting the CNFIG
|Controlling access connections to Wi-Fi and VPN networks.||Restricting access the data on SD card/Bluetooth.||Restarting the ISM client program automatically whenever it is stopped.||Detecting the CNFIG profile is deleted.|
|Locating the client devices||Remote Lock/Wipe||Rooted/Jail broken
|Restricting the usage of specified apps when a device is lost or stolen.||Locating the lost device on Google Maps/BingMaps, helped by GPS.||Remote Locking or wiping out the lost/stolen devices or a failure in compliance.||Finding rooted /jail broken devices and notifying the ADMIN by mail.|
|Assigning or switching to the pre-defined stringent policy on a failure in compliance.|
|Remote CNTRL||Software Distribution
|Remote controlling client PCs via the premise network.||Distributing software, folders and files via the premise network.||Distributing and uninstalling apps on client devices.|
|Lease/Rental MGMT||IT Asset Searching||Gathering Questionnaire Data Entries||URL Filtering|
|Inventorying lease /rental assets and checking for terminations in advance for notification or alert.||Finding the assets by serial No, user name, software, etc||Gathering questionnaire data that users have provided on a form, and putting them into other inventory data.||Finding the target clients by common properties or keywords.|
|External Media CNTL||Collecting user operation logs||HDD Encryption|
|Controlling external media such as USB memory devices.||Collecting user operation logs on PCs via the internet and makes clear the inappropriate activities of PC.||Encryption the whole hard disk. Certification before the OS start.|
Endpoint system requirements
10.4 - 10.11
2.2 or later
4.3 - 8.1