0% found this document useful (0 votes)
511 views3 pages

Manage Engine Endpoint Central - Datasheet

Endpoint Central is a unified endpoint management solution that allows businesses to manage and secure servers, desktops, and mobile devices from a single console. It automates the full lifecycle of endpoint management including patching, software deployment, vulnerability management, application control, asset management, and mobile device management. Endpoint Central currently manages over 20 million endpoints for over 25,000 IT professionals across 190 countries with 17 years of experience in the market.

Uploaded by

punzango73
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
511 views3 pages

Manage Engine Endpoint Central - Datasheet

Endpoint Central is a unified endpoint management solution that allows businesses to manage and secure servers, desktops, and mobile devices from a single console. It automates the full lifecycle of endpoint management including patching, software deployment, vulnerability management, application control, asset management, and mobile device management. Endpoint Central currently manages over 20 million endpoints for over 25,000 IT professionals across 190 countries with 17 years of experience in the market.

Uploaded by

punzango73
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Datasheet

A single pane of glass for complete Endpoint Management and Security

Today's challenge
Highlights
The way businesses operate has been redefined by the rapid rise in the number and
Supported operating systems
diversity of endpoints used in enterprises. This also leads to various forms of
cyberattacks and insider threats. With devices varying in form and function, more and
Linux macOS
more enterprises these days are looking for a unified endpoint management (UEM)
model that will provide a single software platform for managing and securing a wide
ChromeOS Windows
range of enterprise devices, including servers, desktops, laptops, smartphones,
tablets, and IoT devices.
iOS Android

The solution
Windows Phone tvOS
Endpoint Central is a UEM solution that helps manage and secure servers, desktops,
and mobile devices all from a single console. It automates the complete endpoint Recognized by
management life cycle from start to finish to help businesses cut their IT infrastructure
costs, achieve operational efficiency, improve productivity, combat network
vulnerabilities and insider threats, prevent data leakage and secures enterprise
browsers.

Use Endpoint Central to

Automate regular endpoint management activities.

Standardize OS and application configurations across your network.

Secure endpoints from a wide range of threats.

Troubleshoot day-to-day problems.

Audit your IT assets.

Currently managing
Used across
17 years 25,000 more than
20 190
of experience in the
market.
IT professionals across 20 million languages. countries.
the globe. endpoints.

See what highly regarded analyst firms have to tell about us here!

Patch Management Software Deployment


Automate patching for over 1000 Windows, Mac, Linux, and Install or uninstall MSI and EXE-based applications.
third-party apps.
Schedule software deployments and perform pre and
Proactively detect and deploy missing patches. post-deployment activities.

Test and approve patches before deployment to mitigate security Allow users to install software themselves using the self-service
risks. portal.

Deploy critical zero-day patches. Utilize over 10000 predefined templates to deploy applications.

Disable auto-updates and decline patches as needed. Create a repository of packages and reuse them any number of
times to install or uninstall software.
Obtain reports on system health status as well as system
vulnerability. Install software as a specific user using the Run As option.
Vulnerability Management Application Control
Improve your security posture with integrated threat and Discover all installed applications and executables, and
vulnerability management by instantly detecting and remediating categorize them as enterprise approved or unapproved based
vulnerabilities. on their digital signatures.

Enhance security by deploying security policies and mitigating Flexible regulation that provides multiple modes to efficiently
system misconfigurations. establish a zero trust environment.

Leverage ManageEngine's exclusive partnership with the Centre Hassle-free application control that allows users to request
for Internet Security (CIS) to ensure compliance with CIS access to applications.
benchmarks.
Adopt a Zero Trust approach by enabling Strict Mode to prohibit
Swiftly spot zero-day vulnerabilities and deploy mitigation scripts even unmanaged applications, automatically.
as workarounds before the patches arrive.

Audit and eliminate high-risk software such as end of life software, Data Leakage Prevention
remote desktop sharing software, and peer to peer software to stay Monitor and regulate your enterprise data movement from a
safe from data breaches. centralized console to combat insider attacks and data loss.

Audit active ports to discover anomalies as a part of vulnerability Scan and categorize enterprise's critical data as per compliance
management. and regulatory standards.

Regulate data transfer attempts via cloud uploads, E-mail


Asset Management exchanges, printers, and other peripheral devices.
Track all hardware and software in your network live.
Receive instant alerts for policy breach attempts and remediate
Ensure software license compliance. false positive events.

Block executables and uninstall prohibited software.


Browser Security
Analyze software usage statistics and reduce costs associated with
unused software using software metering. Lockdown enterprise browsers and harden the browser settings
to prevent browser-based attacks.
Receive notifications for specific events such as detection of new
software, non-compliance due to under-licensing, and prohibited Gain a comprehensive view of multiple browsers being used
software. across the network.

Gain over 20 pre-defined reports for hardware, software, inventory, Enforce browser security configurations such as STIG and CIS
and license compliance. compliances.

Implement a safe browsing experience by detecting and


Mobile Application Management removing harmful plug-ins.
Create your own enterprise app repository containing only
Allow enterprise-approved websites and block unwanted web
IT-approved in-house and commercial apps.
apps to increase productivity and security.

Silently install, update, and remove corporate apps from devices


while also managing app licenses and preconfiguring app Mobile Device Management
permissions.
Automate bulk enrollment and authentication of BYOD and
corporate devices.
Ensure devices run only trusted corporate apps, blacklist
malicious/vulnerable apps, and prevent users from uninstalling Control OS updates and troubleshoot remote mobile devices.
corporate apps.
Gain complete visibility into your organization's mobile assets
through predefined and customizable reports.
System tools
Monitor and analyze remotely managed systems by viewing the
Mobile Security Management
task details and processes that are running on them.
Configure and enforce corporate security policies affecting
Remotely boot up a machine instantly using Wake-on-LAN, or
Wi-Fi, VPN, email, and more.
schedule boot-ups.

Publish announcements company-wide or just to technicians. Prevent unauthorized access to corporate email, and securely
distribute, save, and view content.
Schedule disk defragmentation, check disks, and disk cleanup for
local or remote workstations. Enforce device-level encryption; isolate personal and corporate
workspaces on BYOD devices; and locate, lock, and wipe
misplaced devices.
Configurations Remote Control
Standardize desktop, computer, application, and security settings Leverage secure remote control to meet various compliance
with baseline configurations for your entire organization. regulations, including HIPAA and PCI DSS.

Use over 40 configurations for users and computers, or create Troubleshoot remote desktops seamlessly with collaboration
templates for frequently used configurations. between multiple users.

Choose from over 180 scripts in the script repository. Integrated video, call, chat; and options for transferring files
between machines.
Restrict and control the usage of USB devices like printers, CD
drives, portable devices, bluetooth devices, modems, and other Record entire remote control sessions for auditing purposes.
peripherals in the network, both at the user and computer level.
Lock end users' keyboards and mice, and black-out their
Go green with effective power management by applying power screens to ensure confidentiality during remote sessions.
schemes, shutting down inactive computers, and viewing system
uptime reports. Take advantage of 128-bit AES encryption protocols during
remote control operations.
Configure browser, firewall, and security policies; achieve access
control for files, folders, and the registry using permissions OS Deployment
management.
Automatically capture the image of a computer, whether it's live
Set alerts for password expiration and low system drive space. or shut down, using intelligent online and offline imaging
techniques.

Peripheral Device Control Store these images in a centralized repository and perform OS
Effectively regulate and restrict the entry of more than 15 types of deployment on the go.
peripheral devices from a centralized console along with automatic
Customize captured images by using deployment templates for
detection of active ports.
different roles and departments within your organization.
Role-based file access and transfer control with file transfer limit to
Perform hassle-free deployment across different types of
secure your enterprise-critical data.
hardware.
Grant temporary access for peripheral devices to specific
Execute post-deployment activities like installing applications,
endpoints for a defined time frame.
configuring computer settings, and more.
Be proactive by mirroring the data in a secure location when USB
devices access your critical enterprise data, thus preventing data BitLocker Management
loss.
Secure your computer's data by automating encryption for
Adhere to device compliance standards by preventing data loss select drives or the entire hard drive.
through peripheral devices and get insights from comprehensive
Identify the TPM-installed computers for enhanced PIN security
device audit reports.
along with passphrase authentication.

Reports Retrieve your computer's data using the recovery key in case of
Utilize over 200 out-of-the-box Active Directory reports on users, faulty hardware and reset the password for the computers
computers, groups, OUs, and domains. removed from the network.

Lower utility bills with effective power management, and view Employ data encryption policies and stay compliant with data
system uptime reports. protection guidelines like FISMA, HIPAA, and PCI-DSS.

Obtain up-to-date user logon details with user logon reports. Next-Gen Antivirus
View reports on patches, configurations, and events for auditing. Real-time AI-assisted malware detection enforces protection
against evolving threats.
Endpoint Privilege Management
Comprehensive incident forensics with detailed reports align
Remove unnecessary admin rights and run business-critical with MITRE Tactics, Techniques, and Procedures (TTPs).
applications with restricted privileges to prevent attacks based on
privilege elevation or credential compromise. In-depth insights into attack methods, pathways, and kill-chain
analysis.
Maintain the least privilege model without compromising
productivity by enabling application-specific privilege elevation.
Immediate intrusion mitigation, including ransomware
Handle interim user needs by enabling privileged temporary protection, ensures swift intrusion neutralization.
access to applications that are automatically revoked after a set
period. Threat mitigation with minimal disruptions to your network's
operations ensures business continuity.

Ransomware Protection
One-click file recovery allows users to easily restore
Reactive protection for heightened endpoint security by compromised files to their original state with a simple click.
gatekeeping ransomware.
* Note : Next-Gen Antivirus is currently in early access.

Multi-patented and machine learning-assisted behavior analysis


instantly detects any ransomware attempting to intrude on your
Pricing
network.

Provides detailed analysis of all intrusion attempts. Security Edition


Pricing starts at $1695/year for 50 endpoints.
Offers seamless rollback to ensure your data is recovered with one
click. UEM Edition
Pricing starts at $1095/year for 50 endpoints.
* Note : Anti-Ransomware is currently in early access.

Enterprise Edition (for WAN)


Pricing starts at $945/year for 50 endpoints.

Professional Edition (for LAN)


Pricing starts at $795/year for 50 endpoints.

Free Edition
Complete management of up to 25 endpoints

© 2023 Zoho Corp. All rights reserved.

You might also like