Manage Engine Endpoint Central - Datasheet
Manage Engine Endpoint Central - Datasheet
Today's challenge
Highlights
The way businesses operate has been redefined by the rapid rise in the number and
Supported operating systems
diversity of endpoints used in enterprises. This also leads to various forms of
cyberattacks and insider threats. With devices varying in form and function, more and
Linux macOS
more enterprises these days are looking for a unified endpoint management (UEM)
model that will provide a single software platform for managing and securing a wide
ChromeOS Windows
range of enterprise devices, including servers, desktops, laptops, smartphones,
tablets, and IoT devices.
iOS Android
The solution
Windows Phone tvOS
Endpoint Central is a UEM solution that helps manage and secure servers, desktops,
and mobile devices all from a single console. It automates the complete endpoint Recognized by
management life cycle from start to finish to help businesses cut their IT infrastructure
costs, achieve operational efficiency, improve productivity, combat network
vulnerabilities and insider threats, prevent data leakage and secures enterprise
browsers.
Currently managing
Used across
17 years 25,000 more than
20 190
of experience in the
market.
IT professionals across 20 million languages. countries.
the globe. endpoints.
See what highly regarded analyst firms have to tell about us here!
Test and approve patches before deployment to mitigate security Allow users to install software themselves using the self-service
risks. portal.
Deploy critical zero-day patches. Utilize over 10000 predefined templates to deploy applications.
Disable auto-updates and decline patches as needed. Create a repository of packages and reuse them any number of
times to install or uninstall software.
Obtain reports on system health status as well as system
vulnerability. Install software as a specific user using the Run As option.
Vulnerability Management Application Control
Improve your security posture with integrated threat and Discover all installed applications and executables, and
vulnerability management by instantly detecting and remediating categorize them as enterprise approved or unapproved based
vulnerabilities. on their digital signatures.
Enhance security by deploying security policies and mitigating Flexible regulation that provides multiple modes to efficiently
system misconfigurations. establish a zero trust environment.
Leverage ManageEngine's exclusive partnership with the Centre Hassle-free application control that allows users to request
for Internet Security (CIS) to ensure compliance with CIS access to applications.
benchmarks.
Adopt a Zero Trust approach by enabling Strict Mode to prohibit
Swiftly spot zero-day vulnerabilities and deploy mitigation scripts even unmanaged applications, automatically.
as workarounds before the patches arrive.
Audit and eliminate high-risk software such as end of life software, Data Leakage Prevention
remote desktop sharing software, and peer to peer software to stay Monitor and regulate your enterprise data movement from a
safe from data breaches. centralized console to combat insider attacks and data loss.
Audit active ports to discover anomalies as a part of vulnerability Scan and categorize enterprise's critical data as per compliance
management. and regulatory standards.
Gain over 20 pre-defined reports for hardware, software, inventory, Enforce browser security configurations such as STIG and CIS
and license compliance. compliances.
Publish announcements company-wide or just to technicians. Prevent unauthorized access to corporate email, and securely
distribute, save, and view content.
Schedule disk defragmentation, check disks, and disk cleanup for
local or remote workstations. Enforce device-level encryption; isolate personal and corporate
workspaces on BYOD devices; and locate, lock, and wipe
misplaced devices.
Configurations Remote Control
Standardize desktop, computer, application, and security settings Leverage secure remote control to meet various compliance
with baseline configurations for your entire organization. regulations, including HIPAA and PCI DSS.
Use over 40 configurations for users and computers, or create Troubleshoot remote desktops seamlessly with collaboration
templates for frequently used configurations. between multiple users.
Choose from over 180 scripts in the script repository. Integrated video, call, chat; and options for transferring files
between machines.
Restrict and control the usage of USB devices like printers, CD
drives, portable devices, bluetooth devices, modems, and other Record entire remote control sessions for auditing purposes.
peripherals in the network, both at the user and computer level.
Lock end users' keyboards and mice, and black-out their
Go green with effective power management by applying power screens to ensure confidentiality during remote sessions.
schemes, shutting down inactive computers, and viewing system
uptime reports. Take advantage of 128-bit AES encryption protocols during
remote control operations.
Configure browser, firewall, and security policies; achieve access
control for files, folders, and the registry using permissions OS Deployment
management.
Automatically capture the image of a computer, whether it's live
Set alerts for password expiration and low system drive space. or shut down, using intelligent online and offline imaging
techniques.
Peripheral Device Control Store these images in a centralized repository and perform OS
Effectively regulate and restrict the entry of more than 15 types of deployment on the go.
peripheral devices from a centralized console along with automatic
Customize captured images by using deployment templates for
detection of active ports.
different roles and departments within your organization.
Role-based file access and transfer control with file transfer limit to
Perform hassle-free deployment across different types of
secure your enterprise-critical data.
hardware.
Grant temporary access for peripheral devices to specific
Execute post-deployment activities like installing applications,
endpoints for a defined time frame.
configuring computer settings, and more.
Be proactive by mirroring the data in a secure location when USB
devices access your critical enterprise data, thus preventing data BitLocker Management
loss.
Secure your computer's data by automating encryption for
Adhere to device compliance standards by preventing data loss select drives or the entire hard drive.
through peripheral devices and get insights from comprehensive
Identify the TPM-installed computers for enhanced PIN security
device audit reports.
along with passphrase authentication.
Reports Retrieve your computer's data using the recovery key in case of
Utilize over 200 out-of-the-box Active Directory reports on users, faulty hardware and reset the password for the computers
computers, groups, OUs, and domains. removed from the network.
Lower utility bills with effective power management, and view Employ data encryption policies and stay compliant with data
system uptime reports. protection guidelines like FISMA, HIPAA, and PCI-DSS.
Obtain up-to-date user logon details with user logon reports. Next-Gen Antivirus
View reports on patches, configurations, and events for auditing. Real-time AI-assisted malware detection enforces protection
against evolving threats.
Endpoint Privilege Management
Comprehensive incident forensics with detailed reports align
Remove unnecessary admin rights and run business-critical with MITRE Tactics, Techniques, and Procedures (TTPs).
applications with restricted privileges to prevent attacks based on
privilege elevation or credential compromise. In-depth insights into attack methods, pathways, and kill-chain
analysis.
Maintain the least privilege model without compromising
productivity by enabling application-specific privilege elevation.
Immediate intrusion mitigation, including ransomware
Handle interim user needs by enabling privileged temporary protection, ensures swift intrusion neutralization.
access to applications that are automatically revoked after a set
period. Threat mitigation with minimal disruptions to your network's
operations ensures business continuity.
Ransomware Protection
One-click file recovery allows users to easily restore
Reactive protection for heightened endpoint security by compromised files to their original state with a simple click.
gatekeeping ransomware.
* Note : Next-Gen Antivirus is currently in early access.
Free Edition
Complete management of up to 25 endpoints