このページはJavaScriptを使用しています。JavaScriptを有効にして、または対応ブラウザでご覧下さい。

Device Security &
Integrated Cloud Management Service

KDDI Cloud Inventory

Provides integrated end point security for IT asset management and detection of client devices that are in violation of security policy.

What is KDDI Cloud Inventory?

Unifies your device security process

Usable from anywhere

Manage from anywhere in the world where you have an Internet connection

Multi-device support

Manage multiple device types, including Windows devices, Mac devices, and mobile devices

Automated security management

Automatic detection and display of devices with security vulnerabilities

3 languages supported

A Web console available in Chinese, English and Japanese

Global contracts

Purchase with a single Japan contract, or purchase through local contracts in other countries’ currencies

Wide variety of security controls

External device restrictions, unauthorized device detection and blocking, behavioral detection and other security features

figure_01

An optimal solution for those troubled by these issues

How can I manage the security of
PCs taken off company grounds?

How can I check for devices
that violate company policy?

How can I stop privately-owned
smartphones from connecting
to the company network?

Features

FunctionalityA wide variety of security-related functions

In addition to security management, KDDI Cloud Inventory provides HDD encryption, external device (USB memory, etc.) restrictions, PC operational log acquisition, behavioral detection (malware detection), and more.

figure_02
  • * indicates for-pay option

EfficiencyMake large reductions in your workload

Automation of security management (automatic vulnerability diagnoses) and asset management frees up your busy system administrators and makes usage easy.

Automatic vulnerability diagnoses

Provides a list of PCs lacking the latest OS and software*2 updates. By automatically located at-risk PCs, your management workload is greatly reduced.

Asset management

Once a day, information is collected from your managed devices, allowing you to manage your assets with accurate information, without the work of collecting it yourself.

  • *2 Software such as Java, Flash, Adobe Reader/Flash Player, Internet browsers, etc.

FlexibilityCloud-based system means you can start small

All you need is an Internet connection. Easily scale as needed, from managing a few dozen devices to tens of thousands.

figure_03

Functions

Asset management

Hardware and software lists License management reports Standalone PC management Application portal
Covers the range of data needed for IT asset management. CSV output is possible. Reports on the license usage status of Microsoft Office, Adobe products, and other software. Collect inventory information for stand-alone PCs. Realize management of all PCs within your company. Lists the applications that can be installed for each company and department.
Lease/rental management Asset search Filter criteria Granting user/
administrator permissions
Takes regular inventory of lease/rental IT assets and equipment and gives warning about the lease/rental periods, etc. Search assets by criteria such as asset management number, manufacturer, department, serial number, user, software, etc. When distributing applications or policies, identify the target client device easily by using filters. Give group administrators authority for policy settings, remote control, client management, and external media management to manage clients for each group.
Alert emails Survey collection Printer management  
Security summary alert emails are automatically sent to registered email addresses once a day. Survey users and collect their responses as inventory data. Collect information such as printer type, IP address and manufacturer name. Change printer driver settings remotely.  

Security Management

Rooting/Jailbreak detection Forced software
updates
Application startup restrictions Network connection control
Detect client devices that have been rooted or jailbroken, with notification emails sent to administrators. You can apply policy so that client devices are always automatically updated to the latest versions of software such as Windows and Adobe Reader. Restrict the applications that can be started on client devices. You can also forcibly close suspicious applications running on client devices. Remotely distribute and apply Wi-Fi settings and VPN settings to client devices using profiles. Restrict client devices to permitted access points only.
SD card and
Bluetooth restrictions
Prevention of ISM client suspension Configuration profile deletion detection Emergency application restrictions
Prevent information leakage by restricting the use of SD cards and Bluetooth. If the client service is stopped, the service is automatically restarted. Detection of when the policy configuration profile of a client device has been deleted. Prohibit use of particular applications on a client device in case of emergencies, such as when the device goes missing, etc.
Acquisition of locational information Remote lock
Reset to factory defaults
Automatic security diagnosis Policy setting for when there is a violation
If a device is lost, you can find it by obtaining location information from it and displaying it on Google Maps and Bing Maps. When theft or loss occurs or a device has been in long-term policy violation, you can remotely lock the device or reset it to factory defaults. Your organization’s security level is rated on a five-point scale based on the recommended security settings and the current status of the managed client devices. You can set a policy for use in the event of a client device violating security policy, and switch offending devices over to that policy as needed.
Antivirus software
application status report
Personal data acquisition consent function Operation console operation logs  
Displays whether anti-virus software is installed or not, pattern file version, etc. Use this function to ask client device users for consent in obtaining data such as inventory and operation logs that could include personal information from their devices. Record and view operation logs for the management console.  

Remote Management

Software distribution
File distribution
Distribute registry values Application deployment
and uninstallation
Remote control
Distribute software and files via your internal network. Add/edit registry values, delete entries, and delete keys on client devices via the Internet. Distribute applications to client devices. ISM client version upgrade is also possible by distributing client modules. Allows operation of (remote control) and file transfer to client devices via the Internet.

Option Management

User operation logs HDD encryption External media use restrictions Behavioral malware detection
Acquire client device operation status via the Internet, and discover fraudulent activity. Collect logs covering the most recent three months. Prevent information leakage due to device theft, loss, etc., by encrypting the entire hard disk and using pre-OS startup authentication. Restrict MTP/PTP communication with USB memory, smartphones, digital cameras, etc., to prevent unnecessary usage. An engine that anticipates malware attack patterns detects, defends, and removes unknown threats.
Communication device restrictions Monthly reports URL filtering  
1. Restrict communication with Bluetooth devices
2. Restrict communication by specifying IP addresses
3. Restrict access point connectivity with SSID specifications
Provision of inventory information at the beginning of each month as a report file (Excel format) Being a cloud-based system means there is no initial investment required for internal servers, and secure Web access is available anytime, anywhere, and on any device. (Only for Japanese language sites)  
  • * The functions and prices you can provide differ depending on the node you are using. Please contact us for details.

Videos

Trial

30 day free trial service

Take this opportunity to check your security level with a free trial, and experience security management using KDDI Cloud Inventory.

Brochure

Provision area

Please contact us from the following.

  • *This is not provided in Japan.

Inquiries about the Service

KDDI Corporate Sales Representative will consult with you and provide you with an estimate for the introduction.
If you have any questions, please feel free to contact us.

* The contents and fees of services provided differ depending on the country of use, so please fill in your request.
*This is not provided in Japan.