A refreshed experience is in progress. A few pages may be temporarily limited.

As a Service

Reach out to KIDAN for inquiries and support.

On-demand Consulting

Expert guidance for strategic technology decisions.

Toc

24/7 global technology operations center.

Implementation

Seamless enterprise technology solution deployment.

Training

Empower teams with expert-led technology programs.

Services

Enterprise services supporting critical IT infrastructure.

Solutions

Tailored IT solutions for operational excellence.

SOC

End-to-end security operations monitoring.

Support

Dedicated IT support for seamless operations.

Most visited page

Expert guidance for strategic technology decisions.

About Us

Learn more about KIDAN’s vision, values, and expertise.

Our Partners

Meet KIDAN’s partners working together to deliver technology solutions, support, and growth for businesses.
Leading enterprise IT management solutions
offered via KIDAN’s trusted partner ecosystem for scalable, secure operations.
10 +
Leading enterprise IT management solutions
offered via KIDAN’s trusted partner ecosystem for scalable, secure operations.
110 +
Enterprise clients across industry sectors
trust KIDAN’s strategic partnerships and solutions to drive technology success.
950 +

Cloud Security monitoring And Analytics

Find, Protect, and Control Your Sensitive Data, effortlessly.

Key Features Data Security Plus
at Glance 

File Server Auditing

Continuously monitor and audit all file activities across your server environment, tracking access, modifications, and changes in real time with instant alerts.

Data Leak Prevention

Detect and prevent data leaks by monitoring unauthorized transfers via USB, email, printers, and channels, ensuring real-time protection against insider and external threats.

Data Risk Assessment

Perform deep content inspection and contextual analysis to identify sensitive data, classify files by risk, prioritize protection, and ensure compliance with regulatory requirements.

Instant network overview

Gain real-time visual insights into IP allocations, DNS resolutions, and DHCP lease statuses, facilitating better decision-making and network planning with up-to-date information.

Domain monitoring

Visualize and monitor the query and response traffic to measure the performance of your on-premises hosted domains.

Receive in-depth visibility into your cloud-based services with DataSecurity Plus

Discover and manage the cloud apps in your network to strengthen security
and protect against malicious attacks.

Cloud app discovery

✅ Monitor the use of cloud applications across endpoints, and gain insights into your organization's encrypted web traffic.

✅ Ensure all cloud applications used are in line with your organization's security practices, i.e., with adequate levels of encryption and reliable third-party certificates.

✅ Track cloud services across multiple categories like personal sites and blogs, legal, search engines, computer security, and more.

✅ Audit the varied failed and successful access requests made to both sanctioned and unsanctioned applications.

Web content filtering

✅ Estimate the reputation score of every cloud application accessed based on its history, age, underlying URLs, and more using our threat analytics database.

✅ Take real-time action, and stop the unfettered use of high-risk cloud services by blocking the use of banned or unsanctioned applications from one central location.

✅ Analyze requests made to cloud apps with low reputation scores along with details of upload and download activities through them.

✅ Improve workforce productivity by blocking the use of non-business cloud services like social networking, e-commerce, and live streaming websites.

Cloud security

✅ Generate detailed reports on the upload requests made across SharePoint, Exchange, OneDrive, DropBox, Box, and other web services.

✅ Block web traffic to unsafe websites such as spam and malware sites, or those with inappropriate content.

✅ Keep a close eye on the use of shadow IT services and the top actors who use them to identify the risk they pose to your organization's data security.

✅ Generate critical security insights on which actor accessed what web apps and when. Analyze the browsers and methods being used to access the cloud apps.

Web app usage analysis

✅ Use deep packet inspection to analyze how various actors interact with cloud applications, and examine details about upload and download activity.

✅ Analyze the difference in usage between web-based and native cloud applications. Analyze access requests made from specific browsers to zero-in on events of interest.

✅ Analyze data sharing patterns via web services within your organization using informative reports and graphs.

✅ Gather web application access statistics such as website usage categorized by upload or download volume, request count, and more.

Data visibility and security in one package

DataSecurity Plus, the data visibility and data leak prevention component of Log360, helps fight insider threats, prevent data loss, and meet compliance requirements.

USB data theft protection

Secure and control access to USBs by creating block lists. Also, detect and respond to data theft attempts with instant responses.

Email security

Inspect email attachments for restricted content, warn employees against policy violations, and prevent leakage of confidential files via email attachments.

Ransomware response

Proactively detect and shut down the spread of potential ransomware attacks by isolating infected devices from the network with automated threat responses.

Insider threat detection

Monitor all file activities, removable device usage, data transfers, application use, and more 24/7 to spot and respond to anomalous activities.

File copy protection

Selectively block file copy actions across local or network shares to safeguard your organization’s business-critical information from theft and exposure.

File integrity monitoring

Spot unusual file activities and unwarranted file transfers with real-time file activity monitoring. You can also trigger instant alerts and execute scripts in response.

Security incident response

Detect and automate immediate responses to ransomware attacks, data exfiltration attempts, file transfer anomalies, and more.

Application allow listing

Reduce the risk posed by malicious applications and ensure that only trusted and vetted applications are executed by enforcing application control.

Web content filtering

Scrutinize the use of shadow IT services and block productivity-draining cloud applications like social networking, e-commerce, and other websites with sensitive content.

File access auditing

Track all file accesses, including read, create, rename, copy, permission change, delete, and more in real time with details on who accessed what, when, and from where.

File copy auditing

Track and record every time a user presses Ctrl+C or right-clicks to copy a file from network shares, workstations, and removable storage devices like USBs.

Workstation monitoring

Gain visibility into file access patterns, data transfer activities, cloud upload and download information, and more with in-depth endpoint security monitoring.

Data discovery

Locate files containing sensitive personal data like PII, ePHI, and PCI using predefined data discovery policies, and demonstrate compliance to the GDPR, HIPAA, PCI DSS, and more.

Data classification

Enable content-aware protection by classifying files based on their business value and vulnerability level using automated and manual file tagging capabilities.

ROT analysis

Locate and delete data with little or no value to your business, such as old and stale files, duplicate copies, orphaned files, non-business files, and more.

Permissions analyzer

Examine file security permissions to identify those with permission hygiene issues and files with excessive access rights.

Disk space analysis

Gain in-depth, drive-based insights by analyzing employees’ storage patterns and consumption rates. Trigger instant alerts when free space falls to critical levels.

Cloud app discovery

Track cloud application usage rates and record upload and download requests made across SharePoint, Exchange, OneDrive, Dropbox, Box, and other web services.

Deployment Options

On-Premises

Direct Infrastructure Control: Install Data Security Plus on a local Windows server to maintain complete ownership of your sensitive data and audit logs within your own perimeter.

Comprehensive Data Auditing: Securely monitor and report on file accesses and modifications across on-premises Windows file servers, failover clusters, and Workgroup servers in real time.

Air-Gapped Network Support: Ideal for high-security environments where servers must remain isolated from the public internet while still providing full data leak prevention (DLP) and file integrity monitoring.

LAN-Optimized Performance: Ensure high-speed data discovery and classification across your local storage arrays (NAS, SAN) with minimal latency.

Cloud Deployment Via
Virtual Machine (e.g., in Azure/AWS)

Hybrid Data Visibility: Deploy the Data Security Plus server on a virtual machine in AWS or Azure to audit cloud-based storage services like Amazon FSx and Azure Files.

Scalable Architecture: Easily adjust your cloud instance’s CPU and RAM to handle growing volumes of unstructured data and increasing numbers of monitored endpoints.

Remote Workforce Security: Use a cloud-hosted VM with a public/elastic IP to maintain a constant connection with roaming agents, ensuring data leak prevention even for employees outside the office.

 

Cloud-Hosted (SaaS)

Zero Hardware Maintenance: Access powerful data security capabilities without the need to manage backend databases, web servers, or manual software updates.

Instant Protection: Rapidly deploy data leak prevention policies and web content filtering across a distributed workforce by leveraging a fully managed cloud infrastructure.

Consolidated Cloud SIEM: (Via Log360 Cloud integration) Gain a unified view of security events across your hybrid environment, combining on-premises file auditing with cloud-native security insights.

Migration Options

Seamless Environment Transition Effortlessly migrate your Data Security Plus configurations, discovery rules, and historical audit data from an on-premises setup to a Cloud VM (Azure/AWS) without losing your compliance trail.

Legacy Tool Replacement Replace fragmented, high-maintenance legacy auditing software with a unified platform. Use built-in import utilities to bring over existing server lists and user permissions for a faster cutover.

Database Migration Support Flexibility to migrate your back-end security database from the default PostgreSQL to a dedicated Microsoft SQL Server instance as your data volume and auditing requirements scale.

With DataSecurity Plus'
file server auditing tool,
you can

✅ Generate analytics on the most accessed or modified files, most active users, etc.

✅ Scrutinize failed attempts to access files containing business information.

✅ Find irrelevant and personal media files hoarded by employees in enterprise storage.

✅ Maintain a record of file copy and paste activities.

✅ Use the interactive dashboard to compare file changes at the global and server levels.

✅ Audit all file activities with details on who accessed what, when, and from where.

✅ Track critical file changes, such as those to SACLs, owners, file extensions, and permissions.

✅ Use default Alert Profiles to detect high-risk file changes and spikes in access attempts.

✅ Monitor file integrity with instant e-notifications.

✅ Detect and stop ransomware attacks using instant threat responses.

For better implementation experience, and tailored solutions that's unique to your business.

Upgrade to a Fully Managed Security Posture

Introducing KIDAN’s Endpoint Management and Security as a Service powered by our 24/7 Swiss-led Technology Operations Center (TOC)

24/7 Proactive Security & Threat Mitigation

Our TOC operates around the clock to monitor your endpoints. We don’t just send you alerts; we actively investigate, validate, and remediate threats before they can impact your operations. This includes vulnerability management, patch deployment, and enforcing security configurations across your entire fleet of devices.

Expert Management & Optimization

Your Endpoint Central platform will be managed and optimized by certified engineers who live and breathe this technology. We handle all software deployments, policy configurations, and routine maintenance, ensuring the tool is always performing at its peak and aligned with the latest security best practices.

Strategic Reporting & Visibility

Move beyond raw data. We provide you with clear, executive-level monthly reports that translate technical activity into business-relevant insights. Understand your security posture, see the threats we’ve neutralized, and demonstrate compliance with ease.

We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.

How KIDAN Works with You

Choose the Model That Fits You Best 

We don’t just provide software we partner with you to ensure it delivers real, lasting value. Whether you’re looking for light-touch guidance or full-scale operational support, we offer flexible service models tailored to your needs. 

License + Expert Guidance

Start with the right license and unlock full value.
Already have the tool or just getting started? We’ll help you provision the right licenses and guide you to unlock the full potential of your investment. Think of us as your strategic advisor always available, never intrusive.

Implementation & Onboarding

We’ll help you set up, onboard, and train your team.

We’ll help you set up, onboard, and train your team.Need help getting up and running? We’re with you every step of the way from setup and configuration to onboarding and training. Our experts ensure your team is confident, capable, and ready to go.

Fully Managed Service

We manage everything so you don’t have to. 

Prefer to stay hands-off? Let us run the tool for you. We’ll handle everything monitoring, maintenance, updates, and optimization so you can focus on what matters most: your
business.

Introducing KIDAN’s Endpoint Management and Security as a Service powered by our 24/7 Swiss-led Technology Operations Center (TOC)

1 Minute Guided Tour of Data
Security Plus  

Deployment Options

On-Premises

Direct Infrastructure Control: Install Data Security Plus on a local Windows server to maintain complete ownership of your sensitive data and audit logs within your own perimeter.

Comprehensive Data Auditing: Securely monitor and report on file accesses and modifications across on-premises Windows file servers, failover clusters, and Workgroup servers in real time.

Air-Gapped Network Support: Ideal for high-security environments where servers must remain isolated from the public internet while still providing full data leak prevention (DLP) and file integrity monitoring.

LAN-Optimized Performance: Ensure high-speed data discovery and classification across your local storage arrays (NAS, SAN) with minimal latency.

Cloud Deployment Via
Virtual Machine (e.g., in Azure/AWS)

Hybrid Data Visibility: Deploy the Data Security Plus server on a virtual machine in AWS or Azure to audit cloud-based storage services like Amazon FSx and Azure Files.

Scalable Architecture: Easily adjust your cloud instance’s CPU and RAM to handle growing volumes of unstructured data and increasing numbers of monitored endpoints.

Remote Workforce Security: Use a cloud-hosted VM with a public/elastic IP to maintain a constant connection with roaming agents, ensuring data leak prevention even for employees outside the office.

 

Cloud-Hosted (SaaS)

Zero Hardware Maintenance: Access powerful data security capabilities without the need to manage backend databases, web servers, or manual software updates.

Instant Protection: Rapidly deploy data leak prevention policies and web content filtering across a distributed workforce by leveraging a fully managed cloud infrastructure.

Consolidated Cloud SIEM: (Via Log360 Cloud integration) Gain a unified view of security events across your hybrid environment, combining on-premises file auditing with cloud-native security insights.

Migration Options

Seamless Environment Transition Effortlessly migrate your Data Security Plus configurations, discovery rules, and historical audit data from an on-premises setup to a Cloud VM (Azure/AWS) without losing your compliance trail.

Legacy Tool Replacement Replace fragmented, high-maintenance legacy auditing software with a unified platform. Use built-in import utilities to bring over existing server lists and user permissions for a faster cutover.

Database Migration Support Flexibility to migrate your back-end security database from the default PostgreSQL to a dedicated Microsoft SQL Server instance as your data volume and auditing requirements scale.

How KIDAN Works with You

Choose the Model That Fits You Best 

We don’t just provide software we partner with you to ensure it delivers real, lasting value. Whether you’re looking for light-touch guidance or full-scale operational support, we offer flexible service models tailored to your needs. 

License + Expert Guidance

Start with the right license and unlock full value.
Already have the tool or just getting started? We’ll help you provision the right licenses and guide you to unlock the full potential of your investment. Think of us as your strategic advisor always available, never intrusive.

Implementation & Onboarding

We’ll help you set up, onboard, and train your team.

We’ll help you set up, onboard, and train your team.Need help getting up and running? We’re with you every step of the way from setup and configuration to onboarding and training. Our experts ensure your team is confident, capable, and ready to go.

Fully Managed Service

We manage everything so you don’t have to. 

Prefer to stay hands-off? Let us run the tool for you. We’ll handle everything monitoring, maintenance, updates, and optimization so you can focus on what matters most: your
business.

Introducing KIDAN’s Endpoint Management and Security as a Service powered by our 24/7 Swiss-led Technology Operations Center (TOC)

Key Features Data Security Plus
at Glance 

File Server Auditing

Continuously monitor and audit all file activities across your server environment, tracking access, modifications, and changes in real time with instant alerts.

Data Leak Prevention

Detect and prevent data leaks by monitoring unauthorized transfers via USB, email, printers, and channels, ensuring real-time protection against insider and external threats.

Data Risk Assessment

Perform deep content inspection and contextual analysis to identify sensitive data, classify files by risk, prioritize protection, and ensure compliance with regulatory requirements.

Instant network overview

Gain real-time visual insights into IP allocations, DNS resolutions, and DHCP lease statuses, facilitating better decision-making and network planning with up-to-date information.

Domain monitoring

Visualize and monitor the query and response traffic to measure the performance of your on-premises hosted domains.

Receive in-depth visibility into your cloud-based services with DataSecurity Plus

Discover and manage the cloud apps in your network to strengthen security
and protect against malicious attacks.

Cloud app discovery

✅ Monitor the use of cloud applications across endpoints, and gain insights into your organization's encrypted web traffic.

✅ Ensure all cloud applications used are in line with your organization's security practices, i.e., with adequate levels of encryption and reliable third-party certificates.

✅ Track cloud services across multiple categories like personal sites and blogs, legal, search engines, computer security, and more.

✅ Audit the varied failed and successful access requests made to both sanctioned and unsanctioned applications.

Web content filtering

✅ Estimate the reputation score of every cloud application accessed based on its history, age, underlying URLs, and more using our threat analytics database.

✅ Take real-time action, and stop the unfettered use of high-risk cloud services by blocking the use of banned or unsanctioned applications from one central location.

✅ Analyze requests made to cloud apps with low reputation scores along with details of upload and download activities through them.

✅ Improve workforce productivity by blocking the use of non-business cloud services like social networking, e-commerce, and live streaming websites.

Cloud security

✅ Generate detailed reports on the upload requests made across SharePoint, Exchange, OneDrive, DropBox, Box, and other web services.

✅ Block web traffic to unsafe websites such as spam and malware sites, or those with inappropriate content.

✅ Keep a close eye on the use of shadow IT services and the top actors who use them to identify the risk they pose to your organization's data security.

✅ Generate critical security insights on which actor accessed what web apps and when. Analyze the browsers and methods being used to access the cloud apps.

Web app usage analysis

✅ Use deep packet inspection to analyze how various actors interact with cloud applications, and examine details about upload and download activity.

✅ Analyze the difference in usage between web-based and native cloud applications. Analyze access requests made from specific browsers to zero-in on events of interest.

✅ Analyze data sharing patterns via web services within your organization using informative reports and graphs.

✅ Gather web application access statistics such as website usage categorized by upload or download volume, request count, and more.

Data visibility and security in one package

DataSecurity Plus, the data visibility and data leak prevention component of Log360, helps fight insider threats, prevent data loss, and meet compliance requirements.

USB data theft protection

Secure and control access to USBs by creating block lists. Also, detect and respond to data theft attempts with instant responses.

Email security

Inspect email attachments for restricted content, warn employees against policy violations, and prevent leakage of confidential files via email attachments.

Ransomware response

Proactively detect and shut down the spread of potential ransomware attacks by isolating infected devices from the network with automated threat responses.

Insider threat detection

Monitor all file activities, removable device usage, data transfers, application use, and more 24/7 to spot and respond to anomalous activities.

File copy protection

Selectively block file copy actions across local or network shares to safeguard your organization’s business-critical information from theft and exposure.

File integrity monitoring

Spot unusual file activities and unwarranted file transfers with real-time file activity monitoring. You can also trigger instant alerts and execute scripts in response.

Security incident response

Detect and automate immediate responses to ransomware attacks, data exfiltration attempts, file transfer anomalies, and more.

Application allow listing

Reduce the risk posed by malicious applications and ensure that only trusted and vetted applications are executed by enforcing application control.

Web content filtering

Scrutinize the use of shadow IT services and block productivity-draining cloud applications like social networking, e-commerce, and other websites with sensitive content.

File access auditing

Track all file accesses, including read, create, rename, copy, permission change, delete, and more in real time with details on who accessed what, when, and from where.

File copy auditing

Track and record every time a user presses Ctrl+C or right-clicks to copy a file from network shares, workstations, and removable storage devices like USBs.

Workstation monitoring

Gain visibility into file access patterns, data transfer activities, cloud upload and download information, and more with in-depth endpoint security monitoring.

Data discovery

Locate files containing sensitive personal data like PII, ePHI, and PCI using predefined data discovery policies, and demonstrate compliance to the GDPR, HIPAA, PCI DSS, and more.

Data classification

Enable content-aware protection by classifying files based on their business value and vulnerability level using automated and manual file tagging capabilities.

ROT analysis

Locate and delete data with little or no value to your business, such as old and stale files, duplicate copies, orphaned files, non-business files, and more.

Permissions analyzer

Examine file security permissions to identify those with permission hygiene issues and files with excessive access rights.

Disk space analysis

Gain in-depth, drive-based insights by analyzing employees’ storage patterns and consumption rates. Trigger instant alerts when free space falls to critical levels.

Cloud app discovery

Track cloud application usage rates and record upload and download requests made across SharePoint, Exchange, OneDrive, Dropbox, Box, and other web services.

Deployment Options

On-Premises

Direct Infrastructure Control: Install Data Security Plus on a local Windows server to maintain complete ownership of your sensitive data and audit logs within your own perimeter.

Comprehensive Data Auditing: Securely monitor and report on file accesses and modifications across on-premises Windows file servers, failover clusters, and Workgroup servers in real time.

Air-Gapped Network Support: Ideal for high-security environments where servers must remain isolated from the public internet while still providing full data leak prevention (DLP) and file integrity monitoring.

LAN-Optimized Performance: Ensure high-speed data discovery and classification across your local storage arrays (NAS, SAN) with minimal latency.

Cloud Deployment Via
Virtual Machine (e.g., in Azure/AWS)

Hybrid Data Visibility: Deploy the Data Security Plus server on a virtual machine in AWS or Azure to audit cloud-based storage services like Amazon FSx and Azure Files.

Scalable Architecture: Easily adjust your cloud instance’s CPU and RAM to handle growing volumes of unstructured data and increasing numbers of monitored endpoints.

Remote Workforce Security: Use a cloud-hosted VM with a public/elastic IP to maintain a constant connection with roaming agents, ensuring data leak prevention even for employees outside the office.

 

Cloud-Hosted (SaaS)

Zero Hardware Maintenance: Access powerful data security capabilities without the need to manage backend databases, web servers, or manual software updates.

Instant Protection: Rapidly deploy data leak prevention policies and web content filtering across a distributed workforce by leveraging a fully managed cloud infrastructure.

Consolidated Cloud SIEM: (Via Log360 Cloud integration) Gain a unified view of security events across your hybrid environment, combining on-premises file auditing with cloud-native security insights.

Migration Options

Seamless Environment Transition Effortlessly migrate your Data Security Plus configurations, discovery rules, and historical audit data from an on-premises setup to a Cloud VM (Azure/AWS) without losing your compliance trail.

Legacy Tool Replacement Replace fragmented, high-maintenance legacy auditing software with a unified platform. Use built-in import utilities to bring over existing server lists and user permissions for a faster cutover.

Database Migration Support Flexibility to migrate your back-end security database from the default PostgreSQL to a dedicated Microsoft SQL Server instance as your data volume and auditing requirements scale.

With DataSecurity Plus'
file server auditing tool,
you can

✅ Generate analytics on the most accessed or modified files, most active users, etc.

✅ Scrutinize failed attempts to access files containing business information.

✅ Find irrelevant and personal media files hoarded by employees in enterprise storage.

✅ Maintain a record of file copy and paste activities.

✅ Use the interactive dashboard to compare file changes at the global and server levels.

✅ Audit all file activities with details on who accessed what, when, and from where.

✅ Track critical file changes, such as those to SACLs, owners, file extensions, and permissions.

✅ Use default Alert Profiles to detect high-risk file changes and spikes in access attempts.

✅ Monitor file integrity with instant e-notifications.

✅ Detect and stop ransomware attacks using instant threat responses.

Upgrade to a Fully Managed Security Posture

Introducing KIDAN’s Endpoint Management and Security as a Service powered by our 24/7 Swiss-led Technology Operations Center (TOC)

24/7 Proactive Security & Threat Mitigation

Our TOC operates around the clock to monitor your endpoints. We don’t just send you alerts; we actively investigate, validate, and remediate threats before they can impact your operations. This includes vulnerability management, patch deployment, and enforcing security configurations across your entire fleet of devices.

Expert Management & Optimization

Your Endpoint Central platform will be managed and optimized by certified engineers who live and breathe this technology. We handle all software deployments, policy configurations, and routine maintenance, ensuring the tool is always performing at its peak and aligned with the latest security best practices.

Strategic Reporting & Visibility

Move beyond raw data. We provide you with clear, executive-level monthly reports that translate technical activity into business-relevant insights. Understand your security posture, see the threats we’ve neutralized, and demonstrate compliance with ease.

We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.

For better implementation experience, and tailored solutions that's unique to your business.

How KIDAN Works with You

Choose the Model That Fits You Best 

We don’t just provide software we partner with you to ensure it delivers real, lasting value. Whether you’re looking for light-touch guidance or full-scale operational support, we offer flexible service models tailored to your needs. 

License + Expert Guidance

Start with the right license and unlock full value.
Already have the tool or just getting started? We’ll help you provision the right licenses and guide you to unlock the full potential of your investment. Think of us as your strategic advisor always available, never intrusive.

Implementation & Onboarding

We’ll help you set up, onboard, and train your team.

We’ll help you set up, onboard, and train your team.Need help getting up and running? We’re with you every step of the way from setup and configuration to onboarding and training. Our experts ensure your team is confident, capable, and ready to go.

Fully Managed Service

We manage everything so you don’t have to. 

Prefer to stay hands-off? Let us run the tool for you. We’ll handle everything monitoring, maintenance, updates, and optimization so you can focus on what matters most: your
business.

Introducing KIDAN’s Endpoint Management and Security as a Service powered by our 24/7 Swiss-led Technology Operations Center (TOC)

Pricing Plans Tailored to Fit Your Business

Data Security Plus – non-binding prices

Fill up the form to get a personalized Quote, that best suits your requirements

Fill in your details, and our experts will send you a custom quote designed to fit your business needs and budget.

Solutions *(Required)

By clicking 'Submit', you agree to processing of personal data according to the Privacy Policy.

Deployment Options

Central Server

(Head Office / NOC)

RMM Central Server has to be installed in your head office and has to be configured as an EDGE device. This means that the designated ports, 8090 and 8091 (configurable) should be accessible through the Internet.

Distribution Server(s)

RMM Central Distribution Server is light-weight software that is installed in one of the computers in the Customer Offices.
This agent will communicate with the RMM Central Server to pull the information for all the computers in that customer’s branch office.

Probe

The Probe periodically polls the devices in the local network and updates data to the central server.
The Probes are deployed in a remote location and is registered with the Central Server. The Probes can be deployed even behind firewalls or proxy servers.

AD Connector

To leverage the complete functionalities of an AD based setup to perform day-today management activities since the RMM Central server is outside the network, RMM Central has come up with a component called the AD Connector.
When a customer with multiple remote offices is managed by RMM Central server, one of the Distribution Server is configured as the AD connector.

See the powerful capabilities of RMM Central in action 

Datasheet

Data Security Plus Datasheet

Overview

Data Security Plus Overview

Request a personalized demo

Request a personalized demo

MM slash DD slash YYYY

By clicking 'Submit', you agree to processing of personal data according to the Privacy Policy.

Your Questions, Answered with Clarity.

Direct answers to the most common strategic, technical, and commercial questions
about Data Security Plus

Data Security Plus is a unified data visibility and security platform. It helps organizations discover sensitive data, audit file changes in real-time, prevent data leaks via endpoints, and ensure compliance with global regulations like GDPR, HIPAA, and PCI DSS.
While standard tools only track “who accessed what,” Data Security Plus adds layers of Data Discovery (finding PII/PCI), Endpoint DLP (blocking USB/Email leaks), and Ransomware Response (automatically isolating infected devices).
It can be deployed On-Premises for full data control, as a Cloud VM (on Azure or AWS) for hybrid environments, or integrated into a SaaS model via Log360 Cloud.
Yes, it uses a lightweight agent to provide real-time monitoring and Data Leak Prevention (DLP). This ensures that even if a device is offline or off-network, security policies remain active.
Absolutely. It automates “Data Discovery” to find PII (Personally Identifiable Information) and provides built-in audit reports specifically mapped to GDPR articles regarding data integrity and access monitoring.
Licensing is generally based on the number of File Servers and Workstations (Endpoints) you need to monitor. There are also specific add-ons for Cloud Protection and specialized storage like NetApp.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Join 100+ IT Leaders at KIDANVerse

Be part of the first edition.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details For Pricing

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.