Vuzix Smart Glasses

Hands-Free Mobile Computing

Real-time video/audio collaboration mobile device built for Enterprise

Vuzix M300 Smart Glasses

Vuzix M300 Smart Glasses is a hands-free wearable device for real-time collaboration. It ensures interactive communication with the supports of different applications. Customer is able to provide remote helpdesk support and monitor business operations in hands-free and heads-up environment from a distance via Vuzix M300.

Benefits - Vuzix M300 Smart Glasses

Ergonomic Design

Vuzix M300 Smart Glasses are ergonomically designed and enhanced with a monocular display and onboard processor, large internal storage, recording features and robust wireless connectivity capabilities.

Versatility to Navigate

Vuzix M300 Smart Glasses equipped with an integrated head tracking system providing apps with the direction and angle of user’s current view for environmental awareness. The glasses are also equipped with touch pad with gesture controls and ruggedized against water, dust and dirt. It gives the user versatility to navigate and enables to work in almost every working environment. There are extra extensive accessories available for different requirements.

Compatible with Thousands of Apps

The Vuzix M300 Smart Glasses is Android-based wearable computer. The pre-installed apps can be used to track timed events, manage your calendar, and link to your phone and more. The Android-based glasses can also be compatible with thousands of existing Android apps from app store and easily access to different developer resources to enable the creation of custom apps to suit any needs virtually. In addition, the glasses can also equipped with VUZIX Basics™ Apps which is a platform of essential out-of-box applications optimized for use with Vuzix smart glasses for immediate deployment to the workforce.

IT Asset Management
HW/SW listing & Exporting License Management
Standalone PCs
Application Portal
Listing HW/SW inventory. The data can be exported by CSV. Reporting MS-Office /Adobe apps Utilization. Inventorying Standalone PCs. A portal site with a list of apps which users can download.
Security Management
Diagnosing Security
Antivirus SW
INSTL Statuses Report
SW Forcible
Banned Apps Detect
& Launch Control
Diagnosing security vulnerability of client devices and indicating security in one of the 5 security levels. Reporting antivirus SW installation status. Applying the policy to enforce updating Wins OS, Adobe Reader and so forth on client devices. Detecting banned Apps and controlling launching them.
NTWK Connection
SD card
/Bluetooth Control
ISM Client Program
Detecting the CNFIG
Profile Deletion
Controlling access connections to Wi-Fi and VPN networks. Restricting access the data on SD card/Bluetooth. Restarting the ISM client program automatically whenever it is stopped. Detecting the CNFIG profile is deleted.
Apps Launching
Locating the client devices Remote Lock/Wipe Rooted/Jail broken
Device Findings
Restricting the usage of specified apps when a device is lost or stolen. Locating the lost device on Google Maps/BingMaps, helped by GPS. Remote Locking or wiping out the lost/stolen devices or a failure in compliance. Finding rooted /jail broken devices and notifying the ADMIN by mail.
Setting Up
Stringent Policy
Assigning or switching to the pre-defined stringent policy on a failure in compliance.      
Remote Management
Remote Control Software Distribution
Folder Transfer
App Distribution
& Uninstallation
Remote controlling client PCs via the premise network. Distributing software, folders and files via the premise network. Distributing and uninstalling apps on client devices.
Lease/Rental Management IT Asset Searching Gathering Questionnaire Data Entries  
Inventorying lease/rental assets and notifying/alerting about terminations in advance. Finding assets by serial number, user name, software, etc. Gathering questionnaire answers that users have provided and storing them as inventory data.  
External Media Control Collecting User Operation Logs HDD Encryption
Placing restrictions on external media such as USB memory devices. Collecting user operation logs from PCs via the Internet to reveal policy-violating activities on those PCs. Encrypting an entire hard drive, not only the OS, which provides stronger security and protects managed devices from data theft.
Behavioral detection Unauthorized device detection    
Unknown threats are detected,stopped and removed using engines that predict malware behavior. If a device without a KCI agent attempts to connect to the network, the device will be blocked and a notification will be sent to the administrator.    
  • * Depending on the node to be used, the functionality that can be provided and the price of service vary. Please contact us for details.

【KDDI Cloud Inventory】Introduction of this service.
Service introduction

【KDDI Cloud Inventory】サービスの概要
Service outline

【KDDI Cloud Inventory】Dashboard
About the Dashboard

【KDDI Cloud Inventory】Automatic Vulnerability Diagnosis
Automatic Vulnerability Diagnosis

【KDDI Cloud Inventory】Hardware Infomation
Hardware Infomation

【KDDI Cloud Inventory】Software Infomation
Software Infomation

【KDDI Cloud Inventory】End User's Operational Logs
Operational Log Acquisition

【KDDI Cloud Inventory】External Storage Devices Control
External Device Restrictions

【KDDI Cloud Inventory】Behavior-based Malware Analysis & Detection
Behavioral Detection

Contact Us

If you have questions about prices and product details, please contact us at:


Office Hours:9:00~17:15
(Closed Saturday, Sunday and National Holidays)

  • KDDI Hong Kong Facebook Page
  • KDDI Hong Kong LinkedIn Page

Contact Us


Office Hours:9:00~17:15
(Closed Saturday, Sunday and National Holidays)

Inquiry Form