Vendors
日本語

Lookwise Device Manager

Create a vendor selection project
Click to express your interest in this report
Indication of coverage against your requirements
A subscription is required to activate this feature. Contact us for more info.
Celent have reviewed this profile and believe it to be accurate.
We are waiting for the vendor to publish their solution profile. Contact us or request the RFX.
Projects allow you to export Registered Vendor details and survey responses for analysis outside of Marsh CND. Please refer to the Marsh CND User Guide for detailed instructions.
Download Registered Vendor Survey responses as PDF
Contact vendor directly with specific questions (ie. pricing, capacity, etc)

Overview

Lookwise Device Manager is a modular security platform that centralizes policy definition and operations at a single point allowing you to protect thousands of IT equipment, and favouring compliance with security regulations or corporate policies.

It allows you to manage the security of the critical devices of your organization by centrally protecting, monitoring and controlling your assets.

Lookwise Device Manager is a perfect-fit solution for ensuring high security standards in fix-purpose devices that are critical to the business, such as ATMs, point of sale terminals, critical infrastructure control systems.

Key Features

PROTECTION

Protects your equipment against malicious attacks by blocking access to unauthorized resources, based on white lists.

MONITORING

Obtain information on the Hardware & Software installed on your equipment and centrally monitor the existence of patterns or evidence that might be indicative of security problems or fraudulent activities

CONTROL

Remotely execute actions on your equipment, thus facilitating operations & maintenance activities

Key Benefits

  • Benefit from an award-winning vendor agnostic technology specifically designed for critical devices.
  • Protect your critical systems from malicious or fraudulent activities, with the most comprehensive layered protection model.
  • Enforce easily and quickly compliance with your security policies, with minimal performance impact on your devices.
  • Save time and money thanks to remote and centralized security operations from a single GUI.
  • Block, detect and solve security incidents that may arise from your assets.
  • Get real-time visibility of the hardware, software and users installed on your devices, and keep control on the changes.
  • Execute customized remote actions on your devices in a secure and controlled environment.
  • Adapt visibility and permissions to the specific needs of the different operations teams

Product/Service details

SOLUTION OR SERVICE TYPE