1. Full Disk Encryption

Full Disk Encryption (FDE) or whole disk encryption protects the entire volume and all files on the 

drive against unauthorized access. First line of defense in case device is lost or stolen.

2. URL filtering

This feature allows admins to block and allow URLs so that users can only visit certain websites. 

Restricting users’ internet access can increase productivity and protect your organization from 

viruses and malicious content found on some websites.

3. Restrict Google Services to Domain

Restrict Google accounts to a certain domains to be used on the browser.    

4. Log Management

Admins can set a location (their SIEM or log buckets) where all the device logs are shipped. Evren 

parses all logs on the device and converts in a readable Json format for the enterprise customer 

teams to use them for monitoring.

5. Certificate Management

Easily deploy, remove and manage device certificates. Device certificates are used for application 

authentication, network authentication, or self-signed certificates for internal usage.

6. Application Sandboxing (isolation)

Designed to keep different apps/software on your device isolated from each other. So even if an 

app/software gets infected, the rest are designed to stay safe.

7. USB Storage Management

Enable/Disable USB storage on your managed devices with a toggle of a button. No more writing 

scripts or using additional tools to do it.

8. Bluetooth Enable/Disable

Enable/Disable Bluetooth on your managed devices with a toggle of a button. No more writing scripts 

or using additional tools to do it.

9. Printer Management

Enable/Disable users to be able to add/remove printers on your managed devices with a toggle of a 

button. No more writing scripts or using additional tools to do it.

10. Privilege Access Management

Users do not have admin privileges and admin password is only available to IT admin using the OS 

manager portal. Admin password is device specific and is valid for 24 hours.

11. Asset Management

Track all assets (laptop/PCs) using Evren OS, with detailed information on the apps, patches and 

configuration on each device. Export the list for inventory and finance needs.

12. Monitoring & Reporting

We provide reports and data from device usage, application usage and system reports that help us 

understand the usage patters and also for your compliance reporting.

13. Advanced User Management

Able to to handle advanced level options such as password aging, managing users, and so on, on a 

day to day basis.

14. Advanced Device Management

Deploying an advanced device management solution allows administrators to securely and remotely 

configure enrolled devices. Administrators are able to enroll organization-owned devices, and users 

can enroll their own devices. Once a device is enrolled, administrators can update software and device 

settings, monitor compliance with organizational policies, remotely erase or lock devices, and install 

apps developed in-house.

15. Managed Bookmarks

Set a list of bookmarks that must always be displayed on the user's browser and they cant modify it. 

This is used by customers to allow users to have access to latest documentation, company policies 

and portal information always available.

16. Application Management

Remotely install/uninstall configure applications using our application management feature. This allows

admins to permit apps that are used by the organization. Helps manage licenses and applications


17. Automated Device Provisioning

Minimize onsite IT support time during deployments. With automated deployments provision new 

machines/devices unattended that are ready and a technician or end-user can use.

For example: Driver installation, Common applications that must be installed per PC/User, Antivirus, 

SCCM, Hard Disk Encryption, and more

18. Central Device Management

Manage all aspects of user, device and application configuration from anywhere using our OS manager

web portal.

19. Automated Configuration Management

Eliminates a lot of manual work, and creates greater dependability and predictability. Updates, status 

checks and remediation are all done much faster, and if the software includes robust reporting, failed 

changes and incorrect configurations will be pinpointed.