A refreshed experience is in progress. A few pages may be temporarily limited.

As a Service

Reach out to KIDAN for inquiries and support.

On-demand Consulting

Expert guidance for strategic technology decisions.

Toc

24/7 global technology operations center.

Implementation

Seamless enterprise technology solution deployment.

Training

Empower teams with expert-led technology programs.

Services

Enterprise services supporting critical IT infrastructure.

Solutions

Tailored IT solutions for operational excellence.

SOC

End-to-end security operations monitoring.

Support

Dedicated IT support for seamless operations.

Most visited page

Expert guidance for strategic technology decisions.

About Us

Learn more about KIDAN’s vision, values, and expertise.

Our Partners

Meet KIDAN’s partners working together to deliver technology solutions, support, and growth for businesses.
Leading enterprise IT management solutions
offered via KIDAN’s trusted partner ecosystem for scalable, secure operations.
10 +
Leading enterprise IT management solutions
offered via KIDAN’s trusted partner ecosystem for scalable, secure operations.
110 +
Enterprise clients across industry sectors
trust KIDAN’s strategic partnerships and solutions to drive technology success.
950 +

Network Configuration Manager for
Network Compliance

A multi-vendor NCCM solution for switches, routers, firewalls and other
network devices where you can take total control of the entire life cycle
of device configuration management.

Is Your Network Resilient, or Just Running?

The Challenge – Operating Without NCM

Without a configuration management tool, IT teams face blind spots, manual errors, and security risks across network devices.

Untracked Changes

Manual edits go unnoticed, leading to misconfigurations and outages.

Time-Consuming Tasks

Admins spend hours on backups and updates instead of strategic work.

Limited Oversight

Lack of visibility makes it hard to audit user actions and device status.

Security Gaps

Inconsistent setups expose networks to threats and compliance failures.

The Solution – Network Configuration Manager

NCM centralizes configuration control, automates tasks, and provides real-time insights for secure, efficient network operations.

Centralized Management

Monitor and manage all device configs from one dashboard.

Live Tracking

Instantly detect changes and track user activity across devices.

Automation

Schedule backups and apply bulk changes to reduce manual effort.

Improved Security

Enforce policies and spot vulnerabilities before they escalate.

All-In-One Network Configuration Platform

Everything in your network depends on device configurations. Behind every device, there’s a change, a policy, or a compliance requirement. Network Configuration Manager brings all configuration tasks together in one place, enabling you to secure, automate, and manage your network with ease. 

Manage

Every Configuration 

Backups

Version Control

Bulk Updates

Policy Enforcement

Empower

Every Admin

IT Teams

SecOps

Compliance Officers

Network Engineers

Secure

Everywhere

Switches

Routers

Firewalls

Access Points

Centralized Control

Manage all device configurations from a single dashboard for better visibility and efficiency.

Real-Time Change Tracking

Instantly detect configuration changes, track user activity, and prevent unauthorized edits.Help users with a knowledge base and service tools.

Automated Backups & Updates

Schedule backups and apply bulk configuration changes to save time and reduce errors.

Enhanced Security & Compliance

Enforce policies, audit configurations, and patch vulnerabilities to keep your network secure.

Key Features of Network Configuration Manager at Glance

Configuration Management

Backup device configurations, track changes, and compare versions all from a secure, centralized dashboard.

Real-time Change Alerts

Get instant notifications for config changes and block unauthorized edits to keep your network secure and compliant.

Compliance Auditing

Set policies, detect violations, and apply fixes to ensure devices meet compliance standards.

Task Automation

Save time by automating bulk configuration updates and routine tasks across devices.

Firmware Vulnerability Scanning

Identify and patch firmware vulnerabilities to reduce security risks.

Distributed Management

Manage configurations across multiple locations with the Enterprise Edition

Your Network, One Tap Away 

The Network Configuration Manager mobile app gives you network control on the go. Available for Android and iOS, it helps you manage key network tasks anytime, anywhere. 

Config backups 

Change tracking 

Firmware risks

Compliance status

User actions

Startup vs. running conflicts

Network Configuration Management Features

Scheduling Configuration Backup

Never miss out on routine crucial backup of your configuration files.

Automated Configuration Backup

Automate configuration backups whenever a change is detected.

Baseline Configuration

Set the best working configuration as your fallback mechanism in case of a disaster.

Database Backup and Disaster Recovery

Instantly recover from any network mishaps with a secure database backup.

Encrypted Storage of Configuration & Centralized Control

Secure your configuration files from malicious users in a central repository.

Configuration Versioning & Comparison

Backup your configuration files with automated incremental versioning, which can be used for comparison.

Real-time Configuration Change Tracking

Improve visibility with live updates on changes made to the device configurations.

Role Based Access Control

Restrict access to crucial network devices and tighten network security.

Quick Restorations to Trusted Versions

Instantly recover your device functionality with the rollback mechanism to stable configurations.

Change Management Rules & Notifications

Get alerts when an unauthorized personnel requests for a configuration change.

Diff View

Use color coded differences to spot configuration changes using side-by-side comparison.

Approval Mechanism for Configuration Upload

Take full control of what changes can be applied to the configuration files.

Command Execution Tasks

Experience seamless execution of complex network operations in bulk.

Automating Configuration Tasks

Automate repetitive network operations and centrally apply to all devices.

Remote Firmware Upgrade / OS Image Transfer

Avoid vulnerabilities by remotely upgrading your device firmware to the latest versions.

Vulnerability Database Sync

Establish a scheduled time for synchronizing vulnerability data from NIST and other important vendors.

Firmware Vulnerability Management

Promptly detect firmware vulnerabilities and implement regular corrective actions to mitigate security threats aimed at your network.

Firmware Vulnerability Insights

Access a unified overview of the status of all firmware vulnerabilities and impacted devices through dashboard widgets.

Compliance Monitoring

Stay compliant to HIPAA, CIS, and SOX Compliance and custom policies.

CIS Compliance

Protect your configurations and stay proactive against potential cybersecurity risks.

SOX compliance

Prevent incidents of accounting frauds by improving financial data transparency.

Compliance Reporting

Examine your network device compliance status with descriptive reports.

HIPAA Compliance

Secure computerized health information by fulfilling all the technical safeguards.

Multi-Vendor Device Configuration Support

Manage configurations of devices from over 200 different vendors.

What is Network Configuration Management (NCM)

Learn the basics of Network Configuration Management and how it benefits your business.

Network Device Management

Improve reliability by managing network devices with powerful device management.

Network Configuration and Change Management

Track changes in real-time, audit configurations and deploy configuration updates in multiple devices.

Automating Configurations Tasks

Automate configuration and completely eliminate manual configuration management.Use color coded differences to spot configuration changes using side-by-side comparison.

Network Configuration Analysis

Identify patterns and trends of network activities through in-depth analysis of configurations.

Configuration Reports

Track the who, what, and when of configuration changes and stay proactive against potential disasters.

Network Reports

Monitor essential information in real-time about diverse devices in your network, including network health, backup status, and more.

Network User Reports

Monitor network users and their activities, including access levels, upload requests, and audits in real-time, and prevent unauthorized changes.

Vulnerability Reports

Get the full picture of all the devices that are susceptible to vulnerabilities along with vulnerability levels.

EOL/EOS Report

Keep track of the end of support, end of sale, and end of life information of all your network devices with the EOL/EOS report.

Compliance Report

Review the compliance status of your network devices and address non-compliance with the click of a button.

Deployment Options

Windows Deployment

Install NCM on Windows using an installation wizard. You can choose to run it as a service and configure the installation directory.

Linux Deployment

Supports installation on Linux systems, including console mode and silent mode options. You can also install NCM with MSSQL database on Linux for advanced setups.

Bundled Components

Includes built-in TFTP server, Syslog server, PostgreSQL database, and JRE, making deployment easier without additional prerequisites.

For better implementation experience, and tailored solutions that's unique to your business.

Upgrade to a Fully Managed Security Posture

Introducing KIDAN’s Endpoint Management and Security as a Service powered by our 24/7 Swiss-led Technology Operations Center (TOC)

24/7 Proactive Security & Threat Mitigation

Our TOC operates around the clock to monitor your endpoints. We don’t just send you alerts; we actively investigate, validate, and remediate threats before they can impact your operations. This includes vulnerability management, patch deployment, and enforcing security configurations across your entire fleet of devices.

Expert Management & Optimization

Your Endpoint Central platform will be managed and optimized by certified engineers who live and breathe this technology. We handle all software deployments, policy configurations, and routine maintenance, ensuring the tool is always performing at its peak and aligned with the latest security best practices.

Strategic Reporting & Visibility

Move beyond raw data. We provide you with clear, executive-level monthly reports that translate technical activity into business-relevant insights. Understand your security posture, see the threats we’ve neutralized, and demonstrate compliance with ease.

We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.

How KIDAN Works with You

Choose the Model That Fits You Best 

We don’t just provide software we partner with you to ensure it delivers real, lasting value. Whether you’re looking for light-touch guidance or full-scale operational support, we offer flexible service models tailored to your needs. 

License + Expert Guidance

Start with the right license and unlock full value.
Already have the tool or just getting started? We’ll help you provision the right licenses and guide you to unlock the full potential of your investment. Think of us as your strategic advisor always available, never intrusive.

Implementation & Onboarding

We’ll help you set up, onboard, and train your team.

We’ll help you set up, onboard, and train your team.Need help getting up and running? We’re with you every step of the way from setup and configuration to onboarding and training. Our experts ensure your team is confident, capable, and ready to go.

Fully Managed Service

We manage everything so you don’t have to. 

Prefer to stay hands-off? Let us run the tool for you. We’ll handle everything monitoring, maintenance, updates, and optimization so you can focus on what matters most: your
business.

Introducing KIDAN’s Endpoint Management and Security as a Service powered by our 24/7 Swiss-led Technology Operations Center (TOC)

Network Configuration
Manager (NCM) Manage
on the go. 

Network issues often stem from misconfigurations, compliance gaps, or conflicting changes. With NCM, you get real-time visibility and control to prevent and recover from such disasters.
Track user actions, manage changes, and back up configurations all from one platform. Watch the video to see how NCM simplifies configuration, change, and compliance management. 

Deployment Options

Windows Deployment

Install NCM on Windows using an installation wizard. You can choose to run it as a service and configure the installation directory.

Linux Deployment

Supports installation on Linux systems, including console mode and silent mode options. You can also install NCM with MSSQL database on Linux for advanced setups.

Bundled Components

Includes built-in TFTP server, Syslog server, PostgreSQL database, and JRE, making deployment easier without additional prerequisites.

How KIDAN Works with You

Choose the Model That Fits You Best 

We don’t just provide software we partner with you to ensure it delivers real, lasting value. Whether you’re looking for light-touch guidance or full-scale operational support, we offer flexible service models tailored to your needs. 

License + Expert Guidance

Start with the right license and unlock full value.
Already have the tool or just getting started? We’ll help you provision the right licenses and guide you to unlock the full potential of your investment. Think of us as your strategic advisor always available, never intrusive.

Implementation & Onboarding

We’ll help you set up, onboard, and train your team.

We’ll help you set up, onboard, and train your team.Need help getting up and running? We’re with you every step of the way from setup and configuration to onboarding and training. Our experts ensure your team is confident, capable, and ready to go.

Fully Managed Service

We manage everything so you don’t have to. 

Prefer to stay hands-off? Let us run the tool for you. We’ll handle everything monitoring, maintenance, updates, and optimization so you can focus on what matters most: your
business.

Introducing KIDAN’s Endpoint Management and Security as a Service powered by our 24/7 Swiss-led Technology Operations Center (TOC)

Key Features of Network Configuration Manager at Glance

Configuration Management

Backup device configurations, track changes, and compare versions all from a secure, centralized dashboard.

Real-time Change Alerts

Get instant notifications for config changes and block unauthorized edits to keep your network secure and compliant.

Compliance Auditing

Set policies, detect violations, and apply fixes to ensure devices meet compliance standards.

Task Automation

Save time by automating bulk configuration updates and routine tasks across devices.

Firmware Vulnerability Scanning

Identify and patch firmware vulnerabilities to reduce security risks.

Distributed Management

Manage configurations across multiple locations with the Enterprise Edition

Network Configuration Management Features

Scheduling Configuration Backup

Never miss out on routine crucial backup of your configuration files.

Automated Configuration Backup

Automate configuration backups whenever a change is detected.

Baseline Configuration

Set the best working configuration as your fallback mechanism in case of a disaster.

Database Backup and Disaster Recovery

Instantly recover from any network mishaps with a secure database backup.

Encrypted Storage of Configuration & Centralized Control

Secure your configuration files from malicious users in a central repository.

Configuration Versioning & Comparison

Backup your configuration files with automated incremental versioning, which can be used for comparison.

Real-time Configuration Change Tracking

Improve visibility with live updates on changes made to the device configurations.

Role Based Access Control

Restrict access to crucial network devices and tighten network security.

Quick Restorations to Trusted Versions

Instantly recover your device functionality with the rollback mechanism to stable configurations.

Change Management Rules & Notifications

Get alerts when an unauthorized personnel requests for a configuration change.

Diff View

Use color coded differences to spot configuration changes using side-by-side comparison.

Approval Mechanism for Configuration Upload

Take full control of what changes can be applied to the configuration files.

Command Execution Tasks

Experience seamless execution of complex network operations in bulk.

Automating Configuration Tasks

Automate repetitive network operations and centrally apply to all devices.

Remote Firmware Upgrade / OS Image Transfer

Avoid vulnerabilities by remotely upgrading your device firmware to the latest versions.

Vulnerability Database Sync

Establish a scheduled time for synchronizing vulnerability data from NIST and other important vendors.

Firmware Vulnerability Management

Promptly detect firmware vulnerabilities and implement regular corrective actions to mitigate security threats aimed at your network.

Firmware Vulnerability Insights

Access a unified overview of the status of all firmware vulnerabilities and impacted devices through dashboard widgets.

Compliance Monitoring

Stay compliant to HIPAA, CIS, and SOX Compliance and custom policies.

CIS Compliance

Protect your configurations and stay proactive against potential cybersecurity risks.

SOX compliance

Prevent incidents of accounting frauds by improving financial data transparency.

Compliance Reporting

Examine your network device compliance status with descriptive reports.

HIPAA Compliance

Secure computerized health information by fulfilling all the technical safeguards.

Multi-Vendor Device Configuration Support

Manage configurations of devices from over 200 different vendors.

What is Network Configuration Management (NCM)

Learn the basics of Network Configuration Management and how it benefits your business.

Network Device Management

Improve reliability by managing network devices with powerful device management.

Network Configuration and Change Management

Track changes in real-time, audit configurations and deploy configuration updates in multiple devices.

Automating Configurations Tasks

Automate configuration and completely eliminate manual configuration management.Use color coded differences to spot configuration changes using side-by-side comparison.

Network Configuration Analysis

Identify patterns and trends of network activities through in-depth analysis of configurations.

Configuration Reports

Track the who, what, and when of configuration changes and stay proactive against potential disasters.

Network Reports

Monitor essential information in real-time about diverse devices in your network, including network health, backup status, and more.

Network User Reports

Monitor network users and their activities, including access levels, upload requests, and audits in real-time, and prevent unauthorized changes.

Vulnerability Reports

Get the full picture of all the devices that are susceptible to vulnerabilities along with vulnerability levels.

EOL/EOS Report

Keep track of the end of support, end of sale, and end of life information of all your network devices with the EOL/EOS report.

Compliance Report

Review the compliance status of your network devices and address non-compliance with the click of a button.

Deployment Options

Windows Deployment

Install NCM on Windows using an installation wizard. You can choose to run it as a service and configure the installation directory.

Linux Deployment

Supports installation on Linux systems, including console mode and silent mode options. You can also install NCM with MSSQL database on Linux for advanced setups.

Bundled Components

Includes built-in TFTP server, Syslog server, PostgreSQL database, and JRE, making deployment easier without additional prerequisites.

How KIDAN Works with You

Choose the Model That Fits You Best 

We don’t just provide software we partner with you to ensure it delivers real, lasting value. Whether you’re looking for light-touch guidance or full-scale operational support, we offer flexible service models tailored to your needs. 

License + Expert Guidance

Start with the right license and unlock full value.
Already have the tool or just getting started? We’ll help you provision the right licenses and guide you to unlock the full potential of your investment. Think of us as your strategic advisor always available, never intrusive.

Implementation & Onboarding

We’ll help you set up, onboard, and train your team.

We’ll help you set up, onboard, and train your team.Need help getting up and running? We’re with you every step of the way from setup and configuration to onboarding and training. Our experts ensure your team is confident, capable, and ready to go.

Fully Managed Service

We manage everything so you don’t have to. 

Prefer to stay hands-off? Let us run the tool for you. We’ll handle everything monitoring, maintenance, updates, and optimization so you can focus on what matters most: your
business.

Introducing KIDAN’s Endpoint Management and Security as a Service powered by our 24/7 Swiss-led Technology Operations Center (TOC)
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.

For better implementation experience, and tailored solutions that's unique to your business.

Network Configuration Manager Editions

Features

Free

Professional

Enterprise

Starting Price

Free

$595 (10 devices)

$8395 (250 devices)

Max Devices Count

2 devices

10,000

50,000

Multi-Site/ Distributed Network Monitoring

X

X

Detailed feature comparison

Configuration backup

Network automation using Configlets

Real-time change detection

Configuration change notifications and rollback mechanism

Network compliance management

Detailed reports

Support for devices from 200+ vendors

Manage up to 10000 devices

X

24x5 technical support

X

Multi-Site / Distributed Network Configuration Management

X

X

Automatic data sync between all probes ( Multiple sites)

X

X

Smart Upgrade - Automatic PPM Upgrade for all probes

X

X

Collective data/reports in the central server

X

X

Pricing Plans Tailored to Fit Your Business

Network Configuration Manager – non-binding prices

Datasheet

Network Configuration Manager Datasheet

Comparison

Network Configuration Manager Comparison

Schedule a personalized demo

serviceDeskPlus-License&Quote

Your Questions, Answered with Clarity.

Direct answers to the most common strategic, technical, and commercial questions
about Endpoint Central.
ManageEngine Network Configuration Manager is a comprehensive Network Change and Configuration Management (NCCM) solution that enables the Network Administrator to efficiently and effortlessly manage the configurations of Network Devices. Network Configuration Manager offers multi-vendor network device configuration, continuous monitoring of configuration changes, notifications on respective changes, detailed operation audit and trails, examining device configurations for compliance to a defined set of policies and standards, real-time compliance status reporting, easy and safe recovery to trusted configurations, automation of configuration tasks and insightful reporting.
Network Configuration Manager can manage network devices such as switches, routers, firewalls wireless access points and integrated access devices etc. from multiple vendors such as Cisco, HP, Nortel, Juniper, Force10, 3Com, D-link, Foundry, Dell, Aruba, Extreme, ADTRAN, Enterasys, Huawei, Blue Coat, Proxim, NetScreen, NETGEAR, FortiNet, ALAXALA, Brocade, Radware, DAX, H3C, Yamaha, Vanguard, Allied Telesis, Alcatel. It discovers network devices, builds up an inventory database and allows IT administrators to take control of configuring the devices from a central console. The web-based administrator console provides the User Interface to perform all the configuration operations. Additionally, it can be accessed from anywhere using any standard web browser.
Yes, Network Configuration Manager provides option to mail reports to email IDs. You can schedule reports to be generated at any point of time and reports will be mailed to your email ID.
‘Yes it maintains historical data of device configuration. The historical data are available in the device properties page of each device.

Yes, you can replace the bundled JRE with any other desired version.

  • Shut down Network Configuration Manager server, if already running
  • Go to <Network Configuration Manager_Installation_Folder>
  • Rename the existing ‘jre‘ directory as, say, ‘jre-old
  • Put the new JRE directory under <Network Configuration Manager_Installation_Folder>. The folder should be named jre
  • Start Network Configuration Manager Server

 

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Join 100+ IT Leaders at KIDANVerse

Be part of the first edition.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details For Pricing

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.