Best IT Management Software for BackBox

Compare the Top IT Management Software that integrates with BackBox as of September 2024

This a list of IT Management software that integrates with BackBox. Use the filters on the left to add additional filters for products that have integrations with BackBox. View the products that work with BackBox in the table below.

What is IT Management Software for BackBox?

IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making. Compare and read user reviews of the best IT Management software for BackBox currently available using the table below. This list is updated regularly.

  • 1
    Device42

    Device42

    Device42, A Freshworks Company

    With customers across 70+ countries, organizations of all sizes rely on Device42 as the most trusted, advanced, and complete full-stack agentless discovery and dependency mapping platform for Hybrid IT. With access to information that perfectly mirrors the reality of what is on the network, IT teams are able to run their operations more efficiently, solve problems faster, migrate and modernize with ease, and achieve compliance with flying colors. Device42 continuously discovers, maps, and optimizes infrastructure and applications across data centers and cloud, while intelligently grouping workloads by application affinities and other resource formats that provide a clear view of what is connected to the environment at any given time. As part of the Freshworks family, we are committed to, and you should expect us to provide even better solutions and continued support for our global customers and partners, just as we always have.
    Leader badge
    Starting Price: $1499.00/year
    View Software
    Visit Website
  • 2
    Paessler PRTG

    Paessler PRTG

    Paessler GmbH

    Paessler PRTG is an all-inclusive monitoring software solution developed by Paessler. Equipped with an easy-to-use, intuitive interface with a cutting-edge monitoring engine, PRTG optimizes connections and workloads as well as reduces operational costs by avoiding outages while saving time and controlling service level agreements (SLAs). The solution is packed with specialized monitoring features that include flexible alerting, cluster failover solution, distributed monitoring, in-depth reporting, maps and dashboards, and more. PRTG monitors your entire IT infrastructure. All important technologies are supported: • SNMP: ready-to-use and custom options • WMI and Windows Performance Counters • SSH: for Linux/Unix and macOS systems • Traffic analysis using flow protocols or packet sniffing • HTTP requests • REST APIs returning XML or JSON • Ping, SQL, and many more
    Leader badge
    Starting Price: $2149 for PRTG 500
    View Software
    Visit Website
  • 3
    Cisco AnyConnect
    Secure VPN access for remote workers. Empower remote workers with frictionless, highly secure access to the enterprise network from any device, at any time, in any location while protecting the organization. If you're looking to increase protection for your remote employees so they can work from any device, at any time, from any location, get started with the Cisco Secure Remote Worker solution. Cisco can help accelerate your business success by quickly extending flexible, policy-driven access to support remote workers across wired, wireless, and VPN. Get more--with lower total cost of ownership--with multiple services beyond traditional VPN capabilities and successfully enable a more complete secure access for remote workers. Gain the visibility and control for your distributed enterprise to identify who and which devices are accessing your enterprise network.
  • 4
    Proofpoint Email Protection
    Proofpoint Email Protection solutions—deployed as a cloud service or on-premises—protect against malware and threats that don't involve malware, including impostor email, or business email compromise (BEC). Granular email filtering controls spam, bulk "graymail" and another unwanted email. And continuity capabilities keep email communications flowing when your email server fails. Proofpoint Email Protection is the industry-leading email gateway, which can be deployed as a cloud service or on premises. It catches both known and unknown threats that others miss. Powered by NexusAI, our advanced machine learning technology, Email Protection accurately classifies various types of email. And it detects and blocks threats that don’t involve malicious payload, such as impostor email—also known as business email compromise (BEC)—using our Advanced BEC Defense. You can also automatically tag suspicious email to help raise user awareness. And you can track down any email in seconds.
  • 5
    Bitdefender GravityZone
    Bitdefender GravityZone provides full visibility into organizations' overall security posture, global security threats, and control over its security services that protect virtual or physical desktops, servers and mobile devices. All Bitdefender's Enterprise Security solutions are managed within the GravityZone through a single console, Control Center, that provides control, reporting, and alerting services for various roles within the organization
  • 6
    Riverbed SteelHead

    Riverbed SteelHead

    Riverbed Technology

    SteelHead is the industry’s #1 optimization solution for accelerated delivery of any application across the Hybrid WAN. With SteelHead WAN optimization, you have better visibility into application and network performance and the end user experience. By combining network, application and end user performance metrics for deep visibility, IT can troubleshoot and fix problems before the user is impacted. Leveraging the solution’s application-aware approach, the most complete set of network services and path selection based on intent-based, business-driven, global policies with local enforcement, you also have significantly improved control to enable business agility.
  • 7
    Forescout

    Forescout

    Forescout Technologies

    It seemed to happen overnight. Your organization became a veritable Enterprise of Things (EoT). PCs, mobile devices, cloud workloads and other traditional IT systems. Agentless IoT and OT devices. Device diversity is thriving at the cost of security as your users connect from all over the map – literally. Here’s the thing: Every thing that touches your enterprise exposes you to potential risk. You must see it and secure it. Get to know Forescout. We offer the only solution that actively defends the Enterprise of Things at scale. Complex networks housing business-critical data and applications in physical, virtual and cloud environments create blind spots and security concerns. Gain Zero Trust security with 100% device visibility and control, network segmentation and unified policy enforcement with Forescout. Forescout offers agentless visibility and control of network-attached systems, allowing you to better secure your network.
  • 8
    NorthStar Navigator

    NorthStar Navigator

    NorthStar.io, Inc.

    NorthStar is redefining Risk-Based Vulnerability Management with simple, contextual vulnerability prioritization for easier remediation. Common challenges NorthStar addresses are listed below: • Prioritize issues that should be addressed first in order to make the best use of limited resources. • Address lingering exposures that could impact critical business services, applications, and data stores. • Bridge the visibility gap and discrepancies that exist between vulnerability assessment and patch management. • Track reduction in risk over time and validate the most important issues are being addressed first. • Deliver a complete view of their environment – all assets, vulnerabilities and exposures. • Eliminate manual processes and unnecessary spreadsheet work.
    Starting Price: $8 per device
  • 9
    VMware NSX

    VMware NSX

    Broadcom

    Full-Stack Network and Security Virtualization with VMware NSX. Enable your virtual cloud network to connect and protect applications across your data center, multi cloud, bare metal, and container infrastructure. VMware NSX Data Center delivers a complete L2-L7 networking and security virtualization platform — providing the ability to manage the entire network as a single entry from a single pane of glass. Bring one-click provisioning to your networking and security services — access powerful flexibility, agility, and scale — by running a complete L2-L7 stack in software, decoupled from underlying physical hardware. Manage consistent networking and security policies across private and public clouds, from a single pane of glass, regardless of where your application runs – VM, container, or bare metal. Deliver granular protection for your apps via micro-segmentation to the individual workload.
    Starting Price: $4,250
  • 10
    Syslog-ng

    Syslog-ng

    Balabit

    Syslog-ng is a reliable, scalable, secure central log management solution. With syslog-ng, IT teams can collect and centralize log data in regards to user activity, performance metrics, network traffic, and more. This helps remove data silos and lets teams gain full-stack visibility in to their log data. Syslog-ng features secure transfer and storage of data, scalable architecture, flexible log routing, real time transformation, and more. The platform is available in open source and enterprise editions.
  • 11
    Array APV Series

    Array APV Series

    Array Networks

    Array APV Series application delivery controllers provide the availability, scalability, performance, security and control essential to keeping applications and servers running in their power band. Integrated local and global server load balancing, as well as link load balancing, ensure the highest levels of resiliency for your applications, while connection multiplexing, SSL offload, caching and compression work together to deliver the fastest end-user experience possible. What’s more, by terminating connections on APV Series ADCs, applications are protected behind Array’s WebWall® application security suite. Available as physical or virtual appliances, or on popular public clouds, Array ADCs are designed to meet technical requirements while remaining simple enough for any size IT team and affordable enough for any size business.
  • 12
    A10 Thunder ADC

    A10 Thunder ADC

    A10 Networks

    High-performance advanced load balancing solution that enables your applications to be highly available, accelerated, and secure. Ensure efficient and reliable application delivery across multiple datacenters and cloud. Minimize latency and downtime, and enhance end-user experience. Increase application security with advanced SSL/TLS offload, single sign-on (SSO), DDoS protection and Web Application Firewall (WAF) capabilities. Integrate with the Harmony™ Controller to gain deep per-application visibility and comprehensive controls for secure application delivery across on-premises datacenters, public, private and hybrid clouds. Complete full-proxy Layer 4 load balancer and Layer 7 load balancer with flexible aFleX® scripting and customizable server health checks. High performance SSL Offload with up-to-date SSL/TLS ciphers enabling optimized and secure application service. Global Server Load Balancing (GSLB) extends load balancing on a global basis.
  • 13
    Sophos Email
    Today’s email threats move fast, and growing businesses need predictive email security – defeating today’s threats with an eye on tomorrow. The same technology as our award-winning Intercept X, Sophos Email sandboxing is a deep learning neural network, able to block zero-day malware and unwanted applications. The most advanced anti-ransomware technology available. Sophos email security uses behavioral analysis to stop never-before-seen ransomware and boot-record attacks. Time-of-click URL protection checks the website reputation of email links before delivery and again when you click – blocking stealthy, delayed attacks that other email security can miss. Processing millions of emails per day, the latest threat intelligence from SophosLabs global network ensures your Sophos Email gateway won’t miss any of the thousands of new threats discovered every hour.
  • 14
    Centerity

    Centerity

    Centerity Systems

    Connect, secure, monitor and manage (CSM2) your distributed enterprise edge with centralized observability and analytics. Discover and remediate issues faster to ensure greater uptime, performance and security. Open microservices architecture gives you everything you need to manage your distributed enterprise edge.
  • 15
    Gigamon

    Gigamon

    Gigamon

    Fuel Your Digital Transformation Journey. Manage complex digital apps on your network with unparalleled depth and breadth of intelligence. Managing your network daily to ensure constant availability is daunting. Networks are getting faster, data volumes are growing and users and apps are everywhere, which makes monitoring and managing difficult. How are you supposed to drive Digital Transformation? What if you could ensure network uptime while gaining visibility into your data-in-motion across physical, virtual and cloud environments? Gain visibility across all networks, tiers and applications — while getting intelligence across your complex structures of applications. Gigamon solutions can radically improve the effectiveness of your entire network ecosystem. Ready to learn how?
  • 16
    VMware vCenter
    Gain centralized visibility, simplified and efficient management at scale, and extensibility across the hybrid cloud—all from a single console. VMware vCenter Server is advanced server management software that provides a centralized platform for controlling your VMware vSphere environments, allowing you to automate and deliver a virtual infrastructure across the hybrid cloud with confidence. Quickly deploy vCenter as a pre-packaged, optimized, and easy-to-maintain virtual appliance. Integration of vSphere Update Manager into vCenter Server Appliance makes patching and upgrading fast and easy. RESTful APIs allow for the easily repeatable deployment of vCenter Server Appliance from a template, speeding up deployment times as well as reducing human error. Seamlessly extend your on-premises environment to vSphere-based public clouds, such as VMware Cloud on AWS, no matter which version of vCenter you are running.
  • 17
    VMware ESXi

    VMware ESXi

    Broadcom

    Discover a robust, bare-metal hypervisor that installs directly onto your physical server. With direct access to and control of underlying resources, VMware ESXi effectively partitions hardware to consolidate applications and cut costs. It’s the industry leader for efficient architecture, setting the standard for reliability, performance, and support. IT teams are under constant pressure to meet fluctuating market trends and heightened customer demands. At the same time, they must stretch IT resources to accommodate increasingly complex projects. Fortunately, ESXi helps balance the need for both better business outcomes and IT savings.
  • 18
    Centreon

    Centreon

    Centreon

    Centreon is a global provider of business-aware IT monitoring for always-on operations and performance excellence. The company’s holistic, AIOps-ready platform is designed for today’s complex, distributed hybrid cloud infrastructures. Centreon monitors the complete IT Infrastructure from Cloud-to-Edge for a clear and comprehensive view. Centreon removes blind spots, monitoring all equipment, middleware and applications that are part of modern IT workflows, from on-premise legacy assets to private and public cloud environments, all the way to the edge of the network, where smart devices and customers combine to create business value. Centreon is constantly current, able to support the most dynamic environments. With auto-discovery capabilities it can keep track of Software-Defined Network (SDN) elements, AWS or Azure cloud assets, Wi-Fi access points or any other component of today’s agile IT infrastructure.
  • 19
    Clearswift Secure Email Gateway
    Clearswift Secure Email Gateway (SEG) provides uniquely powerful protection of an organization's email data against inbound cyber-attacks and outbound data loss prevention. As the number one method of communication for most organizations, email has become one of the top sources for cybercriminals to infiltrate your systems and take hold of your critical data. Our Secure Email Gateway protects against known and unknown malware but also advanced threats including phishing. IT teams need to ensure that information being shared across email both in and out of the organization is not only secure, but appropriate and compliant. Clearswift’s unparalleled level of inspection and granular policy controls apply the optimal security treatment to your emails in real time so your communications remain safe and flowing, and business disruptions are minimized.
  • 20
    Radware Alteon
    Alteon is Radware’s next-generation application delivery controller (ADC) and the only network load balancer that guarantees application SLA. It provides advanced, end-to-end local and global load balancing capabilities for all Web, cloud and mobile-based applications. Alteon load balancer/ADC combines best-of-breed application delivery capabilities, market-leading SSL performance that supports all of the latest encryption protocols, and advanced services to companies with ongoing application lifecycle management challenges that impact the performance of web applications (such as heavier, more complex web content); mobility, and the migration to the cloud. Alteon is Radware’s next-generation application delivery controller (ADC) and the only network load balancer that guarantees application SLA. It provides advanced, end-to-end local and global load balancing capabilities for all Web, cloud and mobile-based applications.
  • 21
    Imprivata

    Imprivata

    Imprivata

    Imprivata: the digital identity company. At Imprivata, our understanding of unique and complex healthcare workflows and IT systems has made us the world leader in trusted digital identity management for health delivery organizations. At Imprivata, our understanding of unique and complex healthcare workflows and IT systems has made us the world leader in trusted digital identity management for health delivery organizations. Imprivata offers enterprise access, multifactor authentication, identity governance, and patient identification solutions that are developed with, and vetted by, clinicians, to ensure that clinical workflow security and efficiency are always considered. Imprivata solutions track to the Imprivata digital identity framework, which presents a unified, security- and efficiency-focused strategy for managing identities across a healthcare delivery organization.
  • 22
    RedSeal

    RedSeal

    RedSeal Networks

    Secure all your network environments—public clouds, private clouds, and on premises— in one comprehensive, dynamic visualization. Trusted by all four branches of the military, the world’s most trusted financial institutions, power grid companies, and mission-critical government agencies. A digital transformation is accelerating migration to the cloud, especially as so many people work remotely. Security teams are scrambling to manage security for resources in one, two or more public clouds as well as for resources remaining on premises. Most security tools only work in one of these environments, leaving security teams with common, urgent concerns. Continuously validate and ensure security compliance with your network segmentation policies and regulations.
  • 23
    ONTAP

    ONTAP

    NetApp

    ONTAP: The industry-leading enterprise data management software. You need a solid foundation for your seamless hybrid cloud. NetApp® ONTAP® data management software gives you every advantage possible—everywhere. Looks like you just won the data management lottery. Seamlessly manage your data as it flows to and from wherever you need it most. We get it—you have more than one “#1 priority” right now…Help your business grow. Reliably support your current applications. Anticipate and prepare for the future. Plus, do it all without additional IT budget. With ONTAP, you don’t need to compromise to achieve these priorities. Quickly respond to new business challenges, simplify your day-to-day activities, and impress your team. Sound like your cup of tea? Whatever your data management needs—on your premises and in the cloud—ONTAP has you covered.
  • 24
    F5 BIG-IP

    F5 BIG-IP

    F5 Networks

    Advanced technology for an app-centric world. Apps are your business. BIG-IP application services provide the availability, performance, and security you need to meet business demands. Keep your apps up and running with BIG-IP application delivery controllers. BIG-IP Local Traffic Manager (LTM) and BIG-IP DNS handle your application traffic and secure your infrastructure. You’ll get built-in security, traffic management, and performance application services, whether your applications live in a private data center or in the cloud. BIG-IP Diameter Traffic Management, BIG-IP Policy Enforcement Manager (PEM), and BIG-IP Carrier-Grade NAT (CGNAT) manage network resources to keep your applications performing at carrier-grade levels. They also help you identify ways to optimize and monetize your network, improving your bottom line.
  • 25
    Axway AMPLIFY
    To become the hero, not the roadblock, many IT departments are investing in integration platforms that let users accomplish projects themselves, instead of waiting for an IT specialist. Whether it’s cutting the budget, struggling to get to the cloud, or tackling a growing project backlog, IT is challenged like never before. To become the hero, not the roadblock, many IT organizations are investing in platforms that let users accomplish projects themselves, instead of waiting for an IT specialist. AMPLIFY is the enterprise integration platform that that can hide integration complexity, enforce IT policy, and scale at will, enabling your teams to: Stop repetitive one-off integrations, and focus on reusable integrations that can be leveraged by wider internal and external teams. Gain cloud cost savings and increase scale by moving on-premises integration silos to the cloud, or by leveraging them in place with hybrid deployment, and much more.
  • 26
    IBM Security QRadar SIEM
    Market-leading SIEM built to outpace the adversary with speed, scale and accuracy As digital threats loom large and cyber adversaries grow increasingly sophisticated, the roles of SOC analysts are more critical than ever. Going beyond threat detection and response, QRadar SIEM enables security teams face today’s threats proactively with advanced AI, powerful threat intelligence, and access to cutting-edge content to maximize analyst potential. Whether you need cloud-native architecture built for hybrid scale and speed or a solution to complement your on-premises infrastructure, IBM can provide you with a SIEM to meet your needs. Experience the power of IBM enterprise-grade AI designed to amplify the efficiency and expertise of every security team. With QRadar SIEM, analysts can reduce repetitive manual tasks like case creation and risk prioritization to focus on critical investigation and remediation efforts.
  • 27
    Citrix Gateway

    Citrix Gateway

    Citrix Systems

    Citrix Gateway consolidates remote access infrastructure to provide single sign-on across all applications whether in a data center, in a cloud, or if the apps are delivered as SaaS apps. It allows people to access any app, from any device, through a single URL. Citrix Gateway is easy to deploy and simple to administer. The most typical deployment configuration is to locate the Citrix Gateway appliance in the DMZ. You can install multiple Citrix Gateway appliances in the network for more complex deployments. Citrix Gateway service provides secure remote access solution with a diverse Identity and Access Management (IdAM) capabilities, delivering a unified experience into SaaS apps, heterogeneous Virtual apps and Desktops, and so forth.
  • 28
    Radware LinkProof NG
    Link load balancers improve application availability and response times across networks and increases overall throughput of server resources. Radware LinkProof, is a load balancing network solution that significantly improves the performance of your network. Skip bottlenecks, avoid outages, manage bandwidth consumption and ensure your network is always ready to perform. LinkProof is the only on-demand solution that lets you effortlessly add, manage and load-balance multiple ISP connections while you mix and match VPNs or private and public links for back-up or in response to growing bandwidth needs. Through its "add links as you grow" approach. LinkProof allows you to add new links quickly to the existing connectivity solution as you grow your business, with no downtime or ISP involvement. LinkProof provides a broad multi-WAN link load balancing offering which is designed to cater to any market need, from the small branch office all the way up to the large enterprise.
  • 29
    Forcepoint Trusted Gateway System
    Forcepoint Trusted Gateway System Secure data transfers for your mission-critical files, every time. Reliably transfer unstructured files transfer. PDF and Microsoft Office files between and within different classification levels for international, federal, state, and local entities. Comply with Raise the Bar initiatives Achieve breach-resilient, mission-safe architectural design that meets the U.S. Government’s Raise the Bar requirements. Streamline file transfer processes and eliminate air gap risks inherent to portable media. System and security administrators with the appropriate permissions perform administration, monitoring, and auditing from the server. Further reduce operational infrastructure cost by adding Forcepoint Trusted Print Delivery and Trusted Mail System. Forcepoint is widely deployed and listed on the NCDSMO baseline list, and supports transfer environments with 38+ networks.
  • 30
    Aruba Cloud

    Aruba Cloud

    Aruba Cloud

    Cloud made simple and made-to-measure. IaaS and PaaS solutions for your cloud computing applications. A service that allows you to create and set up auto-backups, ideal solution to manage and protect your backups. With our Object Storage solution, based on the IaaS model, you can create and manage storage space to store all the data that you want. Domain Center is a web service offered by Aruba Cloud that allows users to purchase and transfer domain names and manage DNS. Monitor all your websites, Cloud Servers, dedicated servers, whether they reside in Aruba Cloud data centers, or are hosted by other providers. In cases of failures or errors detected in the monitored resource or service, Cloud Monitoring will automatically and immediately send you a notification via email or SMS, so you can always know the progress of your infrastructure in real time and if need be, take action as soon as possible.
  • Previous
  • You're on page 1
  • 2
  • Next