Endpoint Manager is deployed by over 20,000 companies
*Number of companies implementing LANSCOPE Endpoint Manager cloud version on-premises version (according to our research)
■Integrated endpoint management supported by LANSCOPE Endpoint Manager on-premises version
In order to increase a company's productivity and protect important information assets at the same time, it is important to manage "endpoints." LANSCOPE Endpoint Manager On-Premise Edition integrates the functions required for endpoint management and supports simple and efficient management.
・IT asset management
・Software asset management
・File distribution
・Remote control
・Operation log management
・Web access management
・Device control
・Email management
・Malware countermeasures
・App ID audit
・Server monitoring
・Unauthorized PC blocking
4 reasons to choose LANSCOPE Endpoint Manager On-Premise Edition
Ease of use
■ITreview leader acquisition Simple and easy-to-use report
The collected information is displayed in an easy-to-understand report, and anyone can operate it intuitively. Awarded LEADER on the review platform "ITreview". We have received high praise from our customers.
Multi-OS/global compatible
■Compatible with Windows as well as Mac The management console can be displayed in English for overseas PCs as well.
We support the realization of IT asset management globally regardless of the OS of the device. It has functions such as automatic collection of device information, software management and distribution, and bulk installation.
Information leakage measures
■Measures against internal fraud by recording data export operations via email and USB
You can obtain operation logs and understand when/who/what operations were performed on in-house PCs. In addition to acquiring logs, it is also possible to send alarm notifications in real time if rules are violated.
Antivirus
■The industry's top AI antivirus protects against 99% of unknown threats*
"Predictive Threat Prevention" utilizes patented AI (artificial intelligence) technology to find distinctive features of malware and detect and isolate even unknown threats before they are executed. It is possible to easily investigate the cause of malware intrusion from the operation log.
*From 2,018NSSLabsAdvancedEndpointProtectionTest results
This is the version of our website addressed to speakers of English in
the United States.
If you are a resident of another country, please select the appropriate version of Metoree for your country in the drop-down menu.