About Data Vigilant InfoTech

Company Overview

DataVigilant InfoTech is an Information Technology product and services company, established in the year 2014 by professionals with a cumulative experience of over 30 years in the field of Information Technology.

DataVigilant aims to address the basic need of its customers, of a reliable guardian for their computing environment.

DataVigilant wishes to give the industry a never before experience of a secure and worry free compute. The company intends to provide solutions based on the Risks associated with the business of its customers.

DataVigilant believes in setting high standards for the services provided to its customers, and believes in giving its customers the best of value for their investments. The company understands that always ON and prompt response is the key to customer satisfaction.

As the saying goes “A stitch in time saves nine” so is the companies approach for any customer being served – PROACTIVE is the BUZZWORD.


Mr. Santosh Zapdekar


With an experience of over 12 years in the field of Information Security, he is responsible for the overall operations of DataVigilant & also heads the sales division of the company. He is a visionary & believes in maintaining outstanding customer relationship.

Mr. Prabhit Nair


With over 14 years of experience in the field of information security, he heads the technical division of the company and is responsible for technical services delivery. He has excellent problem solving capabilities & very good team management skills.

Our Values


We give utmost importance to honesty and integrity in our business practices.


We Align and blend strengths of individuals so that they complement each other and deliver the best output.


We ensure, our business practices are in accordance with the rules or standards for right conduct or practice.


We believe in transparent dealings with our employees and customers alike. Transparency builds trust.


We stay devoted to the promises made, and exceed customer expectations.


We make every effort to maintain high standards in services & solutions offered to our customers.

Vision and Mission



To be a growth oriented company with firm commitment of caring for quality products and services.

Customer is at the heart of our business values, operations and ideas. With customer centric approach we see our company among the top Information Technology service providers in the Industry.


Information Technology is evolving at a very rapid pace and so is the need for a proactive and efficient service provider, DataVigilant will provide highly skilled technical team and flawless Project Management capabilities to address the challenges posed by the fast evolving Information technology and Information security arena.


Endpoint Security

Endpoint” refers to devices like Desktops, Laptops, Mobiles, Servers, Point of Sale systems etc. that may or may not connect to the corporate network. For every organization big or small, Endpoint Security is an area of real concern, this is where most of the time and resources get utilised. It is the responsibility of an Information security in charge to ensure that each such device connecting to the network is compliant and authorised to access the organisations Network Resources and is loaded with adequate security measures to tackle any threat that is directed towards them.

Security measures include tools like Antivirus, Device control, Host based Intrusion Prevention systems and Firewall etc that can be managed centrally from a single console and has a proven track record of being highly effective in tackling malicious activities by detecting, alerting and reporting such incidents.


Data Security

EData refers to Information stored in our personal computers, databases and servers. This can range from information in the form of personal files and intellectual property, market analytics and details that can be top secret. Data is something that can be read or otherwise interpreted in human form.

Some of this data is expected to be protected and are not supposed to leave the system on which it resides, at the same time these data should be accessible to people who are authorized to access them. Any unauthorized access to sensitive information like personal data or business secrets can have adverse impact on the individual or organization.

Datavigilant can suggest various mechanisms to Secure your data from being compromised, solutionslike Data encryption, Digital Rights Management and Data Loss prevention can address the Data Security woes to a considerable level, provided they are implemented with due care and intelligence. We help in creating a secure data storage and transmission environment for your organization.

Content Security

In today’s inter-connected world, Web and Email are the two major channels of communication and information sharing; While these channels are a boon to everyone, they can also become the primary source of malicious contents and threats to computing devices and thereby to the individual and Organization using these devices.

Websites are getting hacked - leading to infected contents; emails have become a primary source of phishing and most of the emails received today by an organization are spams; infected websites can mislead users and they can become prey to online fraudsters, they can also infect a user’s computer and become a reason for data loss or data corruption resulting in lot of damages to organization or individual.

DataVigilant intends to arm its customers with advanced content security solutions, Our Content security offerings protect organizations from Threats arising out of malicious emails and Websites.


Perimeter Security

Perimeter refers to the boundary where an organizations network meets the internet, it is the first line of defense for your network against outsider threats and the last line of defense against insider threats.

Perimeter Security is more focused on delivering controlled access to network devices and services. Products in this category aims to provide ample security, monitoring and policy enforcement in addition to integration with endpoint security solutions, they Inspect network traffic and block attacks to impose your companies Perimeter Security policies

Usually Network Perimeter Security employs a combination of the following Data and Network defense methods.


Mobile Security

Mobile Device Management functions usually consist of over-the-air distribution of applications, data and configuration settings for all types of mobile devices, including mobile phones, smartphones, tablet computers, ruggedized mobile computers, mobile printers, mobile POS devices, etc. This applies to both company-owned and employee-owned (Bring Your Own Device - BYOD) devices across the enterprise or mobile devices owned by consumers.

Consumer Demand for BYOD is now requiring a greater effort for MDM and increased security for both the devices and the enterprise they connect to, especially since employers and employees have different expectations on the type of restrictions that should be applied to mobile devices.

By controlling and protecting the data and configuration settings for all mobile devices in the network, MDM can reduce support costs and business risks. The intent of MDM is to optimize the functionality and security of a mobile communications network while minimizing cost and downtime.

Companies are alarmed at the rate of employee adoption of mobile devices to access corporate data. MDM is now touted as a solution for managing corporate-owned as well as personal devices in the workplace. The primary challenge is the ability to manage the risks associated with mobile access to data while securing company issued and BYOD mobile devices.

Risk and Compliance

DataVigilant’s Risk and Compliance offering help customers to be aware and prepared against vulnerabilities associated with various Devices including Security devices, Servers, Endpoints and other network devices installed at their premises.

Security Tools provided by DataVigilant are best in class and provide valuable insight to the customer about the security posture of their computing Environment.

Organizations need to adhere to various Regulatory compliance associated with their industry, Our offerings enable you to achieve these compliance levels and keep you Audit ready.


Data Availability

Data availability refers to products and services that ensure that data continues to be available at a required level of performance in situations ranging from normal through "disastrous." In general, data availability is achieved through redundancy involving where the data is stored and how it can be reached.

To Ensure availability of data at all times, we need to ensure that the data we have necessary mechanisms for data backup and Restore.

Backup is the activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe. Backup is usually a routine part of the operation of large businesses with mainframes as well as the administrators of smaller business computers. For personal computer users, backup is also necessary but often neglected.

Data Vigilant Infotech Services


Product Specific Trainings

Many Organizations prefer to maintain their security devices on their own rather than depending on external resources, they would like to minimize their dependency on third party in maintaining their information security assets.

Datavigilant understands this requirement of its customers and hence prepared a comprehensive training program that equips customers with the ability to manage various security solutions on their own with minimal or no help from third party service providers.


User awareness Trainings

DataVigilant offers “Information Security awareness trainings” as a formal process of educating employees regarding computer security.

“Information Security Awareness Training” involves preparing your staff for the safety of various information assets of your business. Establishments that need to comply with various guidelines or Industry standards usually need official trainings for all employees, once or twice a year. Some Small and Medium Enterprises do not require such trainings for regulatory compliance, but educate their employees to prevent a cyber attack.


Support Services

Implementation services

DataVigilants experienced and trained Technical staff handles IT solutions deployment in highly professional manner by involving its Project management office for every deployment

Post-Implementation services


Technical Services

Data Risk Assessment

Through this service we intend to accurately identify all sensitive data and know how it’s used across your organization, the need for such an activity arises from the fact that data can exist in various locations for example; some data is stored on file servers, some on database servers, on user desktops, and other repositories like sharepointetc, they can be in various forms like PowerPoint presentation, word documents, images, emails, spreadsheets etc.


Vulnerability Assessment and Penetration Testing

There are multiple ways of connecting to the network like LAN, WAN etc. Information Technology Risk Assessment is an integral part of Information security framework; this practice gives an organization the confidence about the security of its computing environment. DataVigilant believes that Vulnerability assessment and Penetration testing are the most important tools of IT Risk assessment. It is vital for every organization to ensure the security of its network to protect its information lying on various end-points on the network.


We at Sharptech, after rigorously evaluating the various solutions for IT networking solutions settled on "Datavigil". The key factors that led to our decision towards "Datavigil": a) Prompt Service b) Expertise and Excellence c) Cost Effective.

Prasad Gujjeti,

Director of Sharptech Creative Services

PhoneFor Business Enquires
Sales Office Address
423, 4th floor, Chintamani Plaza, Andheri Kurla road,
Chakala, Andheri (East), Mumbai 400099
Email : sales@datavigil.com