Evren OS Feature Listing
1. Full Disk Encryption
Full Disk Encryption (FDE) or whole disk encryption protects the entire volume and all files on the drive against unauthorized access. The first line of defense is if the device is lost or stolen.
2. URL filtering
This feature allows admins to block and allow URLs so that users can only visit certain websites. Restricting users’ internet access can increase productivity and protect your organization from viruses and malicious content on some websites.
3. Restrict Google Services to Domain
Restrict Google accounts to a particular domain to be used on the browser.
4. Log Management
Admins can set a location (their SIEM or log buckets) where all the device logs are shipped. Evren parses all logs on the device and converts them into a readable JSON format for the enterprise customer teams to monitor.
5. Certificate Management
Efficiently deploy, remove, and manage device certificates. Device certificates are used for application authentication, network authentication, or self-signed certificates for internal usage.
6. Application Sandboxing (Isolation)
Designed to keep different apps/software on your device isolated from each other. So, even if an app/software gets infected, the rest are designed to stay safe.
7. USB Storage Management
Enable/Disable USB storage on your managed devices with a toggle button. No more writing scripts or using additional tools to do it.
8. Bluetooth Enable/Disable
Enable/Disable Bluetooth on your managed devices with a toggle button. No more writing scripts or using additional tools to do it.
9. Printer Management
Enable/Disable users to be able to add/remove printers on your managed devices with a toggle button. No more writing scripts or using additional tools to do it.
10. Privilege Access Management
Users do not have admin privileges, and the admin password is only available to IT admin using the OS manager portal. The admin password is device-specific and is valid for 24 hours.
11. Asset Management
Track all assets (laptop/PCs) using Evren OS, with detailed information on each device's apps, patches, and configuration. Export the list for inventory and finance needs.
12. Monitoring & Reporting
We provide reports and data from device usage, application usage, and system reports that help us understand the usage patterns and also for your compliance reporting.
13. Advanced User Management
Able to handle advanced level options such as password aging, managing users, and so on, on a day-to-day basis.
14. Advanced Device Management
Deploying an advanced device management solution allows administrators to securely and remotely configure enrolled devices. Administrators can enroll organization-owned devices, and users can register their own devices. Once a device is registered, administrators can update software and device settings, monitor compliance with organizational policies, remotely erase or lock devices, and install apps developed in-house.
15. Managed Bookmarks
Set a list of bookmarks that must always be displayed on the user's browser, and they can't modify it. Customers use this to allow users to have access to the latest documentation, company policies, and portal information is always available.
16. Application Management
Remotely install/uninstall configure applications using our application management feature. This allows admins to permit apps that the organization operates. It helps manage licenses and applications efficiently.
17. Automated Device Provisioning
Minimize onsite IT support time during deployments. Automated deployments provision new unattended machines that are ready and that a technician or end-user can use. For example, Driver installation, Common applications must be installed per PC/User, Antivirus, SCCM, Hard Disk Encryption, and more.
18. Central Device Management
Manage all user, device, and application configuration aspects from anywhere using our OS manager web portal.
19. Automated Configuration Management
It eliminates much manual work and creates more excellent dependability and predictability. Updates, status checks, and remediation are all done much faster, and if the software includes robust reporting, failed changes and incorrect configurations will be pinpointed.