+
+

Related Products

  • Unimus
    30 Ratings
    Visit Website
  • PathSolutions TotalView
    43 Ratings
    Visit Website
  • Site24x7
    858 Ratings
    Visit Website
  • NetBrain
    218 Ratings
    Visit Website
  • Domotz
    268 Ratings
    Visit Website
  • ManageEngine OpManager
    1,577 Ratings
    Visit Website
  • Syncro
    502 Ratings
    Visit Website
  • Cloudflare
    1,903 Ratings
    Visit Website
  • Device42
    173 Ratings
    Visit Website
  • ConnectWise Automate
    505 Ratings
    Visit Website

About

BackBox offers a simple way to intelligently automate the backup, restoration, and management of all devices on a network by providing centralized management of devices such as firewalls, routers, switches, and load balancers. Each of these devices plays a critical role in the availability and security of an organization’s network, and BackBox ensures they all continue to function effectively and effortlessly, streamlining operations for optimal performance. BackBox provides a foundation to harmonize the configuration between multiple devices, enabling seamless integration, and assuring compliance to organization or industry security policies, standards, or guidelines. IT administrators can easily employ BackBox to track configuration changes and see the deviation with the baseline for compliance validation and remediation.

About

An open source network configuration analysis tool. Batfish finds errors and guarantees the correctness of planned or current network configurations. It enables safe and rapid network evolution, without the fear of outages or security breaches. Batfish was originally developed by researchers at Microsoft Research, UCLA, and USC. Many others have since contributed to it. It is currently maintained by Intentionet, who also offers Batfish Enterprise, a service that extends and enhances the core capabilities of Batfish. Analyze ACLs and firewalls rules using Batfish. Forwarding paths can be analyzed using traceroute and reachability queries. Analyze the impact of failures on the network and conduct Chaos Monkey style testing. Analyze routing tables computed by Batfish. Fast control plane analysis using an abstract representation. Network analysis in multivendor network with Cisco, Arista, Cumulus.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprises and managed service providers in need of an intelligent automation solution for their network and security devices

Audience

IT departments looking for a network configuration analysis tool to find errors and ensure the correctness of configurations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 4.5 / 5
ease 4.5 / 5
features 4.2 / 5
design 4.0 / 5
support 4.8 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

BackBox
Founded: 2009
United States
backbox.com/request-a-demo/

Company Information

Batfish
Founded: 2015
United States
www.batfish.org

Alternatives

Unimus

Unimus

NetCore j.s.a. (Unimus)

Alternatives

Restorepoint

Restorepoint

ScienceLogic
UVexplorer

UVexplorer

UV Networks
Net LineDancer

Net LineDancer

LogicVein

Categories

Categories

IT Management Features

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Automation Features

Compliance Monitoring
Configuration Backup
Configuration Changes
Network Orchestration
Performance Monitoring
Tool Access Control
Vulnerability Assessments

Network Security Features

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Integrations

Arista EOS
Array APV Series
Aruba Cloud
Axway Amplify
Check Point Infinity
Citrix Gateway
Docker
IBM QRadar SIEM
ONTAP
Radware Alteon
Radware DefensePro
Sophos Managed Threat Response
Trellix Endpoint Security (HX)
VMware ESXi
VMware NSX
VMware vCenter
WALLIX Bastion
WatchGuard Firebox Cloud

Integrations

Arista EOS
Array APV Series
Aruba Cloud
Axway Amplify
Check Point Infinity
Citrix Gateway
Docker
IBM QRadar SIEM
ONTAP
Radware Alteon
Radware DefensePro
Sophos Managed Threat Response
Trellix Endpoint Security (HX)
VMware ESXi
VMware NSX
VMware vCenter
WALLIX Bastion
WatchGuard Firebox Cloud
Claim BackBox and update features and information
Claim BackBox and update features and information
Claim Batfish and update features and information
Claim Batfish and update features and information