Centerprise International Ltd

Centerprise Anti Plagiarism software by Urkund

The Centerprise Anti Plagiarism Service by Urkund delivers a fully-automated system for checking text originality and preventing plagiarism. The software is fully integrated in all major learning management systems, and uses advanced machine learning to deliver test winning accuracy.


  • Detects text copied from the internet
  • Detects cheat site usage
  • Searches millions of published materials
  • Allows users to add internal data
  • Checks against other submissions


  • Bulk upload via drag and drop or zip files
  • Documents stored by user or deleted automatically
  • Admin only deletion
  • User Friendly analysis report


£1 to £2 a person a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

2 3 1 1 9 9 3 1 3 7 5 7 8 5 4


Centerprise International Ltd Tenders Team
Telephone: 01256 378 000

Service scope

Software add-on or extension
Cloud deployment model
Private cloud
Service constraints
System requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
15 minute response,
1 - 8 hour fix depending on priority (P1-3) Monday-Friday 8:00 to 18:00 UK time.
Excludes weekends and Bank Holidays
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
There are 3 Service Desk packages: Silver, Gold and Platinum.
Silver Service Hours are 09:00 to 17:30 Monday to Friday (excluding UK Bank Holidays);
Gold Service Hours are 08:00 to 20:00 Monday to Friday (excluding UK Bank Holidays);
and Platinum Service Hours are 24x7x365. 2.

Incident Target Resolution.

Priority 1 - High. Service is completely unavailable or there is a critical impact on the Customer’s business operation: 4 hours.
Priority 2 - Medium. The Service is severely degraded or there is a significant impact on the Customer’s business operation: 8 hours.
Priority 3 - Low. The quality of the Service is degraded and is affecting one or more users: 16 hours.
Priority 4 - Service Request. Customer is seeking a change to the Service: 5 working days.

Service Credits.

A Service Credit regime is used to recompense the Customer for failures to meet the agreed Service Level. Service Credits are valued as a percentage of the related Service Charges for the month.
Support available to third parties

Onboarding and offboarding

Getting started
Support for initial setup and configuration by providing virtual training, written documentation and youtube videos
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Centerprise can provide consultancy and support to assist you in extracting data at the end of the contract
End-of-contract process
Users can export data downloads via a web interface to meet information requests requirements.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Service interface
What users can and can't do using the API
Submit files for plagiarism/originaliy check, retrieve the status of the analysis (in progress/done), the percentage of similarity found, link to the online report
API documentation
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Customisation available
Description of customisation
Privacy and security can to some extent be customized on our end to meet the customer expectations


Independence of resources
We use cloud technologies that are designed to insure appropriate resource are at all times allocated to the most intensive processes.


Service usage metrics
Metrics types
Usage summary, Including matching text, similarities, warning, quotes and footnotes
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
The user can download the data one file at a item. Bulk downloads are available on request from the Service Desk.
Data export formats
Other data export formats
Data import formats
Other data import formats
  • PDF / .pdf2
  • .doc / .docx
  • .xls /.xlsx
  • .sxw
  • .ppt / .pptx
  • .txt / .rtf
  • .html / .htm
  • .wps / .odt / .odp
  • .tiff / .tif / .pd
  • .hwp / .zip / .pages

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Centerprise guarantee 99.6% availability
Approach to resilience
The system is designed to offer 99.6% availability to customers. It does this by having a highly available dispersed architecture which self-heals when an outage is detected. The system has built in redundancy so that it can continue to operate even if one or more of the services is temporarily unavailable
Outage reporting
The system will notify the support team of alerts via email alerts, and a dashboard available to the support team. If the customer wishes to receive these notifications as well they can on request.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Users in management positions are granted more administration rights. These chosen 'admin-users' have the ability to control dashboards access of 'regular users'. This restricts access to selected personnel only.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
N/A - Everything is covered by our ISO 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Who accredited the PCI DSS certification
PCI DSS accreditation date
10th November 2018
What the PCI DSS doesn’t cover
N/A - everything is covered by our PCI DSS certification
Other security certifications
Any other security certifications
Cyber Essentials plus

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
In-line with the requirements of ISO 27001 and 20000, we've developed policies and procedures to support both standards and comply with the requirements of ISO 9001. E.g, our Information Security Policy includes the following internal policies/procedures: •IT Security Business Continuity Policy •Information Security Policy – Suppliers •CCTV Policy •CI Forensic Policy •Corporate Hospitality and Bribery Act •Access Control Policy •Policy Against Malicious Code •Child Protection Policy •Policy on the Secure Handling, Use, Storage, Retention and Destruction of Disclosure Information •Clear Desk Policy •Cryptographic Policy. The Information Security Policy has been produced and accepted by the Board. The policy is visible to all staff on SharePoint and all staff sign Appendix E of the policy, which is retained in the employee’s HR file. The importance of Information Security and the policy is covered in employee inductions and the Staff handbook. Security responsibilities are defined within our Information Security policy, which records the following managers: •Service Delivery Manager (Information Security Manager) •Security Controller •Group Quality Manager •Users – to comply with the IT Security Policy. Security Responsibilities are defined in the individual’s job description and employment contract.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All Change Management procedures are audited as part of our Information Security accreditations and all change logs are kept and audited as part of this process. We have clearly defined procedures for both customer and supplier initiated changes and all change requests are available for real-time review via our service management system.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Multiple tools are used to block and monitor potential threats to the environment. If patches are required they are rolled out via automation tools to the environment through change control process where the criticality and impact is assessed and approved.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Potential compromises will be detected by the SIEM. An alert will be created should the SIEM directives be triggered by various correlated events. Upon receipt of alert, the SOC team will investigate the incident. Depending on the criticality, a level 1 (highest) is investigated within 15 minutes.
Incident management type
Supplier-defined controls
Incident management approach
We follow ITIL V3 for our incident management. Incidents can be reported via phone, web or email into our ticketing system. Incident reports are provided through the ticketing system with details provided around root cause analysis and remediation steps.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£1 to £2 a person a month
Discount for educational organisations
Free trial available
Description of free trial
Please contact Centerprise for details

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.