By implementing our CAT system (Check, Action, Trace), we build the systems you need to manage your important assets, perform information security measures and stop leaks in their tracks.
- Update hardware and software information everyday to maintain an accurate environment without hassle of management tasks.
- By managing PC operations logs, it is possible to improve security and find problems in emergencies, without reducing operational efficiency.
- Monitor web site use, and limit access to illicit sites.
- Control use of devices such as USBs and CDs, and prevent the leaking of important secret information.
- LanScope Cat Protection includes CylancePROTECTR, an endpoint malware prevention product powered by artificial intelligence and machine learning.
Automatically collect over 50 types of hardware information, such as computer name and IP address, as well as optionally set registry data. Optionally record and manage printers and other peripheral devices. Also, it is possible to check necessary information by searching with a variety of conditions.
Check program updates, messages and questionnaires, and whether program updates are installed on PCs. Classify permitted and forbidden apps and manage information such as how many machines each app is installed on and their product keys.
Operation Log Management
Operation Log Management
Record "who" did "what" "when" at "which PC". If some operational violation that could be an information leak occurs, such as writing a customer list to a USB, a warning is displayed to the user, and the illicit operation is prevented.
See the status of PCs in a color-coded graph.
Print Log Management
Record "who" printed "how many pages" of "what" "when" at "which PC". Discover wasteful printing and reduce costs. If particular files are printed, a warning is displayed to the user and illicit printing is prevented.
App Usage Management
Record "who" used "which app" "when" at "which PC". See how many instances of each app are running on PCs and for how long. Reduce wasteful license costs by allotting the ideal number of licenses.
Prohibit launching illicit apps or apps unrelated to work. If a particular app is launched, a warning is displayed to the user and apps such as games or those that can result in information leaks are suppressed.
Web Access Management
Web Access Management
Record "who" views "which web site" "when" on "which computer". If an illicit web site is viewed, it is possible to display an alarm or block access. Also, it is possible to limit uploads and downloads and record what information is posted to the web in Internet Explorer.
Designate keywords to only allow access to specific web sites.Create an environment where only web sites necessary for work, such as groupware and cloud services, can be accessed.
Manage all company devices and limit their use. If a prohibited device is connected, the user is notified that it is prohibited and illicit use is controlled. Also, allow device use in limited situations through setting detailed conditions by PC and device to adapt to the workplace.
Set usage limits for each terminal
Control or forbid the use of CDs, DVDs, USBs, etc. by type. Also, flexible settings allow each PC to be set to disable reading and writing, disable only writing, etc.
Set USB permissions
Designate device names (nicknames), manufacturer numbers (serial numbers), or only allow company-issued devices and forbid the use and connection of other devices.
|OS||Windows Server 2008 (32bit/ 64bit)/ 2008 R2/ 2012/ 2012 R2/ 2016|
|Memory||4 GB or more|
|HDD free space||200 GB or more|
|Database||SQL Server 2008/ 2008 R2/ 2012/ 2014|
|Web Console Browser||Internet Explorer 10/ 11/ Google Chrome Ver.43.0.2357/ Mozilla Firefox Ver.38.0.5|
|OS||Windows XP/ Vista/ 7/ 8/ 8.1/ 10 Windows Server 2003/ 2003 R2/ 2008/ 2008 R2/ 2012/ 2012 R2/ 2016|
|CPU||300 MHz or more|
|Memory||128 MB or more|
|HDD free space||50 MB or more|
For more information, visit www.lanscope.jp/cat/en/
With close to 2 decades of experience working with Japan, we have come up with a evolving and mature process to carry out the efficient offshoring of work to India.
Unikaihatsu provide various models where the actual work implemented in India varies based on client requirements. The cost advantage rises when as the percentage of work carried out in India increases.
With the above approach to offshoring, we provide the following benefits
- Cost Reduction of overall development
- Project based order
- Offshore Development Center model
- Quick Support of skilled IT resources in Offshore, at the time of tight project schedules
- Cost reduction by offshoring Maintenance and Back Office Operations