komputer 3.PNG

What is CEM?

 

4 Traits of CEM

A CLOUD SERVICE

Manage it only with an internet connection and from all kind of locations whether it is from office, home or branch office, store or even overseas

SPOT THE PROBLEM WITH ONLY ONE GLANCE

Displays security status as a graph on the management screen. A terminal that needs an improvement can be operated easily by anyone

SUPPORTS TELEWORK

Automatically visualizes if there's any vulnerabilities. Also provides a countermeasure in case of information leak

VISUALIZES TELEWORKER'S WORKING SITUATION

Visualizes teleworker's history of PC usage and attendance. Also confirms employee's activities situation through the log acquisition

What Can You Get From CEM?

Benefits of CEM

Work Desk

SIMPLE MANAGEMENT

Set your organization's policy just in a snap.

Manage your organization's endpoint security and monitor each endpoint agent's security alert messages in real-time

CEM provides a secure environment with just one tool

Features of CEM

What Can CEM Provides?

 
 
Security Countermeasures

URL

FIltering

External Device

Control

Behavioral

Detection

Operation

Log Acquisition

Disk

Encryption

Automatic

Vulnerability Diagnosis

IT Asset Management

Hardware & Software

Management

Hardware

Contract Management

License

Management

File & Software

Distribution

Remote

Control

Group Company

Management

Smart Device Management

Mobile Device

Management

Application

Management

Emergency Operation

for Data Loss

Location Information

Acquisition

Working Hours Management

Working Style

Reformation Support

 

A Free 30-Days Trial of Cloud Endpoint Management by ISM CloudOne

PT. Netmarks Indonesia can offer the free trial of Cloud Endpoint Management (CEM) by ISM CloudOne for 30 days. If you are interested, please contact us from here and tell us that you want to try Cloud Endpoint Management (CEM). Our person in charge will contact you by email to provide you 30-day trial credentials to login to Cloud Endpoint Management (CEM) Server and other necessary information.

System Requirements :

The expected Web-console machine and managed endpoints have to be accessible to the Internet – data are transferable via HTTP and HTTPS protocols. 

Functions Available for Trial

  • Scanning hardware and software inventory data from endpoints and uploading to ISM Client Server.

  • Generating/displaying a security diagnostic result

  • Generating/displaying reports:
    Computers with applications unpatched
    Computers with no antivirus software
    Computers installed with “banned (prohibited) software”
    Software license gap
    Hardware inventory
    Software inventory

  • Managing mobile devices including Android, iPhone, iPad/iPad2 and the third generation iPad

  • Managing printers
    Note: Forcible application of Windows updates is not workable under the WSUS environment.