A refreshed experience is in progress. A few pages may be temporarily limited.

As a Service

Reach out to KIDAN for inquiries and support.

On-demand Consulting

Expert guidance for strategic technology decisions.

Toc

24/7 global technology operations center.

Implementation

Seamless enterprise technology solution deployment.

Training

Empower teams with expert-led technology programs.

Services

Enterprise services supporting critical IT infrastructure.

Solutions

Tailored IT solutions for operational excellence.

SOC

End-to-end security operations monitoring.

Support

Dedicated IT support for seamless operations.

Most visited page

Expert guidance for strategic technology decisions.

About Us

Learn more about KIDAN’s vision, values, and expertise.

Our Partners

Meet KIDAN’s partners working together to deliver technology solutions, support, and growth for businesses.
Leading enterprise IT management solutions
offered via KIDAN’s trusted partner ecosystem for scalable, secure operations.
10 +
Leading enterprise IT management solutions
offered via KIDAN’s trusted partner ecosystem for scalable, secure operations.
110 +
Enterprise clients across industry sectors
trust KIDAN’s strategic partnerships and solutions to drive technology success.
950 +

Trusted ColorTokens Partner in Switzerland

Colortokens Microsegmentation
That Keeps You Breach Ready

We architect and deliver true Zero Trust microsegmentation. Contain threats, secure any workload, and eliminate lateral movement with the definitive Swiss authority on the Colortokens platform. Strengthen your critical environments with micro-segmentation, network visibility, and Zero Trust security.

Powering and Protecting Switzerland Core Industries

Breaches Are Increasing Every Year Despite
Spending More and More

Spend​


(US$ Billion)

0
0
0
0
0
0
0
0
0
0

2014

2015

2016

2017

2018

2019

2020

2021

2022

2023

Breaches per year​
0

Breaches are inexpensive for the bad actor…​

Initial access​
$ 0
Avg. breakout time​
0 Minutes

but very expensive for the business.​

Avg. cost of breach​
$ 5 M
Mean time to remediate​
0 Days

Colortokens Microsegmentation That
Keeps You Breach Ready

Spend​


(US$ Billion)

0
0
0
0
0
0
0
0
0
0

2014

2015

2016

2017

2018

2019

2020

2021

2022

2023

Breaches per year​
0

Breaches are inexpensive for the bad actor…​

Initial access​
$ 0
Avg. breakout time​
0 Minutes

but very expensive for the business.​

Avg. cost of breach​
$ 5 M
Mean time to remediate​
0 Minutes

Our Outcome-Driven MicroSegmentation Blueprints

Simplify Security in a Complex Hybrid Cloud

We build a unified segmentation policy that is independent of the underlying network. This ensures consistent, centrally managed security for your workloads, whether they are on-premises or in the cloud. 

Apply the same security logic across VMs, containers, bare metal, on-prem, and public clouds.

Automatically group and secure workloads based on attributes (e.g., tags, labels, roles), no static IP dependencies.

Deep traffic insights across environments help simplify policy creation and threat detection.

Stop Ransomware in Its Tracks

We use Colortokens to create impenetrable micro-perimeters around critical assets. If an attacker breaches the perimeter, they are trapped and cannot move laterally, neutralizing the threat. 

Prevents malware from moving laterally across workloads or segments. 

Only explicitly allowed communication is permitted ransomware can’t “guess” its way across the network. 

Rapid detection and isolation of infected segments minimize impact and recovery time. 

Pass Audits Without Panic

We leverage the platform’s visualization and policy tools to create and enforce software-defined boundaries. This generates clear, audit-ready reports that prove compliance and reduce audit preparation time by weeks.

Limit communication to what’s strictly necessary, a key compliance pillar.

Demonstrate control over traffic flows and access paths, useful for audits.

Create compliance-aligned policies once and apply them consistently across all environments.

Microsegmentation:
Macro Security

ColorTokens delivers Zero Trust microsegmentation solutions, centered on their Xshield Enterprise Microsegmentation Platform. By leveraging granular policy enforcement and network traffic visualization, ColorTokens isolates critical assets and significantly reduces the potential for lateral threat propagation.  

This is heading

This is text

Microsegmentation:
Macro Security

ColorTokens delivers Zero Trust microsegmentation solutions, centered on their Xshield Enterprise Microsegmentation Platform. By leveraging granular policy enforcement and network traffic visualization, ColorTokens isolates critical assets and significantly reduces the potential for lateral threat propagation.  

Arrow Image

How is this happening?​

Microsegmentation stops lateral movement by creating microperimeters around applications or asset groups. It allows only valid communication within and across segments, blocking all others based on Zero Trust. This approach prevents command-and-control activities and data theft.

Platform Capabilities

Auto-Tagging

Simplifies asset tagging using custom rule-based criteria

Template-Driven Policy

Enables consistency, and facilitates the addition of new assets

Visual Policy Design

Provides a network map to define approved/denied flows

Policy Auto-Recommendation

Suggests policy based on observed traffic and heuristics

Integrations

Leverages investments in SIEM, SOAR, Vulnerability DB, Threat Intelligence

On-Device Policy Testing

Validates policies before enforcement for non-disruptive implementation

Container Microsegmentation

Controls Kubernetes communications at the API-level

OT/IoT Microsegmentation

Provides traffic visualization, simulation and agentless enforcement

Proactive Endpoint Defense with Xprotect & XDR

ColorTokens Xprotect and XDR redefine endpoint security by delivering Zero Trust protection that’s proactive, intelligent, and built for modern hybrid environments.

Xprotect: Signature-less Endpoint Protection

As the sole official distributor (VAD) and most certified partner (VAR) for Colortokens in Switzerland, we provide an extensive level of service.

✅ local, bilingual engineers

✅ Access to top-tier vendor support

✅ Swiss data laws (FADP) Compliance

✅ optimized commercial termss

Your success is guaranteed by our unique position in the
market.

XDR: Extended Detection and Response

ColorTokens XDR delivers holistic visibility and response across endpoints, cloud workloads, servers, and users. It correlates telemetry across the enterprise to:
✅ Detect advanced threats using AI/ML and behavioral analytics.
✅ Automate containment with one-click isolation and kill-switch capabilities.
✅ Reduce alert fatigue with enriched context and high-confidence alerts.

✅ Accelerate investigations with visual timelines and blast radius analysis.

✅ Enable 24/7 threat hunting and incident response through certified experts.
Be breach-ready. Lock down endpoints. Respond with confidence.
Overall Rating​
4 /5
Product Capabilities​
4 /5
Customer Experience
4 /5
sensors installed
0 K+
servers protected​
0 K+
25 Patents​
0 Years

Don’t let hackers finish what they start.

Xshield visualizes your environment, assesses risk, and secures all workloads and endpoints by placing a micro-perimeter around each for strong protection.

Protect Your Crown Jewels with ColorTokens Xshield

Every organization has crown jewels: critical applications, servers, and data. ColorTokens Xshield protects them using real-time visibility, microsegmentation, threat containment, simple policy enforcement, and continuous compliance ensuring only authorized access while blocking malware, ransomware, and lateral movement.

The KIDAN Advantage
Your End-to-End Swiss Partner

Exclusive Swiss Authority & Access

As the sole official distributor (VAD) and most certified partner (VAR) for Colortokens in Switzerland, we provide an extensive level of service.

✅ local, bilingual engineers

✅ Access to top-tier vendor support

✅ Swiss data laws (FADP) Compliance

✅ optimized commercial termss

Your success is guaranteed by our unique position in the
market.

Strategic Zero Trust Architecture

We don’t just deploy agents; we architect breach containment.

✅Starts with your business risk, not just technology

✅ Comprehensive Zero Trust strategy tailored to your environment

✅ Seamless integration with your SIEM and SOAR platforms

✅ Measurable reduction in attack surface and organizational risk

Built to strengthen your entire security posture from the inside out.

Full Lifecycle Integration & Consumption

We are not transactional resellers; we are a lifecycle
partner.

✅ Consume resilient security on your terms

✅ Engage us for fixed-scope On-Demand Projects

✅ Transition to a fully managed As a Service subscription

✅ Augment your team with 24/7 protection from our
Technology Operations Center (TOC)
We adapt to your operational model.

ColorTokens is Rated a Leader in the Forrester Wave™: Microsegmentation Solutions, Q3 2024

The Forrester Wave:
Micro segmentation
Solution, Q3 2024

KIDAN Blueprint

Reference Architecture:
A Blueprint for RansomwareContainment with Microsegmentation

Case study

How a Swiss Pharmaceutical Firm Secured its Hybrid Cloud with KIDAN and Colortokens

On-Demand Webinar 

Beyond Firewalls: A CISO’s Guide to
Practical Zero Trust

For Our Partners: Become a Certified Colortokens Reseller

As the exclusive Swiss distributor for Colortokens, we are actively building a network of elite IT partners. We provide the training, technical pre-sales support, and commercial framework necessary to empower you to deliver world-class microsegmentation solutions to your clients. Partner with the source.

Trusted by Leading Organizations

Request Your
Free Customized Demo

By clicking 'Submit now' you agree to processing of personal data according to the  Privacy Policy.

Your Questions Answered by the Experts

What is microsegmentation and how does it differ from network-based controls like VLANs and firewalls?

Think of it as the difference between a castle wall and a dedicated bodyguard for every important person inside. Traditional firewalls and VLANs are like castle walls they are strong at the perimeter but offer little protection once someone is inside. Microsegmentation provides a dedicated bodyguard for each individual application (workload). It uses the workload’s identity, not its network address, to enforce policy. This means if one server is compromised, it is immediately isolated and cannot communicate with others, stopping lateral movement and containing the breach.

This is a critical design consideration. The Colortokens agent is a lightweight, kernel-level component engineered for high performance. For the vast majority of enterprise workloads, the performance impact is minimal to negligible, typically consuming less than 1-2% of CPU. A core part of our blueprint is to establish a performance baseline during the initial ‘visibility-only’ phase to ensure that when policies are enforced, there is no adverse impact on your business applications.

This is central to our methodology and the platform’s design.

Every KIDAN engagement follows a zero-disruption rollout plan:

  1. Visibility Phase: We deploy agents in a non-enforcement mode to simply observe and map 100% of your traffic flows. There is no impact.
  2. Simulation Phase: We use this map to build and model policies. You can see the exact impact of a proposed rule before it is ever enforced.
  3. Phased Enforcement: We begin enforcement on the least critical applications, validate the outcome, and progressively expand the policy across your environment in controlled stages. This methodology guarantees a secure, seamless transition without any operational disruption.

Microsegmentation is not defined by employee count, but by the level of operational risk and IT complexity. In reality, we cover and recommend microsegmentation by use case but realistically would advise it from companies above 50 employees, on average. It delivers the highest strategic value to organizations that have: a hybrid environment (on-premise and cloud), strict compliance requirements (FINMA, PCI, ISO), high-value intellectual property to protect, or a low tolerance for downtime caused by a breach. If a single security incident could cause significant financial or reputational damage, you are the right size for a microsegmentation strategy. Our scoping call is designed to determine if this strategic value aligns with your specific operational reality.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Join 100+ IT Leaders at KIDANVerse

Be part of the first edition.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details For Pricing

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.