BackBox seamlessly integrates with network monitoring and NetOps platforms and automates configuration backups, restores, and change detection. BackBox also provides before and after config diffs for change management, and automated remediation of discovered network security issues.
Modular solutions for change management, asset management and more
ChangeGear provides IT staff with the functions required to manage everything from ticketing to incident, change and asset management and more. ChangeGear includes a virtual agent, self-service portals and AI-based features to support analyst and end user productivity.
Extrect selected entries from LDIF files like grep
ldif-extract is a small 'grep' like tool to extract and convert data from LDIF files. It could be used standalone or also in a pipe together with other tools like ldapsearch.
sed-like modify and convert LDIF files using regular expressions
This small perl tool allows you to easily modify LDIF files with the power of regular Expressions. Unlike the sed-command this tool deals well with LDIF files, supporting base64 encoding/decoding and wrapping/folding.
It can be used in a pipe, making it the ideal choice for automation and enhances common commands like ldapsearch and ldif-extract.
regutils - Win9x registry tools in Unix C & INI file tools in Perl
Regutils is a collection of programs to help in managing the configuration of Windows software and systems. The utilities can be used to apply user and machine specific customizations on the fly as users log in or as machines are booted.
They can also be used to identify and correct similarities and differences between software configurations. These may be helpful in debug situations or when consistency or differences need to be maintained.
The regutils package was initially created...
Software and support solutions to protect your clients’ critical business assets
ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.