+
+

Related Products

  • Unimus
    29 Ratings
    Visit Website
  • PathSolutions TotalView
    42 Ratings
    Visit Website
  • Site24x7
    750 Ratings
    Visit Website
  • NMIS
    14 Ratings
    Visit Website
  • ManageEngine OpManager
    1,416 Ratings
    Visit Website
  • NetBrain
    146 Ratings
    Visit Website
  • Domotz
    254 Ratings
    Visit Website
  • Syncro
    412 Ratings
    Visit Website
  • Device42
    173 Ratings
    Visit Website
  • Auvik
    659 Ratings
    Visit Website

About

BackBox offers a simple way to intelligently automate the backup, restoration, and management of all devices on a network by providing centralized management of devices such as firewalls, routers, switches, and load balancers. Each of these devices plays a critical role in the availability and security of an organization’s network, and BackBox ensures they all continue to function effectively and effortlessly, streamlining operations for optimal performance. BackBox provides a foundation to harmonize the configuration between multiple devices, enabling seamless integration, and assuring compliance to organization or industry security policies, standards, or guidelines. IT administrators can easily employ BackBox to track configuration changes and see the deviation with the baseline for compliance validation and remediation.

About

Pass audit and compliance requirements easily with proactive policy enforcement and audit and compliance reports. Improve network security by recognizing and fixing security vulnerabilities before they impact your network. Reduce costs by automating time-consuming manual compliance and configuration tasks. Hear how Greenlight group enabled one customer with over 4000 retail outlets to automate their network provisioning and facilitate hardware upgrades with Network Automation, resulting in lower costs and increased business support. Increase network stability and uptime by preventing inconsistencies and misconfigurations. Utilize configuration changes to determine if performance issues are related.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprises and managed service providers in need of an intelligent automation solution for their network and security devices

Audience

Organizations interested in a solution to drive automated configuration, change, and security compliance

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 4.5 / 5
ease 4.5 / 5
features 4.2 / 5
design 4.0 / 5
support 4.8 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

BackBox
Founded: 2009
United States
backbox.com/request-a-demo/

Company Information

OpenText
Founded: 1991
Canada
www.opentext.com/products/network-automation

Alternatives

Unimus

Unimus

NetCore j.s.a. (Unimus)

Alternatives

Restorepoint

Restorepoint

ScienceLogic
TriOSS

TriOSS

Nayatel
Unimus

Unimus

NetCore j.s.a. (Unimus)

Categories

Categories

Network Automation Features

Compliance Monitoring
Configuration Backup
Configuration Changes
Network Orchestration
Performance Monitoring
Tool Access Control
Vulnerability Assessments

IT Management Features

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security Features

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Integrations

A10 Thunder ADC
AppWall
Arista Converged Cloud Fabric
Array APV Series
Aruba Cloud
Avaya Cloud Office
Citrix Gateway
F5 BIG-IP
Forcepoint Trusted Gateway System
Forescout
FortiDDoS
Gigamon
LogRhythm SIEM
NETSCOUT Arbor DDoS
Paessler PRTG
Sophos Firewall
Sophos Managed Threat Response
Sophos UTM
VMware vCenter

Integrations

A10 Thunder ADC
AppWall
Arista Converged Cloud Fabric
Array APV Series
Aruba Cloud
Avaya Cloud Office
Citrix Gateway
F5 BIG-IP
Forcepoint Trusted Gateway System
Forescout
FortiDDoS
Gigamon
LogRhythm SIEM
NETSCOUT Arbor DDoS
Paessler PRTG
Sophos Firewall
Sophos Managed Threat Response
Sophos UTM
VMware vCenter
Claim BackBox and update features and information
Claim BackBox and update features and information
Claim OpenText Network Automation and update features and information
Claim OpenText Network Automation and update features and information