| RocketCyberKaseya | ||||||
| Related Products
 | ||||||
| About
            BackBox offers a simple way to intelligently automate the backup, restoration, and management of all devices on a network by providing centralized management of devices such as firewalls, routers, switches, and load balancers. Each of these devices plays a critical role in the availability and security of an organization’s network, and BackBox ensures they all continue to function effectively and effortlessly, streamlining operations for optimal performance.
BackBox provides a foundation to harmonize the configuration between multiple devices, enabling seamless integration, and assuring compliance to organization or industry security policies, standards, or guidelines. IT administrators can easily employ BackBox to track configuration changes and see the deviation with the baseline for compliance validation and remediation.
             | About
            RocketCyber delivers around-the-clock Managed SOC (Security operations Center) services that allow you to instantly enhance threat detection and response initiatives for your managed IT environments. Improve your security posture and alleviate threat concerns with expert-powered services.
RocketCyber provides a 24/7/365 MDR service that enables robust threat detection and response across the IT environments you manage. Stop advanced threats, remove stress and enhance your security posture with expert-backed cybersecurity.
             | |||||
| Platforms Supported
            
                Windows
            
            
         
            
                Mac
            
            
         
            
                Linux
            
            
         
            
                Cloud
            
            
         
            
                On-Premises
            
            
         
            
                iPhone
            
            
         
            
                iPad
            
            
         
            
                Android
            
            
         
            
                Chromebook
            
            
         | Platforms Supported
            
                Windows
            
            
         
            
                Mac
            
            
         
            
                Linux
            
            
         
            
                Cloud
            
            
         
            
                On-Premises
            
            
         
            
                iPhone
            
            
         
            
                iPad
            
            
         
            
                Android
            
            
         
            
                Chromebook
            
            
         | |||||
| Audience
        Enterprises and managed service providers in need of an intelligent automation solution for their network and security devices
         | Audience
        Companies, security teams and anyone requiring a managed cyber security solution
         | |||||
| Support
            
                Phone Support
            
            
         
            
                24/7 Live Support
            
            
         
            
                Online
            
            
         | Support
            
                Phone Support
            
            
         
            
                24/7 Live Support
            
            
         
            
                Online
            
            
         | |||||
| API
            
                Offers API
            
            
         | API
            
                Offers API
            
            
         | |||||
| Screenshots and Videos | Screenshots and Videos | |||||
| Pricing
        No information available.
        
        
     
            
                Free Version
            
            
         
            
                Free Trial
            
            
         | Pricing
        No information available.
        
        
     
            
                Free Version
            
            
         
            
                Free Trial
            
            
         | |||||
| 
Reviews/ | 
Reviews/ | |||||
| Training
            
                Documentation
            
            
         
            
                Webinars
            
            
         
            
                Live Online
            
            
         
            
                In Person
            
            
         | Training
            
                Documentation
            
            
         
            
                Webinars
            
            
         
            
                Live Online
            
            
         
            
                In Person
            
            
         | |||||
| Company InformationBackBox Founded: 2009 United States backbox.com/request-a-demo/ | Company InformationKaseya Founded: 2000 United States www.rocketcyber.com | |||||
| Alternatives | Alternatives | |||||
|  | ||||||
|  | ||||||
|  |  | |||||
|  | ||||||
| Categories | Categories | |||||
| IT Management Features
            
                Capacity Monitoring
            
            
         
            
                Compliance Management
            
            
         
            
                Event Logs
            
            
         
            
                Hardware Inventory
            
            
         
            
                IT Budgeting
            
            
         
            
                License Management
            
            
         
            
                Patch Management
            
            
         
            
                Remote Access
            
            
         
            
                Scheduling
            
            
         
            
                Software Inventory
            
            
         
            
                User Activity Monitoring
            
            
         IT Security Features
            
                Anti Spam
            
            
         
            
                Anti Virus
            
            
         
            
                Email Attachment Protection
            
            
         
            
                Event Tracking
            
            
         
            
                Internet Usage Monitoring
            
            
         
            
                Intrusion Detection System
            
            
         
            
                IP Protection
            
            
         
            
                Spyware Removal
            
            
         
            
                Two-Factor Authentication
            
            
         
            
                Vulnerability Scanning
            
            
         
            
                Web Threat Management
            
            
         
            
                Web Traffic Reporting
            
            
         Network Automation Features
            
                Compliance Monitoring
            
            
         
            
                Configuration Backup
            
            
         
            
                Configuration Changes
            
            
         
            
                Network Orchestration
            
            
         
            
                Performance Monitoring
            
            
         
            
                Tool Access Control
            
            
         
            
                Vulnerability Assessments
            
            
         Network Security Features
            
                Access Control
            
            
         
            
                Analytics / Reporting
            
            
         
            
                Compliance Reporting
            
            
         
            
                Firewalls
            
            
         
            
                Internet Usage Monitoring
            
            
         
            
                Intrusion Detection System
            
            
         
            
                Threat Response
            
            
         
            
                VPN
            
            
         
            
                Vulnerability Scanning
            
            
         | ||||||
| Integrations
            
                
    A10 Thunder ADC
            
            
         
            
                
    AlgoSec
            
            
         
            
                
    Arista Converged Cloud Fabric
            
            
         
            
                
    Bitdefender GravityZone
            
            
         
            
                
    Centerity
            
            
         
            
                
    Check Point Infinity
            
            
         
            
                
    CyberArk Privileged Access Manager
            
            
         
            
                
    Datto EDR
            
            
         
            
                
    FortiMail
            
            
         
            
                
    IBM QRadar SIEM
            
            
         | Integrations
            
                
    A10 Thunder ADC
            
            
         
            
                
    AlgoSec
            
            
         
            
                
    Arista Converged Cloud Fabric
            
            
         
            
                
    Bitdefender GravityZone
            
            
         
            
                
    Centerity
            
            
         
            
                
    Check Point Infinity
            
            
         
            
                
    CyberArk Privileged Access Manager
            
            
         
            
                
    Datto EDR
            
            
         
            
                
    FortiMail
            
            
         
            
                
    IBM QRadar SIEM
            
            
         | |||||
|  |  | 
 
         
         
         
        