Singapore, Mumbai
+65 66047271

About Us

On Demand Systems Pte Ltd (ODS) is a Singapore based registered company incorporated in the Year 2011.  Today ODS has its business activities and partnership in Singapore, Malaysia, India and Sri Lanka.

We strive to be a leader in the cyber-security solutions and services industry with a focus on protecting our customers against cyber threats. We are specialized in providing Privilege Identity and Access Management, Data Protection, Data Access Governance (DAG) and Threat Intelligence solutions and services.  We offer visibility into types of vulnerabilities and conditions attackers exploit to compromise Credentials, Identities and Data.

ODS is the authorized distributor and representative for CENTRIFY,  STEALTHbits Technologies, Idaptive and SHERPA Software products and services.

We follow closely to our strategic partners best practices in delivering industry leading solutions to our clients.

Our Strategic Partners


Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment. By implementing least privilege access, Centrify minimizes the attack surface, improves audit and compliance visibility, and reduces risk, complexity and costs for  the modern, hybrid  enterprise.

Over half of  the Fortune 100, the world’s largest  financial institutions, intelligence agencies, and critical infrastructure companies, all trust Centrify to stop the leading cause of breaches – privileged credential abuse.


Identify threats.   Secure data.   Reduce risk.

STEALTHbits secures your credentials and data through Data Access Governance, Change & Access Monitoring, Threat Detection and Active Directory Security.
STEALTHbits Technologies is a cybersecurity software company focused on protecting an organization’s credentials and data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements and decrease operations expense.

Security Posture Transformation

Using specialized AI, Balbix automatically gathers and analyzes comprehensive inventory and threat information. Our platform enables a broad set of vulnerability and risk management use cases that help to transform your enterprise security posture.

  • Continuous Discovery and Analysis

    To accurately quantify breach risk, Balbix continuously analyzes up to several hundred billion time-varying signals from your network.

  • Risk Insights and Prioritization

    You can understand your real-time risk with Balbix’s drill-down risk heatmaps and natural-language search.

  • Cybersecurity Posture Improvement

    Balbix generates prioritized tickets with relevant context assigned to the right owners for strategic and tactical mitigating actions. Notifications, leaderboards and incentives can be set up for a gamified approach to drive cyber-risk reduction.

Our Esteemed Customers