Cloudtexo Ltd

Unified Endpoint Management

Our proven service allows you to manage, secure and automate devices, apps (mobile & web) and data/content for Apple IOS, Google Android, MacOS & Windows 10. With security absolutely critical for a mobility first strategy, we deliver the ultimate value to every endpoint in your business.


  • Mobile Device Management
  • Unified Endpoint Security
  • Mobile Security
  • Mobile Content Management
  • Kiosk Management Software
  • Mobile Application Delivery
  • Mobile Risk Management
  • Mobile Data Security
  • Endpoint Automation
  • Mobile GDPR Readiness


  • Deliver apps to endpoints instantly
  • Manage, Secure & Automate devices from a single console
  • Deliver endpoint security from a single console
  • Protect users across every device
  • Ensure BYOD security for every mobile user
  • Allow for devices to be locked down and secure
  • Ensure users are protected from malicious content
  • Control mobile browsing on Android & IOS
  • Eliminate passwords for Mobile devices
  • Ensure data security for all mobile devices


£11.88 to £23.76 per device per year

Service documents


G-Cloud 11

Service ID

9 0 8 0 3 5 4 3 9 3 6 9 7 6 0


Cloudtexo Ltd

Sanjay Patel


Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Public cloud
  • Hybrid cloud
Service constraints Premium Support or Custom Development is an extra charge
System requirements No other MDM software installed

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Weekend response times is not possible without a valid support contract. When a ticket is raised, you get a response with a ticket number and then the team will respond as quick as possible. When you raise a ticket, you will include all relevant information for faster resolution
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels There are 2 support levels:

1. Standard Support is included with all license sales
2. Premium support for remote assist is £0.99 per device per month (min 12 month).

We have dedicated teams based on the support requirement
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started The user only has to visit one website and they are given fully functional web access instantly. Once they register,we offer assistance to the user with as little or as much required to help them enrol devices and then to start applying policies.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Users can ask for data extraction but in 99% of most cases, their is any real data as we provide commands rather than users having to upload data. Once a contract ends, we delete their tenant so nothing is ever accessible again.
End-of-contract process The customer if they decide not to renew their subscription will firstly be locked out of the console and then the account will be deleted either 90 days from the end of the contract or instantly if requested. Their is no additional cost for the option they choose.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Our service works across any Android, IOS, MacOS or Windows 10 device. Different device types have different capabilities based on the hardware device being used but in most cases the experiences are minor
Service interface No
What users can and can't do using the API We have a publicly available RESTFUL API allowing you to plug into our system with your own system for extra unique functions.
API documentation Yes
API documentation formats Other
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Our service can be customised if required based on the needs and possibilities for extra functions for particular devices types including Samsung, Apple etc.

We can also create additional functions outside of the road map for particular devices including custom built mobile devices.


Independence of resources Our system is purposely built to scale. We can scale on-demand without ever impacting other users/customers and with a constant load-test, we are constantly improving our platform to make sure we can scale way beyond what most companies need


Service usage metrics Yes
Metrics types While we provide unlimited service usage, if you use the AppTec Content Box functions, you can buy more storage space so we do provide metrics on how much storage you have consumed
Reporting types Real-time dashboards


Supplier type Reseller providing extra features and support
Organisation whose services are being resold AppTec360

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach The only data we could house to export would be user information either via Active Directory/LDAP or CSV uploaded directory information.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network Our Cloud provider provides encryption for data-at-rest so our data within our private network is 100% secure.

Availability and resilience

Availability and resilience
Guaranteed availability We provide 99.999% of uptime. If we do not meet this, we do not offer a refund however our service has never or will ever go down as we have HA and DR processes in place for continuous availability.
Approach to resilience We have in-built HA into our core software and our system is virtual so uptime is absolute critical. We can provide more information on request.
Outage reporting We do not report outages

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
  • Other
Other user authentication Only validated users can access our system. The customer can, utilising our role-based access feature define rights to administrators down to feature level providing the highest level of security rather than a simple on-off function.
Access restrictions in management interfaces and support channels We have a role-based access function down to feature level that lets us dedicate roles based only the functions required for a given admin to carry out their job role.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password
  • Other
Description of management access authentication Role-based access controls

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 TÜV Süd & Federal Office for Information Security (Germany)
ISO/IEC 27001 accreditation date Pre 2017
What the ISO/IEC 27001 doesn’t cover End user interaction with the back-end cloud service
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes We have controls in place for GDPR and follow the standard data destruction and data policy laws for our business sector.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We have change control processes that can be shared that are available on request
Vulnerability management type Undisclosed
Vulnerability management approach We have dedicated teams internally that ensures security.

Our system is always patched to the latest security standards and built on Linux so our software is hardened to ensure we are never vulnerable to attack.

Our in-house security experts use the Linux foundation as well as other public resources to ensure the service is always secure.
Protective monitoring type Undisclosed
Protective monitoring approach Our dedicated security team stay one step ahead with our service by proactively ensuring that our software is always monitored. If we find a potential compromise, our team will take the correct steps to implement any changes in structured manner. We respond as quick as we possibly can be as our service runs thousands of customers.
Incident management type Undisclosed
Incident management approach We have pre-defined internal processes for common events but users can respond by contacting support directly from the cloud console or by contacting support via the AppTec website.

Our service has never experienced an incident but if it did, we'd display this on the cloud console login page.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £11.88 to £23.76 per device per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial We offer a fully functional trial for 30 days which can be extended if required
Link to free trial

Service documents

Return to top ↑