

What is CEM?

4 Traits of CEM
A CLOUD SERVICE
Manage it only with an internet connection and from all kind of locations whether it is from office, home or branch office, store or even overseas
SPOT THE PROBLEM WITH ONLY ONE GLANCE
Displays security status as a graph on the management screen. A terminal that needs an improvement can be operated easily by anyone
SUPPORTS TELEWORK
Automatically visualizes if there's any vulnerabilities. Also provides a countermeasure in case of information leak
VISUALIZES TELEWORKER'S WORKING SITUATION
Visualizes teleworker's history of PC usage and attendance. Also confirms employee's activities situation through the log acquisition
What Can You Get From CEM?
Benefits of CEM


SIMPLE MANAGEMENT
Set your organization's policy just in a snap.
Manage your organization's endpoint security and monitor each endpoint agent's security alert messages in real-time
CEM provides a secure environment with just one tool
Features of CEM

What Can CEM Provides?
Security Countermeasures
URL
FIltering
External Device
Control
Behavioral
Detection
Operation
Log Acquisition
Disk
Encryption
Automatic
Vulnerability Diagnosis
IT Asset Management
Hardware & Software
Management
Hardware
Contract Management
License
Management
File & Software
Distribution
Remote
Control
Group Company
Management
Smart Device Management
Mobile Device
Management
Application
Management
Emergency Operation
for Data Loss
Location Information
Acquisition
Working Hours Management
Working Style
Reformation Support
A Free 30-Days Trial of Cloud Endpoint Management by ISM CloudOne
PT. Netmarks Indonesia can offer the free trial of Cloud Endpoint Management (CEM) by ISM CloudOne for 30 days. If you are interested, please contact us from here and tell us that you want to try Cloud Endpoint Management (CEM). Our person in charge will contact you by email to provide you 30-day trial credentials to login to Cloud Endpoint Management (CEM) Server and other necessary information.
System Requirements :
The expected Web-console machine and managed endpoints have to be accessible to the Internet – data are transferable via HTTP and HTTPS protocols.
Functions Available for Trial
-
Scanning hardware and software inventory data from endpoints and uploading to ISM Client Server.
-
Generating/displaying a security diagnostic result
-
Generating/displaying reports:
Computers with applications unpatched
Computers with no antivirus software
Computers installed with “banned (prohibited) software”
Software license gap
Hardware inventory
Software inventory -
Managing mobile devices including Android, iPhone, iPad/iPad2 and the third generation iPad
-
Managing printers
Note: Forcible application of Windows updates is not workable under the WSUS environment.