1. Full Disk Encryption
Full Disk Encryption (FDE) or whole disk encryption protects the entire volume and all files on the
drive against unauthorized access. First line of defense in case device is lost or stolen.
2. URL filtering
This feature allows admins to block and allow URLs so that users can only visit certain websites.
Restricting users’ internet access can increase productivity and protect your organization from
viruses and malicious content found on some websites.
3. Restrict Google Services to Domain
Restrict Google accounts to a certain domains to be used on the browser.
4. Log Management
Admins can set a location (their SIEM or log buckets) where all the device logs are shipped. Evren
parses all logs on the device and converts in a readable Json format for the enterprise customer
teams to use them for monitoring.
5. Certificate Management
Easily deploy, remove and manage device certificates. Device certificates are used for application
authentication, network authentication, or self-signed certificates for internal usage.
6. Application Sandboxing (isolation)
Designed to keep different apps/software on your device isolated from each other. So even if an
app/software gets infected, the rest are designed to stay safe.
7. USB Storage Management
Enable/Disable USB storage on your managed devices with a toggle of a button. No more writing
scripts or using additional tools to do it.
8. Bluetooth Enable/Disable
Enable/Disable Bluetooth on your managed devices with a toggle of a button. No more writing scripts
or using additional tools to do it.
9. Printer Management
Enable/Disable users to be able to add/remove printers on your managed devices with a toggle of a
button. No more writing scripts or using additional tools to do it.
10. Privilege Access Management
Users do not have admin privileges and admin password is only available to IT admin using the OS
manager portal. Admin password is device specific and is valid for 24 hours.
11. Asset Management
Track all assets (laptop/PCs) using Evren OS, with detailed information on the apps, patches and
configuration on each device. Export the list for inventory and finance needs.
12. Monitoring & Reporting
We provide reports and data from device usage, application usage and system reports that help us
understand the usage patters and also for your compliance reporting.
13. Advanced User Management
Able to to handle advanced level options such as password aging, managing users, and so on, on a
day to day basis.
14. Advanced Device Management
Deploying an advanced device management solution allows administrators to securely and remotely
configure enrolled devices. Administrators are able to enroll organization-owned devices, and users
can enroll their own devices. Once a device is enrolled, administrators can update software and device
settings, monitor compliance with organizational policies, remotely erase or lock devices, and install
apps developed in-house.
15. Managed Bookmarks
Set a list of bookmarks that must always be displayed on the user's browser and they cant modify it.
This is used by customers to allow users to have access to latest documentation, company policies
and portal information always available.
16. Application Management
Remotely install/uninstall configure applications using our application management feature. This allows
admins to permit apps that are used by the organization. Helps manage licenses and applications
17. Automated Device Provisioning
Minimize onsite IT support time during deployments. With automated deployments provision new
machines/devices unattended that are ready and a technician or end-user can use.
For example: Driver installation, Common applications that must be installed per PC/User, Antivirus,
SCCM, Hard Disk Encryption, and more
18. Central Device Management
Manage all aspects of user, device and application configuration from anywhere using our OS manager
19. Automated Configuration Management
Eliminates a lot of manual work, and creates greater dependability and predictability. Updates, status
checks and remediation are all done much faster, and if the software includes robust reporting, failed
changes and incorrect configurations will be pinpointed.