• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

IIJ Global Solutions Singapore, Providing Cloud and Security Solutions

  • Home
  • Products
    • Zero Trust
    • Email Security
    • Email Phishing Training
    • Cloud Backup
    • Vulnerability Management
    • Endpoint Management
    • Log Management
    • IoT Remote Maintenance
    • Firewall Management
    • Secure Remote Desktop
  • Solutions
    • DX Edge Data Center
    • Logs Management Solution
    • Telework Solutions
    • System Integration
    • Cloud Services
    • Office IT Solutions
    • Retail IT Solutions
  • Blog
  • Materials
  • About Us
  • Careers
  • Contact Us
  • Site Map
  • 日本語ページ
    • 会社概要
    • ソリューション
You are here: Home / Endpoint Management

Endpoint Management

LanScopeCat_header


About LanScope Cat

LanScopeCat_logo

  • LanScope Cat is the number one integrated endpoint management tool that has been selected by more than 10,000 customers, in and out of Japan.
  • Designed to meet the IT security and productivity management (Asset management, Log management, Web management and Device management) needs of small to mid-size businesses facing increasing responsibilities with limited resources.
  • Providing threat protection (Cylance Protect), user behavior analysis, and asset management capabilities to ensure the compliance, productivity, and security of your business.
  • IIJ Global Solutions Singapore Pte. Ltd. is the sole distributor in Asia Pacific region.


The Summary of LanScope Cat

  • IT Asset (Inventory) Management
  • Log Management
  • Web access and Device control
  • AI basis Anti-Malware (Cylance Protect)

LanScopeCat_Summary
The detailed functions of LanScope Cat

LanScopeCat_all_functions


Supporting Cloud and On-Premises Server 

LanScope_Infra

 

About Protect Cat

ProtectCat_logo

  • Equipped with Cylance’s AI engines, Protect Cat detect and quarantine known/unknown malware and track from where they invade. Reduce the effort to investigate and identify the cause in the course of countermeasures to malware. Prevent a recurrence by taking corrective action for the user operation that caused the error.
  • Analyze the elements of a file that the AI engine detects as a threat and find out more about malware. By sharing analysis and judgment result of other companies, taking action on the relevant file will be easier. Once the operation starts, the system automatically quarantines malware, and no administrator effort is required.
  • The artificial intelligence algorithm on the endpoint determines whether the file is malware or not. Therefore the CPU load on the client terminal is very light * and there is no need to update the pattern file.
    * 0.31% average CPU utilization


Next-generation AI engine

ProtectCat_Summary


Key Functions of LanScope Cat


LanScope Cat Introduction Material can be downloaded here.

  • LanScope Cat Introduction

Primary Sidebar

Recent Posts

  • New Mail Audit option for IIJ SecureMX Service has been released
  • <ゼロトラストを活用した海外現地法人セキュリティ改善ウェビナー>
  • We have moved! (February 2022)
  • 5 crucial measures to protect from Ransomware
  • IIJ Launches New Managed ZTNA Secure Access Service; Safous

Categories

  • Acronis
  • ALog
  • Blog
  • Company
  • LanScope
  • Ransomware
  • Safous
  • SecureMX
  • Security
  • Telework
  • ZeroTrust

Tags

Acronis ALog BEC LanScope SecureMX Security Telework Zerotrust

Archives

  • August 2022
  • May 2022
  • February 2022
  • October 2021
  • September 2021
  • December 2020
  • November 2020
  • October 2020

Footer

Company Profile

IIJ Global Solutions Singapore Pte. Ltd.

Tel : +65-6773-6903

Location : 8 Burn Road #07-08 Trivex Singapore 369977

follow us in feedly

Recent Posts

  • New Mail Audit option for IIJ SecureMX Service has been released
  • <ゼロトラストを活用した海外現地法人セキュリティ改善ウェビナー>
  • We have moved! (February 2022)
  • 5 crucial measures to protect from Ransomware
  • IIJ Launches New Managed ZTNA Secure Access Service; Safous
  • We have launched a Special Website of our Log Management Solution
  • 3 measures to prevent Business E-mail Compromise(BEC) attacks
  • How to maintain the security level of your devices in the telework situation?

Search

Privacy Policy/Terms of Use

Privacy Policy

Terms of Use

Home

IIJ_Singapore_header
© IIJ Global Solutions Singapore Pte. Ltd. All rights reserved.
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT