A refreshed experience is in progress. A few pages may be temporarily limited.

As a Service

Reach out to KIDAN for inquiries and support.

On-demand Consulting

Expert guidance for strategic technology decisions.

Toc

24/7 global technology operations center.

Implementation

Seamless enterprise technology solution deployment.

Training

Empower teams with expert-led technology programs.

Services

Enterprise services supporting critical IT infrastructure.

Solutions

Tailored IT solutions for operational excellence.

SOC

End-to-end security operations monitoring.

Support

Dedicated IT support for seamless operations.

Most visited page

Expert guidance for strategic technology decisions.

About Us

Learn more about KIDAN’s vision, values, and expertise.

Our Partners

Meet KIDAN’s partners working together to deliver technology solutions, support, and growth for businesses.
Leading enterprise IT management solutions
offered via KIDAN’s trusted partner ecosystem for scalable, secure operations.
10 +
Leading enterprise IT management solutions
offered via KIDAN’s trusted partner ecosystem for scalable, secure operations.
110 +
Enterprise clients across industry sectors
trust KIDAN’s strategic partnerships and solutions to drive technology success.
950 +

PAM360 for Enterprise Privileged Access Management

PAM360 is an enterprise PAM solution that helps IT teams take control of their privileged access routines. 
Challenger in the 2024

Gartner® Magic Quadrant™ for Privileged Access Management.

Is Your Privileged Access Management Strategy Secure, or Just Vulnerable?

THE CHALLENGES: Operating Without PAM360

Managing privileged access without a dedicated solution exposes organizations to serious security, operational, and compliance risks.

Credential Sprawl:

Admin passwords are stored in unsecured locations or shared informally, making them easy targets for attackers.

Manual Oversight

Tracking and managing privileged accounts across hybrid environments is tedious and error-prone.

Untracked Privileged Access

With no centralized control, it’s difficult to monitor who has elevated access and what they’re doing with it.

Compliance Gaps

Lack of audit trails and access logs makes regulatory compliance a challenge, especially during security reviews.

THE SOLUTION: PAM360

PAM360 offers a comprehensive, policy-driven approach to securing privileged access across your IT infrastructure.

Centralized Credential Vaulting:

Secure all privileged credentials in an encrypted vault with granular access controls.

Session Monitoring & Threat Analytics

Record privileged sessions, monitor user activity, and detect anomalies in real time.

Privileged Account Discovery & Governance

Automatically detect and onboard privileged accounts across systems and applications.

Just-in-Time Access & Role-Based Controls:

Grant time-bound access based on roles and policies, eliminating standing privileges.

Privileged Access Management Platform for Modern Enterprises

PAM360 is a comprehensive platform that simplifies privileged access management, acting as a central hub to secure, automate, and streamline access routines across your hybrid infrastructure. 

Access Governance
Access Governance
Zero Trust
Zero Trust
GRC
GRC
Incident Response
Incident Response
Automation
Automation
Security Posture
Management
Security Posture Management
pam360-kidan Logo
Vaulting And Account Governance
Privilege Session Management
Secrets Management
Endpoint Privilege Management
JIT And Least Privilege Access
Vendor Access Management
Cloud Infrastructure And Entitlements Managements
Threat Detection And Response
Marketplace
Artificial Intelligence And
Machine Learning
Automation And
Orchestration
Endpoints
Endpoints
Employees
Employees
Vendors And Contractors
Vendors And
Contractors
Networks And Applications
Networks And
Applications
Cloud
Cloud
Workloads
Workloads

A Streamlined Approach to Privileged Access Management 

Privileged Account & Session Management (PASM)

Automatically discover and onboard privileged accounts for humans or machines, store credentials, monitor access, and log actions.

Privilege Elevation & Delegation Management (PEDM)

Remove standing privileges with just-in-time elevation, command controls, and least-privilege workflows for better security.

Cloud Infrastructure Entitlements Management

Gain visibility into cloud entitlements across platforms, monitor excessive privileges, violations, and fix risks proactively.

Endpoint Privilege Management

Apply precise controls to limit access to sensitive apps, enforce just-in-time access, child process limits, and admin rights.

Privileged Account Governance

Ensure privileged access goes only to the right users at the right time using role, attribute, and policy-based workflows.

Secrets Management

Secure credentials for non-human entities like apps, services, scripts, and DevOps pipelines to run automation safely.

Privileged User Behaviour Analytics (PUBA)

Detect anomalies in privileged user behaviour using AI and ML analytics, spot suspicious patterns early, and act proactively.

Encryption Key & Certificate Lifecycle Management

Prevent service disruptions and impersonation attacks by managing SSH keys and SSL/TLS certificates from one dashboard.

Adaptive Security That Evolves with Your Enterprise 

PAM360 is built to seamlessly integrate with your existing tech stack, offering deep interoperability, flexible
customization, and powerful extensions to elevate your security posture.

Works with your existing tech stack

Seamlessly integrate PAM360 with ManageEngine’s native IT management solutions and a range of third-party tools, including ITSM solutions, developer tools, IAM platforms, SaaS applications, RPA tools, and more, ensuring that your enterprise-wide workflows are securely managed.

Last-mile customizations

Tailor PAM360 to your organization’s security environments and requirements with flexible customization options. From personalized dashboards to policy configurations, adapt the platform to fit your evolving security needs.

Do more with what you have

Expand PAM360’s capabilities effortlessly with a growing library of extensions available in our Marketplace. From custom connectors for third-party tools to advanced reporting plugins, these ready-to-use extensions help you unlock new functionalities and adapt to evolving security needs—with no development required.

Single-touch workflow automations

PAM360 can seamlessly integrate with over 1,000 business applications through Zoho Flow, unlocking powerful workflow automation capabilities. With this flexibility, IT teams can effortlessly automate and secure privileged access routines across the enterprise.

Boundless programmability

Leverage PAM360’s APIs, SDKs, and SCIM support to programmatically build custom integrations, extend platform capabilities, and tailor the solution to your unique requirements.

Purpose-built for AI and ML

PAM360 is designed with AI- and ML-driven capabilities, including user and entity behavior analytics and native threat analytics. It continuously monitors privileged access patterns, identifies anomalies, and flags suspicious activity, delivering actionable insights to proactively mitigate risks and strengthen your overall security posture.

A powerful platform designed to simplify identity security

PAM360 provides comprehensive security for all identities—whether human, machine, cloud, or hybrid. The platform ensures seamless protection across diverse, hybrid environments for

Privileged users

and endpoints

Applications, services,

and processes

Cloud

entitlements

Vendors and third

parties

Machine

entities

Industrial

control systems

Deployment Options for PAM360

ADManager Plus offers both on-premises and cloud deployment options, giving organizations the flexibility to choose
what best suits their infrastructure and security needs.

On-Premises Deployment

• Install PAM360 on your own infrastructure (Windows or Linux servers).

 Full control over configuration, updates, and integrations. 

Cloud Deployment (Private Cloud)

Host PAM360 in your private cloud environment (e.g., AWS, Azure, GCP).

Combines cloud scalability with enterprise-grade security.

Application Gateway Deployment

Use PAM360 gateways to manage access across DMZs and secure networks effectively.
Supports multi-location setups, cross-platform resource management, and load distribution.

Agent-Based Deployment

Deploy PAM360 agents on remote Windows, Linux, macOS devices.
Enables Zero Trust and manages resources beyond PAM360 server.

For better implementation experience, and tailored solutions that's unique to your business.

Privileged Access Management Platform

ManageEngine AD360 offers a dynamic and scalable platform designed to centralize identity management within your operational framework. Irrespective of your industry, specific use cases, or support requirements, AD360 is uniquely equipped to meet your diverse needs. 

Privileged Account and Session Management

Privileged account and session management (PASM)

Automatically discover, onboard, store and manage privileged users, accounts and resources—used by both humans and software—from a central console. Launch remote sessions, moderate and audit privileged access and record sessions in real-time.

Privilege elevation and delegation management

Privilege elevation and delegation management (PEDM)

Prevent security risks posed by standing privileges by employing just-in-time privilege elevation, application and command controls, and least privilege workflows for access provisioning

Endpoint Privilege Management (EPM)

Endpoint Privilege Management

Apply granular controls to restrict access to critical applications, including just-in-time access, child process control, and local administrator rights.

Upgrade to a Fully Managed Security Posture

Introducing KIDAN’s Endpoint Management and Security as a Service powered by our 24/7 Swiss-led Technology Operations Center (TOC)

24/7 Proactive Security & Threat Mitigation

Our TOC operates around the clock to monitor your endpoints. We don’t just send you alerts; we actively investigate, validate, and remediate threats before they can impact your operations. This includes vulnerability management, patch deployment, and enforcing security configurations across your entire fleet of devices.

Expert Management & Optimization

Your Endpoint Central platform will be managed and optimized by certified engineers who live and breathe this technology. We handle all software deployments, policy configurations, and routine maintenance, ensuring the tool is always performing at its peak and aligned with the latest security best practices.

Strategic Reporting & Visibility

Move beyond raw data. We provide you with clear, executive-level monthly reports that translate technical activity into business-relevant insights. Understand your security posture, see the threats we’ve neutralized, and demonstrate compliance with ease.

We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.

1 Minute Guided Tour of the PAM 360 

For better implementation experience, and tailored solutions that's unique to your business.

A Streamlined Approach to Privileged Access Management 

Privileged Account & Session Management (PASM)

Automatically discover and onboard privileged accounts for humans or machines, store credentials, monitor access, and log actions.

Privilege Elevation & Delegation Management (PEDM)

Remove standing privileges with just-in-time elevation, command controls, and least-privilege workflows for better security.

Cloud Infrastructure Entitlements Management

Gain visibility into cloud entitlements across platforms, monitor excessive privileges, violations, and fix risks proactively.

Endpoint Privilege Management

Apply precise controls to limit access to sensitive apps, enforce just-in-time access, child process limits, and admin rights.

Privileged Account Governance

Ensure privileged access goes only to the right users at the right time using role, attribute, and policy-based workflows.

Secrets Management

Secure credentials for non-human entities like apps, services, scripts, and DevOps pipelines to run automation safely.

Privileged User Behaviour Analytics (PUBA)

Detect anomalies in privileged user behaviour using AI and ML analytics, spot suspicious patterns early, and act proactively.

Encryption Key & Certificate Lifecycle Management

Prevent service disruptions and impersonation attacks by managing SSH keys and SSL/TLS certificates from one dashboard.

Adaptive Security That Evolves with Your Enterprise 

PAM360 is built to seamlessly integrate with your existing tech stack, offering deep interoperability, flexible
customization, and powerful extensions to elevate your security posture.

Works with your existing tech stack

Seamlessly integrate PAM360 with ManageEngine’s native IT management solutions and a range of third-party tools, including ITSM solutions, developer tools, IAM platforms, SaaS applications, RPA tools, and more, ensuring that your enterprise-wide workflows are securely managed.

Last-mile customizations

Tailor PAM360 to your organization’s security environments and requirements with flexible customization options. From personalized dashboards to policy configurations, adapt the platform to fit your evolving security needs.

Do more with what you have

Expand PAM360’s capabilities effortlessly with a growing library of extensions available in our Marketplace. From custom connectors for third-party tools to advanced reporting plugins, these ready-to-use extensions help you unlock new functionalities and adapt to evolving security needs—with no development required.

Single-touch workflow automations

PAM360 can seamlessly integrate with over 1,000 business applications through Zoho Flow, unlocking powerful workflow automation capabilities. With this flexibility, IT teams can effortlessly automate and secure privileged access routines across the enterprise.

Boundless programmability

Leverage PAM360’s APIs, SDKs, and SCIM support to programmatically build custom integrations, extend platform capabilities, and tailor the solution to your unique requirements.

Purpose-built for AI and ML

PAM360 is designed with AI- and ML-driven capabilities, including user and entity behavior analytics and native threat analytics. It continuously monitors privileged access patterns, identifies anomalies, and flags suspicious activity, delivering actionable insights to proactively mitigate risks and strengthen your overall security posture.

All Resources

Admin guide

Help Documents

Release notes

Fundamentals

Identity360 encryption
Risk Exposure...

REST API Guide

Identity360 API

Solution Handbooks

Product slide deck

Technical Guides

Architecture guide

For better implementation experience, and tailored solutions that's unique to your business.

Pricing Plans Tailored to Fit Your Business

Let us know about your requirements and get a very exclusive offer!

Get a free trial or reach out to our team to explore how we can 
help meet your specific requirements. 

Fill this form to schedule a personalized web demo

admanagerplus-license-quote-form

Choose Components* (Required)

E-Book

E-book Windows Service

Guide

PAM360 Guide

Brochure

Product Brochure (ENG)

Brochure

PAM360 Brochure

Datasheet

PAM360 DataSheet

Specifications

PAM360 Security Specifications

Requirements

PAM360 System Requirements

Overview

PAM360 Overview

How KIDAN Works with You

Choose the Model That Fits You Best 

We don’t just provide software we partner with you to ensure it delivers real, lasting value. Whether you’re looking for light-touch guidance or full-scale operational support, we offer flexible service models tailored to your needs. 

License + Expert Guidance

Start with the right license and unlock full value.
Already have the tool or just getting started? We’ll help you provision the right licenses and guide you to unlock the full potential of your investment. Think of us as your strategic advisor always available, never intrusive.

Implementation & Onboarding

We’ll help you set up, onboard, and train your team.

We’ll help you set up, onboard, and train your team.Need help getting up and running? We’re with you every step of the way from setup and configuration to onboarding and training. Our experts ensure your team is confident, capable, and ready to go.

Fully Managed Service

We manage everything so you don’t have to. 

Prefer to stay hands-off? Let us run the tool for you. We’ll handle everything monitoring, maintenance, updates, and optimization so you can focus on what matters most: your
business.

As your technology partner, we are committed to growing with you and tailoring the best model for your needs.

Your privileged access management journey begins here.

Millions of IT admins trust ManageEngine with their privileged access management. Build your PAM strategy with ManageEngine PAM360 today. Free 30-day trial included.

Want to explore PAM360?

MM slash DD slash YYYY

Your Questions, Answered with Clarity.

Direct answers to the most common strategic, technical, and commercial questions 
about Endpoint Central.about Endpoint Central.
Do I need to install any prerequisite software before using PAM360?

Apart from the standard system requirements (both hardware and software), the following elements are essential for the proper functioning of the PAM360 server.

These are especially required if you are planning to make use of PAM360’s account discovery and password reset provisions.

  • An external mail server (SMTP server)for the functioning of PAM360 server and to send various notifications to users.
  • A service account [OR] a gMSA that has either domain admin rights or local admin rights in the PAM360 server and in the target systems that you would like to manage.
  • Visual C++ Redistributable for Visual Studio 2015 and above (for PAM360’s Account Discovery and Password Reset features.)
  • Microsoft .NET framework 4.5.2 or above must be installed in the server where PAM360 is installed.

To check if these software requirements are configured:

Go to Support » Software Requirements and click Check Configuration.

In the pop-up box that opens, the configuration status will be displayed.

PAM360 supports the following flavors of Windows and Linux operating systems:

WindowsLinux
Windows Server 2019Ubuntu 9.x and above
Windows Server 2016CentOS 4.4 and above
Windows Server 2012 R2Red Hat Linux 9.0
Windows Server 2012Red Hat Enterprise Linux 7.x
Windows 10Red Hat Enterprise Linux 6.x
Windows 8Red Hat Enterprise Linux 5.x

The Free edition of ADManager Plus can be used to manage up to 100 objects in a single domain and cannot have more than one domain configured.
The Professional edition can be used to manage the number of domains and objects for which it is licensed for.
The Free edition can be upgraded to Professional edition at any point of time by obtaining a valid license from ZOHO Corp.

To remove a domain from PAM360, you first need to remove the users that belong to this domain. Once the users are removed, follow the below steps to remove the domain information:

  • Go to the Admin tab and click Authentication >> Active Directory.
  • Here, click the View Synchronization Schedules option.
  • Delete the required domain from the Domains pane on the left.

Yes, refer the High Availability document for more details.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Join 100+ IT Leaders at KIDANVerse

Be part of the first edition.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details For Pricing

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.