Cloud-Based Chromebook Management & Monitoring tool for Google Workspace
Easily Track, Report & Create Policies for your Chromebooks & ChromeOS Devices.
- See permissions’ settings across all content (full granular view).
- Monitor high-risk sharing activity across users, groups and drives (including public & ‘public through sharing links’).
- Identify external access to files and folders, and revoke sharing violations.
- Create customised policies to keep your sensitive data safe.
- Copy externally owned files and folders securely.
As seen on
Protect your Chromebooks, ChromeOS devices and users by monitoring ALL activity.
Real-time alerting for inappropriate content and Data Loss Prevention (DLP), on all sites, in all locations and at all times.
View granular details of all Chromebook and ChromeOS devices on your network. Sort them by model, group, IP, user, device location or OS version to easily keep track of them.
See exactly where your Chromebooks and ChromeOS devices are at all times, regardless of their status.
Deprovision, disable or re-enable Chromebooks and ChromeOS devices. Move devices across different organisational units, groups or users, seamlessly.
Build a workflow to offboard or modify a set of Chromebooks or ChromeOS devices assigned to any user or ‘group to deprovision’.
Disable or re-enable devices in bulk by moving users to any selected OU or group easily, in seconds
Track the use of internal sites in detail. Identify which sites are working and which pages are bottlenecks. Get a ‘Google Analytics-like’ flow analyses, even for web sites you don’t own.
Helps improve device utilisation and optimise usage location.
Every Single Interaction in ONE Place!
URL Filtering & Blocking
Control which websites your users can visit using policy activated website whitelists and blacklists.
Report on public, unlisted or private videos. Make changes in a centralized console. Report and remove channels published by users. Create a policy every time someone uploads a video.
Monitoring & Alerting
Configure risk-based policies that automatically respond to detected issues whenever a specific risk level is reached.
See the exact browsing behaviour over a certain period of time for any user, group, class, etc.
Investigate a specific activity for any user, on any site and at any time. See the exact device and location from which the activity occurred.
Track and locate devices (with exceptional accuracy).
Get notified every time a device exits an approved location you specify (company premises, etc.).