top of page

The Next Generation of
Network Configuration Management

Automate and Simplify Network Management with Kaisan.

An Enterprise Network Solution

Kaisan is a cloud based Network Configuration Management platform built to simplify and automate repetitive network tasks.

​​

Our robust set of tools enable low/non technical staff to make network changes with reduced risk of misconfiguration.

​

Expand beyond our pre-set modules by creating your own macros. Kaisan logs into your device and executes any command you would ordinarily run on the command line.

​

Automate modules with our scheduler, enabling you to choose when you want a module to run.

​

Kaisan communicates with network devices with SSH, making it a multi-vendor friendly solution.

​

Configure and troubleshoot your network using our modules, or create your own.

Import and organise your networks and devices into Kaisan to enable cloud-based management.

Automate configuration and troubleshooting tasks, and create/enforce configuration policies that devices must adhere to.

Organise your users into permission roles to segregate duties, and review audits for user activity.

Built for Ease of Use

Configure Module
dashboard2.png
Scheduler Module
Backup Module
Network Compliance Module

Zero Trust Network Access

ZTNA (Zero Trust Network Access) is an approach to providing network security for Web Applications.

​

When it comes to access of management for critical network infrastructure management, we believe no compromise should be made on security. Therefore we combine traditional MFA (multi-factor authentication) with ZTNA to create a secure perimeter around our platform and made only available to trusted users.

​

If MFA authenticates an identity based on something the user knows (a username and password), and something they own (a regenerating cryptographic token), then ZTNA authenticates their identity based on something they are - their Internet (IP) address.

​

Our ZTNA objectives are as follows:

 

  1. The Internet (IP) address of a legitimate user can pass ZTNA authentication as long as the user can prove they are the owner of that IP address.
     

  2. ZTNA authentication only grants the user ability to proceed to MFA, thereby separating the act of granting network access to granting application access.
     

  3. The platforms’ presence on the Internet is invisible to Internet participants except for ZTNA authenticated users.
     

  4. ZTNA authenticated users have no visibility or reachability to other ZTNA authenticated users.
     

  5. ZTNA is ‘always on’, meaning if a ZTNA user’s Internet (IP) address changes in the middle of a session, the session will automatically terminate.

Are You Ready to manage your network from the cloud?

Cloud computing is an on-demand approach to running IT infrastructure.

​

It is a modern alternative to a hosted solution, which requires considerations towards CAPEX and OPEX on hardware, energy, maintenance, and licensing.

​

Kaisan concentrates its resources in cloud services, which allows us to provide a reliable, scalable, secure, high performing, and highly available service for our customers.

​

By running Kaisan in the cloud, billing can be tailored to how many network devices the customer needs to manage.

​

Setup and installation is a low friction experience, where the only requirement for the customer is to install a small probe server that can talk back to the web app without having to adjust your firewall. This server can run as a virtual machine on minimal resources.

bottom of page