KDDI Cloud Inventory

A unified cloud management service for device security

KDDI Cloud Inventory provides centralized endpoint security, such as IT asset management and detection of security policy-violating clients.

An optimal solution for those troubled by these issues

How can I manage the security of
PCs taken off company grounds?

How can I check for devices
that violate company policy?

How can I stop privately-owned
smartphones from connecting
to the company network?

Product overview

Unifies your device
security process

Usable from anywhere

Manage from anywhere in the world where you have an Internet connection

Multi-device support

Manage multiple device types, including Windows devices, Mac devices, and mobile devices

Automated security management

Automatic detection and display of devices with security vulnerabilities

3 languages supported

A Web console available in Chinese, English and Japanese

Global contracts

Purchase with a single Japan contract, or purchase through local contracts in other countries’ currencies

Wide variety of security controls

External device restrictions, unauthorized device detection and blocking, behavioral detection and other security features

Wide variety of security controls


FunctionalityA wide variety of security-related functions

In addition to security management, KDDI Cloud Inventory provides HDD encryption, external device (USB memory, etc.) restrictions, PC operational log acquisition, behavioral detection (malware detection), and more.

A wide variety of security-related functions

EfficiencyMake large reductions in your workload

Automation of security management (automatic vulnerability diagnoses) and asset management frees up your busy system administrators and makes usage easy.

Automatic vulnerability diagnoses

Provides a list of PCs lacking the latest OS and software*2 updates. By automatically located at-risk PCs, your management workload is greatly reduced.

Asset management

Once a day, information is collected from your managed devices, allowing you to manage your assets with accurate information, without the work of collecting it yourself.

  • *2Software such as Java, Flash, Adobe Reader/Flash Player, Internet browsers, etc.

Make large reductions in your workload

FlexibilityCloud-based system means you can start small

All you need is an Internet connection. Easily scale as needed, from managing a few dozen devices to tens of thousands.

Cloud-based system means you can start small

IT Asset Management
HW/SW listing & Exporting License Management
Standalone PCs
Application Portal
Listing HW/SW inventory. The data can be exported by CSV. Reporting MS-Office /Adobe apps Utilization. Inventorying Standalone PCs. A portal site with a list of apps which users can download.
Security Management
Diagnosing Security
Antivirus SW
INSTL Statuses Report
SW Forcible
Banned Apps Detect
& Launch Control
Diagnosing security vulnerability of client devices and indicating security in one of the 5 security levels. Reporting antivirus SW installation status. Applying the policy to enforce updating Wins OS, Adobe Reader and so forth on client devices. Detecting banned Apps and controlling launching them.
NTWK Connection
SD card
/Bluetooth Control
ISM Client Program
Detecting the CNFIG
Profile Deletion
Controlling access connections to Wi-Fi and VPN networks. Restricting access the data on SD card/Bluetooth. Restarting the ISM client program automatically whenever it is stopped. Detecting the CNFIG profile is deleted.
Apps Launching
Locating the client devices Remote Lock/Wipe Rooted/Jail broken
Device Findings
Restricting the usage of specified apps when a device is lost or stolen. Locating the lost device on Google Maps/BingMaps, helped by GPS. Remote Locking or wiping out the lost/stolen devices or a failure in compliance. Finding rooted /jail broken devices and notifying the ADMIN by mail.
Setting Up
Stringent Policy
Defender Control Communication device restrictions External Media Control*1
Assigning or switching to the pre-defined stringent policy on a failure in compliance. Allows you to control Windows Defender settings and see the existing settings and malware detected for each managed device. 1. Restrict communication with Bluetooth devices
2. Restrict communication by specifying IP addresses
3. Restrict access point connectivity with SSID specifications
Placing restrictions on external media such as USB memory devices.
Collecting User Operation Logs*1 HDD Encryption*1 Behavioral detection*1 Log analytics*1
Collecting user operation logs from PCs via the Internet to reveal policy-violating activities on those PCs. Encrypting an entire hard drive, not only the OS, which provides stronger security and protects managed devices from data theft. Unknown threats are detected,stopped and removed using engines that predict malware behavior. Collect PC operation logs that show who did what and when. Check PC operational status, or take advantage of various features including logs of when webconferences were held. Long-term storage (up to 7 years' worth of logs) lets you quickly investigate even past incidents.
Remote Management
Remote control
(simplified version)
Software Distribution
Folder Transfer
App Distribution
& Uninstallation
Quick Remote Control
(high-performance version)
Allows operation of (remote control) and file transfer to client devices via the Internet. Distributing software, folders and files via the premise network. Distributing and uninstalling apps on client devices. Enables administrators to perform high-speed, stress-free remote control of PCs at regional offices or of those working from home.
Other Features
Monthly reports      
Each month, inventory data for the start of that month is provided in a report file (Excel format)      

*1 Option

  • * Depending on the node to be used, the functionality that can be provided and the price of service vary. Please contact us for details.

【KDDI Cloud Inventory】Introduction of this service.
Service introduction

【KDDI Cloud Inventory】サービスの概要
Service outline

【KDDI Cloud Inventory】Dashboard
About the Dashboard

【KDDI Cloud Inventory】Automatic Vulnerability Diagnosis
Automatic Vulnerability Diagnosis

【KDDI Cloud Inventory】Hardware Infomation
Hardware Infomation

【KDDI Cloud Inventory】Software Infomation
Software Infomation

【KDDI Cloud Inventory】End User's Operational Logs
Operational Log Acquisition

【KDDI Cloud Inventory】External Storage Devices Control
External Device Restrictions

【KDDI Cloud Inventory】Behavior-based Malware Analysis & Detection
Behavioral Detection

Contact Us

If you have questions about prices and product details, please contact us at:


Office Hours:9:00~17:15
(Closed Saturday, Sunday and National Holidays)

  • KDDI Hong Kong Facebook Page
  • KDDI Hong Kong LinkedIn Page

Contact Us


Office Hours:9:00~17:15
(Closed Saturday, Sunday and National Holidays)

Inquiry Form