KODO Introduction

Critical organizational data is increasingly created, stored and shared outside the data center. It lives on laptops, tablets, mobile devices and in cloud services. This data is subject to numerous threats: malware, ransomware, hacking, device failure, loss or theft. And, as always, simple human error.

KODO provides a unified solution to all these challenges by offering easy, automated protection of end-points, along with file sharing and synchronization.

KODO Highlights

  • KODO is a next generation enterprise end-point data protection solution providing backup and self-service file recovery for end-users and administrators
  • Supports desktops and laptops running Windows or OS X
  • Supports mobile devices running Android, iOS and Windows Phone
  • Data protection for Microsoft Office365 and OneDrive
  • Efficient, continuous data protection provides automatic file-versioning support 
  • End-user self-service allows users to easily restore multiple versions of their files
  • Files can be securely shared across the organization to allow end-user collaboration
  • Centrally controlled policies can be enforced across the organization
  • Active Directory and LDAP integration for easy policy distribution
  • Helps meet GDPR requirements
  • Optional deduplication and compression of end-user data, with file size limit controls
  • E-mail client protection for Microsoft Outlook and IBM Notes
  • Optional data encryption either in the central repository or at end-points
  • Open API for integration with Mobile Device Management (MDM) platforms, asset management systems, help desk, etc. 

Data Protection and Self-Service Recovery

KODO begins with data protection, providing automatic backup of files based on policies assigned by the system administrator.  By using a continuous data protection approach, KODO provides real-time file versioning, allowing users to recover a file at multiple points in its lifecycle. There is no waiting for a backup cycle; simply saving the file sets off the backup process. 

Protection policies cover the range of a user’s devices, including Windows and OS X desktops and laptops, as well as mobile devices (Android, iOS, Windows Phone). The end-user has access to all their data from all devices, providing a seamless experience. 

Recovering a file is a simple end-user process, allowing them to bring back any saved version of the file. The process is completely self-service and requires no IT or help-desk intervention. 

Users have a myKODO folder that combines a familiar user experience with automatic protection and file distribution. Policy-based file exclusions can limit the amount of data backed up by ignoring certain file types or locations.  

Simple color-coded shield icons inform the user of their current data protection status and alert them when data is not protected.  Data can also be optionally encrypted to provide further security.

The Empowered Workforce: Easy and Secure File Sharing

Collaboration is an essential component of the modern workforce. KODO offers a simple and secure way to share files, without the clumsy and confusing interfaces so often found in other data sharing tools. 

With KODO, there is a single view window that shows files “Shared by Me” and “Shared with Me.”  To share a file, the user selects from a pre-populated, searchable list of contacts. One or more users are selected, and you’re done! Files can be actively worked on by multiple collaborators. 

There is also a read-only sharing option that allows a user to share files via a distributed link. This link can be password-protected and/or time-limited to expire after a specified time.

KODO also offers an administrator-based Global Shares folder, which allows easy distribution of content across your organization; perfect for distribution of HR content, corporate policy documents, etc. 

Protecting Mobile Devices 

Mobile devices are an inescapable reality for organizations, and end-users are increasingly creating content on them, not just reading content. With KODO, you can ensure that end-user mobile data is protected along with their laptop/desktop data. 

KODO offers a wide range of protection options, allowing backup of contacts, calendars, galleries, pictures, files and even SD Cards. Backups can be restricted to run only over WiFi networks, providing data services savings. File retention time and version numbers are also controllable through central policies. 

KODO even features a geo-location option to show the location of the device at the time of the last backup. This can be helpful in locating a lost or stolen device.

Protecting the Cloud: Office 365 and Microsoft OneDrive


Many organizations have moved to Microsoft Office 365, providing a cloud-based approach to office utility applications.  KODO provides daily backup of OneDrive for Business to ensure both business continuity and potential compliance requirements. 

KODO for Office 365 uses a scalable, distributed architecture that offers support for multiple backup proxies that feed data into the KODO Server. Lost files be can recovered by both end users and administrators. 

End-Point Protection and GDPR

KODO aids with several aspects of GDPR compliance. For starters, with KODO when someone loses a mobile device, you don’t also lose the data. Device content is easily recoverable. In fact, KODO can even help with device migration since it is very easy to restore data to a new device. 

File sharing is also brought back in-house. With cloud-based solutions from third-parties, organizations risk data leakage, hacks and so forth, that they have no control over. By using KODO for organizational file-sharing, control stays with the organization, and you have full audit capability and transparency in the event of any incidents. 

Finally, since no single solution meets all GDPR requirements, KODO integrates with Samsung Knox and FancyFon Famoc. This allows for a unified approach to device and data management. 

Simplified IT Management 

While KODO delivers value right to your end-users, it’s managed by an intuitive central console that controls and distributes KODO policies.  Administrators can define multiple policies that control features such as deduplication, compression and maximum data consumption. 

KODO supports LDAP and Active Directory, and policies can be easily applied to existing users and groups. This allows for granular protection policies. For example, members of an executive group may have their backups retained for longer periods of time. 

For security, password requirements can be controlled, with options such as minimum length or special-character requirements imposed across the organization. System reports can be configured and sent automatically, covering areas such as space consumption and device activity.