ManageEngine Endpoint Central: Cloud-based Unified Endpoint Management and Security Solution
Endpoint Central is an endpoint management and security solution for a company's IT infrastructure. It manages servers, desktops, laptops, and devices across multiple OSs from a single console. Crafted for SMBs and enterprises alike, it simplifies and automates routine tasks while securing against cyberattacks with its integrated endpoint protection suite.
Features
- Automated patching and vulnerability remediation with risk-based compliance score.
- Expert IT Asset Management (ITAM) and Mobile Device Management (MDM)
- Large scale software deployment and end-user self-service portal for enterprises.
- Endpoint Analytics for end user experience management.
- Data Loss Prevention and application allow-listing.
- Next-gen antivirus and Malware protection with dedicated anti-ransomware module.
- Endpoint Protection platform with proactive and reactive endpoint security.
- OS Imaging, OS Deployment and provisioning Windows machines.
- Web protection with in-built browser-based attack prevention.
- Endpoint Privilege Management solution (EPM) and Access Control System.
Benefits
- Provides visibility and control into your day-to-day IT operations/functions.
- Enhances corporate security to protect against threats and breaches.
- Versatility and Cross-Platform Compatibility; support for multiple OSs and devices.
- Cloud-based integrated IT management and security using a single agent.
- Reduced time-to-value (TTV) and high return on investment (ROI).
- Capture Real-time IT insights in customisable reports.
- Intuitive UI; comprehensible and easy to understand application interface.
- Automated patching for multiple third-party applications.
- Enhanced adaptability; Provision to customise solution based on user-specific needs.
- Provide a self-service portal/ Enterprise app store for your end-users.
Pricing
£836 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 4 1 5 8 0 2 2 9 0 0 7 5 6 5
Contact
Zoho Corporation Limited
Sreyas Benjamin
Telephone: +44 2038072092
Email: zohouk-gcloud@eu.zohocorp.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Endpoint Central integrates with helpdesk solutions such as ServiceDesk Plus, Jira, ServiceNow for ITSM/USM functions. It integrates with Zoho Flow, a low-code orchestration platform and uses Tenable's scanning mechanism in addition to its in-built threat and vulnerability scanner.
- Cloud deployment model
- Public cloud
- Service constraints
- Endpoint Central requires its agents to be installed in the managed end-user machines. As a cloud solution, the service undergoes planned maintenance and enhancements from time to time which are intimated over various communication channels such as forum, email, and product banner. Service updates are regularly posted in status.manageengine.uk or status.manageengine.com or status.manageengine.uk depending on hosting location where the user can find the detailed account of any planned/unplanned maintenance.
- System requirements
-
- Internet connection.
- A browser application.
- Mobile app (Android/iOS) to use on smartphone or tablet.
- Distribution server (recommended for bandwidth optimization)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Severity Level (Acknowledgement Time):
1. S1 – Major - Within 4 regional business hours.
2. S2 – Moderate - Within 12 regional business hours.
3. S3 – Low - Within 24 regional business hours . Weekend Support is available for customers opting for Premium Support.
For more information visit manageengine.com/uk/support.html. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
-
We have Chat option within the product to interact with a support representative. Apart from requesting support within the product, users can also access our chat by visiting our support page and clicking on the support icon located at the bottom right. This allows them to seek technical assistance, post queries, or request remote assistance.
In terms of accessibility, we ensure the following:
1. Mouseless intervention:
The application has been made usable without the need for a mouse device. The product supports mouseless intervention, which allows navigation throughout, by using:
Tab for navigating forward; Shift+Tab for navigating backward; Enter/Return for option selection
2. Zoom controls and font size
The application is entirely adaptable with Zoom control support of 80% to 125% irrespective of the device, enhancing the overall product visibility.
It also supports maximum readability by allowing adjustments to the font size of the content/text within (small, medium, or large) as the user desires, enhancing clarity and legibility.
3. Screen reader compatibility
Our application being text-only, allows the usage of the screen reader extensions, which enable the focus area on the screen (either through the Tab key or mouse click) to be read out aloud, making the content accessible. - Web chat accessibility testing
- The application has been tested using manual testing methods for navigation and readability. Screen reader compatibility has been tested with the Chromevox extension, which reads the focus content on the screen aloud.
- Onsite support
- Yes, at extra cost
- Support levels
- Endpoint Central offers two tiers of support: Classic and Premium. Classic support is included with a subscription license and provides email and chat support, as well as access to online resources. Premium support offers additional benefits, such as a single point of contact--a dedicated technical account manager (TAM), faster turnaround times, and 24/7 phone support.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Endpoint Central offers the following ways to get up and running:
1. In-product onboarding: In-product guidance and instructions that activate users and familiarise with the platform after signing in for the first time.
2. Paid Product Support: Apart from classic support, Endpoint Central provides a dedicated team of solution engineers and product experts who help users to get started with configuring Endpoint Central practices through a variety of paid programs.
3. Online documentation: Endpoint Central provides in-depth help documentation that is hosted online at https://www.manageengine.com/products/desktop-central/help/, which provides step by step guidance for administrators, technicians, and end-users.
4. Training videos: Apart from help documentation, Endpoint Central also maintains a repository of video tutorials and conducts live webinars with our product experts throughout the year for every module and function at https://www.manageengine.com/products/desktop-central/training.html
5. Dedicated Technical Account Managers: Endpoint Central’s technical account managers travel around the globe meeting customers in their offices for on-site health checks.
6. In-person events: Endpoint Central also hosts in-person workshops and user conferences to help train customers on the product capabilities with an option to avail a product associate certification. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
After the evaluation period, users will be prompted to transition to the free edition of Endpoint Central (maximum 25 endpoints). If the user does not transition within 3 months (after repeated follow-ups), user data will be archived and will be deleted from our internal records after 3 subsequent months.
A licensed user can terminate a contract by deleting their org within the application console during which the user is given the chance to download a copy of basic inventory data. - End-of-contract process
-
Once the contract period ends, in the absence of any renewal contract, the Endpoint Central license is deprecated to the standard edition that is free to use up to 25 endpoints and 1 technician.
Upon termination of a user account, user data gets deleted from the active database during the subsequent clean-up that occurs once every 6 months. The data deleted from the active database will be deleted from backups after 3 months. During the offboarding process, we provide the option to export data and ensure that all sensitive information is securely transferred or deleted as per our privacy policy.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Users will be able to access core modules of Endpoint Central on their mobile devices (via a dedicated Android/iOS app) with minimal variations compared to the desktop experience. Navigation and user experience have been optimised for mobile view.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- IT admins/managers/analysts can access the product console (service interface) on browser-only platforms (for desktops) and iOS/Android apps (for mobile devices). Self Service for end users is available from desktop and mobile interfaces. Mobile Self Service is available only through dedicated apps on iOS and Android platforms.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Endpoint Central is accessible over a user-friendly web interface that is accessible through major web browsers such as Google Chrome, Microsoft Edge, Safari, and others. Service interface does not override user’s individual display attributes (such as contrast and colour). Service interface does not have elements that flashes/blinks at high frequency.
- Accessibility testing
- The application has been tested using manual testing methods for navigation and readability. Screen reader compatibility has been tested with the Chromevox extension, which reads the focus content on the screen aloud.
- API
- Yes
- What users can and can't do using the API
-
Endpoint Central Cloud facilitates easy integration with users' existing infrastructure using REST APIs. Developer console can be accessed at api-console.zoho.uk.
Further documentation can be accessed at manageengine.com/products/desktop-central/api/cloud_index.html - API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Administrators have the flexibility to personalise the look and feel of the console according to their preferences. Administrators can configure user accounts, provide role-based access, reorganise menu bar, rebrand the console, and generate customised reports based on inventory parameters. Further service level customisation can be qualified upon request to Support.
Scaling
- Independence of resources
- We have a distributed network of servers across the globe that ensures service uptime and efficient content delivery with minimal latency. Individual Customer data is logically separated within a database to ensure data security and privacy. Failover and load balancing systems are put in place for overall reliability and seamless resource utilisation.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Users can view their license information (like endpoints used, expiry, add-ons utilised). Users are offered Uptime/Downtime metrics ( % service availability over a year). There is a provision for user communication for planned maintenance, downtime and RCA.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Other
- Other data at rest protection approach
- Sensitive customer data at rest is encrypted using 256-bit Advanced Encryption Standard (AES). The data that is encrypted at rest varies with the services you opt for. We own and maintain the keys using our in-house Key Management Service (KMS). We provide additional layers of security by encrypting the data encryption keys using master keys. The master keys and data encryption keys are physically separated and stored in different servers with limited access.
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Endpoint Central allows you to export reports as PDF, CSV, and XLSX in the Reports section. User has multiple parameters such as power management, uptime, etc. to choose from. In addition, users can mask/remove any Personally Identifiable Information (PII) from their reports.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XLSX
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Other
- Other protection between networks
-
We mandate all connections to our servers use Transport Layer Security (TLS 1.2/1.3) encryption with strong ciphers including web access,API access,our mobile apps, and IMAP/POP/SMTP email client access. For email, we leverage opportunistic TLS that encrypts and delivers email securely, mitigating eavesdropping between mail servers where peer services support this protocol.
Full support for Perfect Forward Secrecy (PFS) with encrypted connections ensuring that even if we were somehow compromised in future, no previous communication be decrypted. Enabled HTTP Strict Transport Security header (HSTS) to all our web connections. Additionally, on the web, we flag all our authentication cookies as secure. - Data protection within supplier network
- Other
- Other protection within supplier network
-
We use firewalls to prevent our network from unauthorised access and undesirable traffic. Our systems are segmented into separate networks to protect sensitive data. Systems supporting testing and development activities are hosted in a separate network from systems supporting Endpoint Central's production infrastructure.
We monitor firewall access with a strict, regular schedule. Our dedicated Network Operations centre team monitors the infrastructure and applications for any discrepancies or suspicious activities. All crucial parameters are continuously monitored using our proprietary tool and notifications are triggered in any instance of abnormal or suspicious activities in our production environment.
Availability and resilience
- Guaranteed availability
- We understand the importance of meeting service levels and ensuring customer satisfaction. We are committed to delivering a high-quality service and addressing any issues promptly. If there are concerns about service levels not being met, we encourage customers to contact our exclusive support team, which works round the clock to discuss the situation and find a suitable resolution. Our goal is to work closely with our customers to ensure their needs are met and provide the best possible service experience. In the event of a service default from our end, upon detailed analysis, customers will be compensated using credits.
- Approach to resilience
- Application data is stored on resilient storage that is replicated across data centres. Data in the primary DC is replicated in the secondary in near real-time. In case of failure of the primary DC, secondary DC takes over and the operations are carried on smoothly with minimal or no loss of time. Both the centres are equipped with multiple ISPs.We have power back-up, temperature control systems and fire-prevention systems as physical measures to ensure business continuity. These measures help us achieve resilience. In addition to the redundancy of data, we have a business continuity plan for our major operations such as support and infrastructure management.
- Outage reporting
-
We have a dedicated incident management team. We notify you of the incidents in our environment that apply to you, along with suitable actions that you may need to take. We track and close the incidents with appropriate corrective actions. Whenever applicable, we will identify, collect, acquire, and provide you with necessary evidence the form of application and audit logs regarding incidents that apply to you. Furthermore, we implement controls to prevent recurrence of similar situations.
We respond to the security or privacy incidents you report to us through incidents@zohocorp.com, with high priority. For general incidents, we will notify users through our blogs, forums, and social media. For incidents specific to an individual user or an organisation, we will notify the concerned party through email (using their primary email address of the Organisation administrator registered with us). Service outages can be viewed at status.manageengine.uk or status.manageengine.com or status.manageengine.eu depending on the hosting location.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Users can log in to Endpoint Central through a two-step process. First, they are verified using their credentials. If that initial verification is successful, they may then need to provide additional authentication factors (MFA) depending on the administrator's configuration in Endpoint Central. Users can also login via SSO support for Google, LinkedIn, GitHub, Apple, Yahoo, Microsoft, or Slack
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
- Other
- Description of management access authentication
-
We employ technical access controls and internal policies to prohibit employees from arbitrarily accessing user data. We adhere to the principles of least privilege and role-based permissions to minimise the risk of data exposure.
Access to production environments is maintained by a central directory and authenticated using a combination of strong passwords, two-factor authentication, and passphrase-protected SSH keys. Furthermore, we facilitate such access through a separate network with stricter rules and hardened devices. Additionally, we log all the operations and audit them periodically.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 09/08/2022
- What the ISO/IEC 27001 doesn’t cover
- Our Data centres.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- 01/03/2023
- CSA STAR certification level
- Level 1: CSA STAR Self-Assessment
- What the CSA STAR doesn’t cover
- N/A
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- ISO/IEC 27001, ISO/IEC 27701, ISO/IEC 27017
- SOC 2 Type II
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
-
Security is a key component in all our offerings, and is reflected in our people, processes, and products.
Our Security strategy involves components like data security, operational security, infrastructure security, Identity & Access Control, and physical security to
offer security to our customers. https://www.manageengine.com/security.html - Information security policies and processes
- We have dedicated Compliance team and they conduct internal risk assessments to confirm if the policies are followed. Zoho has an established governance framework that supports relevant aspects of information security with policies and standards (Endpoint Central is an offering from ManageEngine, which in turn is a division of Zoho). Roles and responsibilities for the governance of Information Security within Zoho are formally documented and communicated by the management. Zoho shall establish, implement, and maintain an information security program in accordance with the international standard ISO 27001 that includes technical and organizational security and physical measures as well as policies and procedures to protect customer data processed by Zoho against accidental loss, destruction or alteration, unauthorized disclosure or access, or unlawful destruction. Zoho maintains documented information security and data privacy policies and requirements, and communicates them periodically to those employees responsible for the design, implementation and maintenance of security and privacy controls.The policies are reviewed annually to keep them up-to-date. This policy gets verified during our third-party audits like ISO and SOC.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- We have the Change Management procedures in place that include the following but are not limited to all the changes to the organisation, applications, systems, people, technology, and processes, information processing facilities that affect information security/privacy. For every change, the security impact is analysed. We maintain Audit logs as evidence of all the changes. Fall-back procedures, including procedures and responsibilities for aborting and recovering from unsuccessful changes and unforeseen events, are documented and communicated. Zoho shall notify the customer of any changes that may affect the customer in an adverse manner.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
We have a vulnerability management process that actively scans for security threats using a combination of certified third-party scanning and in-house tools with automated and manual penetration testing efforts. Our security team actively reviews inbound security reports and monitors public mailing lists, blog posts, and wikis to spot security incidents that might affect the company’s infrastructure.
Once we identify a vulnerability requiring remediation, it is logged, prioritised according to the severity, and assigned to an owner. We further identify the associated risks and track the vulnerability until it is closed by either patching the vulnerable systems or applying relevant controls. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- We monitor and analyse information gathered from services, internal traffic in our network, and usage of devices and terminals. We record this information in the form of event logs, audit logs, fault logs, administrator logs, and operator logs. These logs are automatically monitored and analysed to a reasonable extent that helps us identify anomalies such as unusual activity in employees’ accounts or attempts to access customer data. We store these logs in a secure server isolated from full system access, to manage access control centrally and ensure availability.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
We have a dedicated incident management team. We track and close the incidents with appropriate corrective actions. Whenever applicable, we will identify, collect, acquire, and provide users with necessary evidence in the form of application and audit logs regarding incidents applicable.
We respond to the security or privacy incidents you report to us through incidents@zohocorp.com with high priority. For general incidents, we will notify users through our blogs, forums, and social media. For incidents specific to an individual user or an organisation, we will notify the concerned party through the primary email of the Organisation administrator registered with us.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
We've partnered with Equinix to host our UK data centres in London and Manchester. Equinix is also committed to sustainability and is compliant with the Climate Neutral Data Centre Pact, ISO 14001, LEED, etc. The energy supply for the Zoho UK’s workspace at Bletchley is derived from renewable sources, accounting for 21% of total power consumption. LED retrofits have been implemented to enhance energy efficiency throughout the building. Designed with a focus on energy efficiency, data centres that support Zoho UK are powered by renewable energy. Further, these data centres are progressing towards integrating with a solar grid to reduce environmental impacts. All purchased energy for the data centres is sourced from green energy providers. This enables us to minimise the carbon footprint associated with our operations. The United Kingdom has committed to achieving carbon neutrality by 2050. Supporting this pledge, we have taken steps to monitor greenhouse gas (GHG) emissions from our operations and implement measures to mitigate them. We account for Scope 2 and Scope 3 emissions and exclude Scope 1 emissions as our work does not involve fuel combustion within operational boundaries. We've switched completely to electric vehicles for movement within the campus.Covid-19 recovery
During the COVD-19 pandemic, Zoho worked to minimise the impact of COVID on our customers, other business and our local community. At the start of the pandemic, Zoho created and distributed a Secure Remote Access Toolkit to help organisations quickly adapt to and work securely during the pandemic. This toolkit was made free for the first 100 days. To assist organisations impacted by the pandemic, Zoho offered free licenses of flagship products, and offered discounts and waivers on licenses on a case-by-case basis. While most of our employees worked from home, we kept the kitchen at our Chennai headquarters running with a skeletal staff to provide food to underprivileged people in the local area, many of whom were impacted due to a loss of employment during the lockdown. We converted one of our office buildings into a temporary COVID-19 ward to accommodate citizens who were required to quarantine. We ran vaccination camps to our employees, their dependents and the support staff who worked in Zoho.Tackling economic inequality
Zoho has always aimed to tackle economic inequality and give back to the community. This is reflected in the following: Coined by our CEO, transnational localism is the philosophy that underpins our staffing and office location plans. Instead of focusing on crowded urban centres, we've been opening spoke offices in smaller towns and villages. The goal is to improve local infrastructure, boost the economy of these smaller towns and villages, and provide more employment opportunity. As part of our philosophy of transnational localism, we believe in hiring locally for each spoke office. This helps promote local talent and bring high-paying jobs back to the villages and towns where we are based.Equal opportunity
As part of our efforts to tackle inequality, Zoho Corporation Limited have made efforts to provide equal opportunities and tackle workforce inequality. All roles at Zoho Corporation are open to all people irrespective of gender, sex, race, ability, or religion. We hire solely based on skill and have a diverse team. We eschew discrimination on any grounds, including age, colour, disability, ethnicity, family or marital status, gender identity or expression, language, national origin, physical and mental ability, political affiliation, race, religion, sexual orientation, socio-economic status, and other unique characteristics that define our associates. Instead, we espouse, fairness, striving to ensure that a merit-based approach allows wage parity among associates with comparable experiences and responsibilities, irrespective of their gender. Our campus has been designed to be accessible to all, including differently- abled colleagues. The layout design includes ramps and lifts in every building, allowing ease of mobility and access to all. Apart from the usual shuttle facilities, special cab service covering a certain distance is given for women during their third trimester.Wellbeing
Zoho Corporation Limited adheres to industry standards in remuneration, ensuring that compensation is equitable across genders. Recognising the diverse needs of our people, we provide essential support such as parental leave, aligning with our efforts to build an organisation that values and cares for every individual. We have trained medical practitioners and a dedicated medical clinic available on all days of the week. Employees can freely avail their services. The Hazard Identification & Risk Assessment (HIRA) Framework is followed rigorously at the premises. We provide in-house counselling to our employees for free via our team of trained and qualified therapists. We organise free medical check-ups for our employees on an annual basis. We organise regular blood donation camps in association with various blood banks. We have open house sessions conducted by the CEO periodically where employees can raise any concerns. Day Care facilities provided for employees kids. The compliance monitoring framework involves ongoing reviews and enhancements of occupational health programmes, guided by feedback, data analysis, and emerging best practices.
Pricing
- Price
- £836 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
We offer an all-inclusive, free, 30-day trial for all users.
Once the trial period has lapsed, the product with all of its features will be available for 25 endpoints along with 1 admin. - Link to free trial
- Manageengine.com/products/desktop-central/free-trial.html