Usable from anywhere
Manage from anywhere in the world where you have an Internet connection
Manage multiple device types, including Windows devices, Mac devices, and mobile devices
Automated security management
Automatic detection and display of devices with security vulnerabilities
3 languages supported
A Web console available in Chinese, English and Japanese
Purchase with a single Japan contract, or purchase through local contracts in other countries’ currencies
Wide variety of security controls
External device restrictions, unauthorized device detection and blocking, behavioral detection and other security features
How can I manage the security of
PCs taken off company grounds?
How can I check for devices
that violate company policy?
How can I stop privately-owned
smartphones from connecting
to the company network?
In addition to security management, KDDI Cloud Inventory provides HDD encryption, external device (USB memory, etc.) restrictions, PC operational log acquisition, behavioral detection (malware detection), and more.
Automation of security management (automatic vulnerability diagnoses) and asset management frees up your busy system administrators and makes usage easy.
Automatic vulnerability diagnoses
Provides a list of PCs lacking the latest OS and software*2 updates. By automatically located at-risk PCs, your management workload is greatly reduced.
Once a day, information is collected from your managed devices, allowing you to manage your assets with accurate information, without the work of collecting it yourself.
All you need is an Internet connection. Easily scale as needed, from managing a few dozen devices to tens of thousands.
|Hardware and software lists||License management reports||Standalone PC management||Application portal|
|Covers the range of data needed for IT asset management. CSV output is possible.||Reports on the license usage status of Microsoft Office, Adobe products, and other software.||Collect inventory information for stand-alone PCs. Realize management of all PCs within your company.||Lists the applications that can be installed for each company and department.|
|Lease/rental management||Asset search||Filter criteria||Granting user/
|Takes regular inventory of lease/rental IT assets and equipment and gives warning about the lease/rental periods, etc.||Search assets by criteria such as asset management number, manufacturer, department, serial number, user, software, etc.||When distributing applications or policies, identify the target client device easily by using filters.||Give group administrators authority for policy settings, remote control, client management, and external media management to manage clients for each group.|
|Alert emails||Survey collection||Printer management|
|Security summary alert emails are automatically sent to registered email addresses once a day.||Survey users and collect their responses as inventory data.||Collect information such as printer type, IP address and manufacturer name. Change printer driver settings remotely.|
|Rooting/Jailbreak detection||Forced software
|Application startup restrictions||Network connection control|
|Detect client devices that have been rooted or jailbroken, with notification emails sent to administrators.||You can apply policy so that client devices are always automatically updated to the latest versions of software such as Windows and Adobe Reader.||Restrict the applications that can be started on client devices. You can also forcibly close suspicious applications running on client devices.||Remotely distribute and apply Wi-Fi settings and VPN settings to client devices using profiles. Restrict client devices to permitted access points only.|
|SD card and
|Prevention of ISM client suspension||Configuration profile deletion detection||Emergency application restrictions|
|Prevent information leakage by restricting the use of SD cards and Bluetooth.||If the client service is stopped, the service is automatically restarted.||Detection of when the policy configuration profile of a client device has been deleted.||Prohibit use of particular applications on a client device in case of emergencies, such as when the device goes missing, etc.|
|Acquisition of locational information||Remote lock
Reset to factory defaults
|Automatic security diagnosis||Policy setting for when there is a violation|
|If a device is lost, you can find it by obtaining location information from it and displaying it on Google Maps and Bing Maps.||When theft or loss occurs or a device has been in long-term policy violation, you can remotely lock the device or reset it to factory defaults.||Your organization’s security level is rated on a five-point scale based on the recommended security settings and the current status of the managed client devices.||You can set a policy for use in the event of a client device violating security policy, and switch offending devices over to that policy as needed.|
application status report
|Personal data acquisition consent function||Operation console operation logs|
|Displays whether anti-virus software is installed or not, pattern file version, etc.||Use this function to ask client device users for consent in obtaining data such as inventory and operation logs that could include personal information from their devices.||Record and view operation logs for the management console.|
|Distribute registry values||Application deployment
|Distribute software and files via your internal network.||Add/edit registry values, delete entries, and delete keys on client devices via the Internet.||Distribute applications to client devices. ISM client version upgrade is also possible by distributing client modules.||Allows operation of (remote control) and file transfer to client devices via the Internet.|
|User operation logs||HDD encryption||External media use restrictions||Behavioral malware detection|
|Acquire client device operation status via the Internet, and discover fraudulent activity. Collect logs covering the most recent three months.||Prevent information leakage due to device theft, loss, etc., by encrypting the entire hard disk and using pre-OS startup authentication.||Restrict MTP/PTP communication with USB memory, smartphones, digital cameras, etc., to prevent unnecessary usage.||An engine that anticipates malware attack patterns detects, defends, and removes unknown threats.|
|Communication device restrictions||Monthly reports||URL filtering|
|1. Restrict communication with Bluetooth devices
2. Restrict communication by specifying IP addresses
3. Restrict access point connectivity with SSID specifications
|Provision of inventory information at the beginning of each month as a report file (Excel format)||Being a cloud-based system means there is no initial investment required for internal servers, and secure Web access is available anytime, anywhere, and on any device. (Only for Japanese language sites)|
Take this opportunity to check your security level with a free trial, and experience security management using KDDI Cloud Inventory.
Please contact us from the following.
KDDI Corporate Sales Representative will consult with you and provide you with an estimate for the introduction.
If you have any questions, please feel free to contact us.
* The contents and fees of services provided differ depending on the country of use, so please fill in your request.
*This is not provided in Japan.