Alternatives to Restorepoint

Compare Restorepoint alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Restorepoint in 2024. Compare features, ratings, user reviews, pricing, and more from Restorepoint competitors and alternatives in order to make an informed decision for your business.

  • 1
    BackBox

    BackBox

    BackBox

    BackBox offers a simple way to intelligently automate the backup, restoration, and management of all devices on a network by providing centralized management of devices such as firewalls, routers, switches, and load balancers. Each of these devices plays a critical role in the availability and security of an organization’s network, and BackBox ensures they all continue to function effectively and effortlessly, streamlining operations for optimal performance. BackBox provides a foundation to harmonize the configuration between multiple devices, enabling seamless integration, and assuring compliance to organization or industry security policies, standards, or guidelines. IT administrators can easily employ BackBox to track configuration changes and see the deviation with the baseline for compliance validation and remediation.
    Compare vs. Restorepoint View Software
    Visit Website
  • 2
    StandardFusion

    StandardFusion

    StandardFusion

    A GRC solution for technology-focused SMB and Enterprise Information Security teams. StandardFusion eliminates spreadsheet pain by using a single system of record. Identify, assess, treat, track and report on risks with confidence. Turn audit-based activities into a standardized process. Conduct audits with certainty and direct access to evidence. Manage compliance to multiple standards; ISO, SOC, NIST, HIPAA, GDPR, PCI-DSS, FedRAMP and more. Manage vendor and 3rd party risk, and security questionnaires easily in one place. StandardFusion is a Cloud-Based SaaS or on-premise GRC platform designed to make InfoSec compliance simple, approachable and scalable. Connect what your organization does, with what your organization needs to do.
    Compare vs. Restorepoint View Software
    Visit Website
  • 3
    PathSolutions TotalView
    PathSolutions TotalView network monitoring and troubleshooting software bridges the gap between NETWORK MONITORING and TROUBLESHOOTING RESOLUTION telling you WHEN, WHERE and WHY network errors occur. PathSolutions TotalView continuously monitors and tracks the performance of every device and every link in your entire network, going deeper than other solutions by collecting error counters, performance data, configuration information and connectedness. A built-in heuristics engine analyzes all of this information to produce plain-English answers to problems. This means that complex problems can be solved by junior level engineers leaving the senior level engineers to work on more strategic level projects. The core product includes everything needed to run a perfectly healthy network: Configuration management, server monitoring, cloud service monitoring, IPAM, NetFlow, path mapping, and diagramming. Get Total Network Visibility on your network and solve more problems faster.
    Leader badge
    Partner badge
    Compare vs. Restorepoint View Software
    Visit Website
  • 4
    NetBrain

    NetBrain

    NetBrain Technologies

    NetBrain, founded in 2004, provides a powerful no-code automation platform for hybrid network observability, allowing organizations to enhance their operational efficiency through automated workflows. The platform applies automation across three key workflows: troubleshooting, change management, and assessment. Get network-wide and contextualized analysis across your multi-vendor, multi-cloud network Visualize and document the entire hybrid network using dynamic network maps and end-to-end paths Automate network discovery and ensure data accuracy for a single source of truth Auto-discover and decode your network's golden configurations, discover day 1 issues, and automate configuration drift prevention Automate pre- and post-validations for network changes with application performance context understanding Automate collaborative troubleshooting from human to machine For every network troubleshooting idea, create a map, apply automation from your own library
  • 5
    6clicks

    6clicks

    6clicks

    6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRamp and many other standards. Hundreds of businesses trust 6clicks to set up and automate their risk and compliance programs and streamline audit, vendor risk assessment, incident and risk management and policy implementation. Easily import standards, laws, regulations or templates from our massive content library, use AI-powered features to automate manual tasks, and integrate 6clicks with over 3,000 apps you know and love. 6clicks has been built for businesses of all shapes and sizes and is also used by advisors with a world-class partner program and white label capability available. 6clicks was founded in 2019 and has offices in the United States, United Kingdom, India and Australia.
  • 6
    Cruz Operations Center (CruzOC)
    CruzOC is a scalable multi-vendor network management and IT operations tool for robust yet easy-to-use netops. Key features of CruzOC’s integrated and automated management include performance monitoring, configuration management, and lifecycle management for 1000s of vendors and converging technologies. With CruzOC, administrators have implicit automation to control their data center operations and critical resources, improve network and service quality, accelerate network and service deployments, and lower operating costs. The result is comprehensive and automated problem resolution from a single-pane-of-glass. Cruz Monitoring & Management. NMS, monitoring & analytics -- health, NPM, traffic, log, change. Automation & configuration management -- compliance, security, orchestration, provisioning, patch, update, configuration, access control. Automated deployment -- auto-deploy, ZTP, remote deploy. Deployments available on-premise and from the cloud.
    Starting Price: $1350
  • 7
    Runecast

    Runecast

    Runecast Solutions

    Runecast is an enterprise CNAPP platform that saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. It automates vulnerability assessment, configuration drift management and continuous compliance – for VMware, Cloud and Containers. By proactively using our agentless scanning in real-time admins discover potential risks and remediation solutions before any issues can develop into a major outage. It provides continuous audits against vendor best practices, common security standards, and frameworks such as BSI IT-Grundschutz, CIS, Cyber Essentials, DISA STIG, DORA, Essential 8, GDPR, HIPAA, ISO 27001, KVKK, NIST, PCI DSS, TISAX, VMware Security Hardening Guidelines, and the CISA KEVs catalog. Detect and assess risks and be fully compliant across your hybrid cloud in minutes. Runecast has been recognized with Frost & Sullivan's 2023 European New Product Innovation Award in the CNAPP industry.
  • 8
    SaltStack

    SaltStack

    SaltStack

    SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure—on-prem, in the cloud, or at the edge. It’s built on a unique and powerful event-driven automation engine that detects events in any system and reacts intelligently to them, making it an extremely effective solution for managing large, complex environments. With the newly launched SecOps offering, SaltStack can detect security vulnerabilities and non-compliant, mis-configured systems. As soon as an issue is detected, this powerful automation helps you and your team remediate it, keeping your infrastructure securely configured, compliant, and up-to-date. The SecOps suite includes both Comply and Protect. Comply scans and remediates against CIS, DISA-STIG, NIST, PCI, HIPAA compliance standards. And Protect scans for vulnerabilities and patches and updates your operating systems.
  • 9
    Infoblox NIOS
    Infoblox NIOS 8.5.3 delivers efficient, multi-cloud integrations and automation, strengthens DDI reliability and control and enhances service provider user experiences for hybrid networks of any size—today and into the future. NIOS 8.5.3 improves security through Access Control Lists (ACLs) allowing admins to manage network and IP access and permissions to selected zones. NIOS 8.6.0 enables pairing of physical and virtual appliances for hybrid HA, improving reliability, redundancy and customer experience during migration. Add greater privacy, security and control with DoT and DoH and improved proxy functions. NIOS 8.6.0 equips DTC with new consolidated monitor health settings that enable all members to do health checks and share statuses. It also supplies a new LBDN Query Configuration to support full health check updates for greater reliability. Finally, NIOS 8.6.0 offers new source IP hash load balancing to enable persistence during disconnect and reconnect events.
  • 10
    ManageEngine Network Configuration Manager
    Network Configuration Manager is a multi-vendor network change, configuration and compliance management (NCCM) solution for switches, routers, firewalls and other network devices. NCM helps automate and take total control of the entire life cycle of device configuration management. Schedule device configuration backups, track user activity and spot changes by comparing configuration versions all from a centralized web GUI. Monitor configuration changes, get instant notifications and prevent unauthorized changes to make your networking environment secure, stable and compliant. Define standard practices and policies, check device configurations for violations and readily apply remedial measures to ensure device compliance. Save time by automating repetitive, time-consuming configuration management tasks and also by centrally applying configuration changes to devices in bulk.
  • 11
    SolarWinds Network Configuration Manager
    Automate network configuration management and compliance, which can help save time and optimize IT resources. Reduce cost, save work hours, and remain compliant with automated network configuration management and backup. Stop worrying whether inventory spreadsheets and lists are accurate, up-to-date, and reliable. With SolarWinds® Network Configuration Manager (NCM), you can quickly build an accurate inventory of your network devices by using network scanning and discovery to obtain up-to-date information on all network devices. When it comes to network configuration management, it’s critical to quickly and precisely compare configurations for a number of reasons. Some examples could be to check against security policies, to ensure there are no discrepancies between running and saved configs, and to quickly identify and fix unauthorized or failed changes. Automation of network configuration management simplifies processes like scheduling regular backups.
    Starting Price: $2,995 one-time fee
  • 12
    TrueSight Automation for Networks
    Network configuration and automation for better agility, security, and efficiency. Includes automated vulnerability management to analyze vulnerabilities, enhance visibility, and respond to threats across network devices. Leverage integration with vendor and NIST National Vulnerability DB security notifications to identify vulnerabilities, remediate device images, and upgrade devices with zero downtime. Drive fast configuration changes across thousands of network devices with automated roll-back and change tracking. Control device access to view or change settings, deploy pre-configured policies for regulatory standards such as CIS and DISA and remediate non-compliance. Deploy new physical or virtual network devices rapidly with gold-standard configurations to respond to business needs. Browse real-time device configurations to troubleshoot, view status of jobs, or complete a compliance audit.
  • 13
    Unimus

    Unimus

    Unimus

    We aim to make automation, disaster recovery, change management and configuration auditing painless and affordable for a network of any size. Deploying Unimus to manage your entire network requires only minutes, allowing for rapid deployment without headaches. Unimus was designed to be as simple and intuitive as possible, with no need to spend hours reading pages of documentation. A web GUI makes it fast and comfortable to work with Unimus. No need to learn a CLI or deal with configuration files. Unimus is developed using modern technology and conforms to modern application architecture and security principles. Unimus uses application-layer encryption of sensitive data, helping with compliance without the need for database-level encryption.
    Starting Price: $5.90 per device per year
  • 14
    Itential

    Itential

    Itential

    Itential is the only automation and orchestration solution built to support both network and cloud, making it easy for enterprise and service provider organizations to maintain network compliance, reduce manual operations, and simplify network management. The Itential Automation Platform is a low-code solution that seamlessly connects IT systems with network technologies for end-to-end network configuration, compliance, and automation. With Itential’s industry-leading patented network automation and orchestration solutions, network and cloud teams can: • Consolidate, Organize & Modernize Your CLI Automation Assets • Use Pre-Built Automations or Design & Build Your Own Automation Workflows • Backup, Manage, & Validate Network Configurations • Integrate with Everything in Your Environment • Manage, Measure, & Scale Automation Across your Organization
  • 15
    SolarWinds Kiwi CatTools
    Powerful network automation and configuration management software. Affordable network configuration management for small business networks. Schedule automatic backup activities and roll out configuration changes to multiple devices at the same time. Pre-schedule changes to your network device configurations to occur only on the devices you choose, and only when you want them to. Get alerted on changes to your network equipment so you can head off any malicious activities. Quickly rollback configuration changes when needed to avoid issues before their impact is felt. Schedule automated backups of network device configuration from routers, switches, firewalls, etc. Managing one-off config changes isn’t easy, not to mention the impact a minor issue can have on your entire network. Simultaneously perform or schedule configuration changes across multiple network devices with great ease. Changes to config files, outside of your knowledge, could be a sign of something insidious.
  • 16
    racksnet

    racksnet

    racksnet

    With racksnet® you can effortlessly automate your IT network, whether in WAN, campus, data center or IoT. The smart and convenient network automation software relieves your IT staff of all those tiresome, repetitive and time-consuming tasks. Our customers decide when, where and how and on which site controllers they perform tasks. Complete independence of time and place. Important network tasks can be planned and configured during core working hours and rolled out on weekends, for example. There are no measures required on site, that means at the location itself, for the provision of network resources. All configurations are deployed via the racksnet® Cloud. In separating hardware and software, the open networking technology of racksnet® goes significantly over and above the possibilities of conventional systems.
  • 17
    Pliant

    Pliant

    Pliant.io

    Pliant’s solution for IT Process Automation simplifies, streamlines, and secures how teams build and deploy automation. Reduce human error, ensure compliance, and elevate your efficiency, with Pliant. Ingest existing automation and write new automation with single-pane orchestration. Ensure compliance using consistent, practical built-in governance. Pliant has abstracted thousands of vendor APIs to create intelligent action blocks allowing users to drag-and-drop blocks, rather than writing and rewriting lines of code. From a single platform, citizen developers are able to build consistent and meaningful automation across platforms, services, and applications in minutes — maximizing value across the entire technology stack in one place. ​With​ ​our​ ​ability​ ​to​ ​add​ ​new​ ​APIs​ ​in​ ​15​ ​business​ ​days,​ ​anything that​ ​is​ ​not​ ​already​ ​out​ ​of​ ​the​ ​box​ ​will​ ​be​ ​in​ ​an​ ​industry​ ​leading​ ​timeframe.
  • 18
    Lan-Secure Configuration Center
    Configuration Center is a network configuration management software that allows controlling and maintaining changes of network devices configuration from any vendor supporting Telnet SSH and SNMP version 1/2/3 protocols. It provides backup configurations, monitor history changes, compare changes and restore configurations of network devices. The software overcomes the need of using several vendor specific configuration tools in multi vendor devices environment and helps to control and reduce configuration errors in IT environments. Configuration Center software can monitor any number of devices from any network location using Telnet and SSH shell protocols and SNMP version 1/2/3 protocols. The software monitoring engine can be operated manually by user request or run automatically on specific dates and times. It can provide automatic actions such as executing commands, sending SNMP traps or email notifications on specific configuration changes.
    Starting Price: $99 one-time payment
  • 19
    NetMRI

    NetMRI

    Infoblox

    Network infrastructures are now more complex than ever–increasingly diverse, siloed and powered by multiple vendors. IT admins often struggle to meet escalating demands for service delivery and reliability in these environments. Infoblox NetMRI can help. It’s a network change and configuration management solution that automates routine workflows such as device provisioning and security operations, enabling tighter compliance, faster incident response and quicker app deployment. Automatically discover all devices on your network, where they reside and how they link together. Proactively monitor and analyze network configurations to identify configuration problems early. Rapidly provision new services and implement network modifications in minutes instead of days or weeks with NetMRI’s automated management tools.
  • 20
    Cisco Prime Network
    Cisco Prime Network is a cost-effective device operation, administration, and network fault-management solution. This single solution helps service providers reduce management complexity and deliver carrier-class services. It supports the physical network components as well as the compute infrastructure, and virtual elements found in data centers. Increased operational efficiency through automated network discovery, configuration and change management. Enhanced customer satisfaction through proactive service assurance using postevent fault management and trend information. Lower integration costs through preintegration with Cisco Prime Carrier Management suite and northbound interfaces to third party applications. Detailed end-to-end views of the physical and virtual network topology and inventory. GUI-based device configuration with prebuilt and downloadable scripts. Up-to-date displays of network event, state, and configuration changes.
  • 21
    opConfig

    opConfig

    Opmantek

    opConfig can automate everything from config push to alerting on changes and enforcing compliance. Introduce operational delegation to your organization and allow the troubleshooting of your network devices without giving 'root' access. Implement your compliance policy with PCI-DSS, HIPPA, COBIT and more using prebuilt industry standard rule sets (eg Cisco-NSA) or customize your own. Collects and backs-up configuration information in all environments, all vendors hardware and software, cloud-based, on-premise and hybrid. opConfig gives you the ability to create robust command sets that can aid in root cause analysis of faults. Our software solutions scale horizontally and vertically. We have provided monitoring and management solutions for over 200k nodes. Compare configuration data with older versions or against other devices. Use compliance policies as a task sheet to ensure all devices are compliant.
  • 22
    Anuta ATOM

    Anuta ATOM

    Anuta Networks

    Accelerate your automation journey with Anuta ATOM. Monitoring & Closed-Loop Automation for Multi-Vendor Networks. Automate and Monitor your multi-vendor network with one single integrated solution. Anuta ATOM supports all major vendors, including Cisco, Juniper, Arista, F5 and many more. Didn’t find the network vendor you are looking for? Anuta ATOM’s super extensible framework enables a quick turnaround time of 2-6 weeks for vendor addition. IPAM, ITSM tools, or public cloud integrations – ATOM supports it all. ATOM supports tight integration to ecosystem vendors to enhance your network automation. Ensure network compliance with ATOM’s remediation capabilities. ATOM offers accurate configurations for non-compliant policies pushed on-demand or scheduled to keep your network 100% compliant. Run on-demand & scheduled multi-vendor compliance checks to understand your configuration consistency. Use ATOM to run compliance checks against a group of devices or a region.
  • 23
    UVexplorer

    UVexplorer

    UV Networks

    UVexplorer PRO automatically and quickly discovers all of the information about the devices on your network and the connections between them. UVexplorer creates network maps for documentation, meetings, presentations, sharing with your boss, or hanging on the wall. Export UVexplorer's automated network maps to PRTG, LucidChart, Microsoft Visio™, PDF, and SVG file types. UVexplorer also backups and provides change notifications for configurations of your network devices, such as routers, switches, and firewalls. Track how device configurations change over time. With UVexplorer's PRTG Connector, add powerful network discovery, detailed device inventory, and automatic network maps to PRTG Network Monitor. Capture detailed device and network inventory information to help meet documentation requirements of governmental regulations like PCI, HIPAA, FISMA, SOX, etc. Analyze and solve network and device problems with UVexplorer's suite of diagnostic tools.
    Starting Price: $1,795 per year
  • 24
    WeConfig

    WeConfig

    Westermo

    WeConfig makes network configuration and maintenance more efficient, simple and reliable. Many hours of work can be saved in the initial installation, as well as in ongoing maintenance throughout the life of the network. Time-consuming tasks can be automated and configuration updates can be deployed in bulk. WeConfig minimizes the risk of configuration errors and makes it simple to optimize network security. A properly configured and monitored network with simple and robust maintenance processes will minimize any risk of network downtime.Cyber security deployment and analysis. Simple deployment of system wide security features minimises the risk for unauthorized access. Security analysis lets you find and fix network vulnerabilities. WeConfig makes it easy to create and maintain a robust network security standard. Diagnostic tools for high network reliability. WeConfig makes your network transparent and gathers all information in one place.
  • 25
    Gluware

    Gluware

    Gluware

    Gluware brings a powerful layer of intelligence to today’s complex, multi-vendor enterprise networks so organizations can automate their networks at scale—code-free and error-free. Large global enterprise teams trust Gluware’s proven Intent-Based Networking system and off-the-shelf software package to help them safeguard their mission-critical networks and ensure business continuity. The GluwareⓇ Device Manager application helps large organizations quickly execute network device auto-discovery across their entire network, no matter how large or complex. Gluware Device Manager intelligently interrogates your network to build a database of your device inventory that includes hi-resolution details critical to automating your entire network code-free and at scale.
  • 26
    rConfig

    rConfig

    rConfig

    rConfig is an open source network device configuration management utility that takes frequent configuration snapshots of devices. Open source, and built by Network Architects. We know what you need! rConfig is completely open source. Event the professional version. Built on top of world class open source software (Laravel & Vuejs), It is extensible, and you can participate in its development. Take snapshots of your routing table, mac, arp tables, as well as running configs and any other show commands. Get your network device's status for any point in time. rConfig allows you to deliver configs much faster throughv intuative, and simple automation capabilties. rConfig has implemented enhanced security to protect your assets with more coming in future releases. Such as SSO, config encryption & MFA. Add customizations, contribbute to rConfig, or purchase support for priority feature addition to your rConfig installations.
    Starting Price: €499 per year
  • 27
    ThirdEye

    ThirdEye

    LogicVein

    ThirdEye by LogicVein includes advanced network configuration and change management (NCCM) capabilities and network monitoring system (NMS) for large enterprise data centers. ThirdEye is an integrated and cloud ready solution. Including the tools, reporting, automation and integration capabilities you need in a low cost and easy to use package. With ThirdEye, you will reduce cost, save time, manage your configurations and changes, in addition, be alerted if there are any issues with your devices. ThirdEye has all the features and functions of Net LineDancer, with enhanced additional features that allow you to monitor, alert and generate traps on devices. All the features you have in Net LineDancer, you still have in Thirdeye, but with the additional enhanced features of performance monitoring and alarming. By creating a dashboard for each site or system, you can check the monitoring status for each site at a glance.
  • 28
    CyberCompass

    CyberCompass

    CyberCompass

    We build Information Security, Privacy, and Compliance Programs to improve your cyber resilience – saving you and your organization time and money. CyberCompass is a cyber risk management consulting and software firm. We navigate organizations through the complexity of cybersecurity and compliance at half the cost of full-time employees. We design, create, implement, and maintain information security and compliance programs. We provide consulting services and a cloud-based GRC workflow automation platform to save our clients over 65% of the time to become and remain cybersecure and compliant. We provide expertise and support for the following standards and regulations – CCPA/ CPRA, CIS-18, CMMC 2.0, CPA, CTDPA, FTC Safeguards Rule, GDPR, GLBA, HIPAA, ISO-27001, NIST SP 800-171, NY DFS Reg 500, Singapore PDPA, SOC 2, TCPA, TPN, UCPA, VCDPA. We also provide third-party risk management within the CyberCompass platform.
    Starting Price: $5000/year
  • 29
    NetYCE

    NetYCE

    NetYCE

    The NetYCE platform is not an application, so it's the perfect choice when you require flexibility and agility with lots of room to grow. It is Full Stack, which means it comes out-of- the-box with extensive built-in functionality for configuration management, advanced monitoring and standard automation use cases. It also offers intent-based automation and the flexibility to implement your own logic and design rules. It's fully API-driven, open and easy to maintain. Insight into all your network configuration changes. Automated validation of policies and rules across your entire network. Auto-mitigate non-compliance and drive more changes through network automation. Enforce network intent through integrated inventory, design modelling and collaboration. NetYCE enables organizations to easily build network automation solutions that are manageable, scalable and secure. Its full-stack platform and unique implementation approach ensure fast results without risk.
  • 30
    Cetbix ISMS
    In three steps, you can achieve information security self-assessment, ISO 27001, NIST, GDPR, NFC, PCI-DSS, HIPAA, FERPA, and more. Cetbix® ISMS strengthens your certification. Information security management system that is comprehensive, integrated, documents ready and paperless. Cetbix® online SaaS ISMS. ISMS software from Cetbix®. Other features include IT/OT Asset Management, Document Management, Risk Assessment and Management, Scada Inventory, Financial Risk, Software Implementation Automation, Cyber Threat Intelligence Maturity Assessment, and others. More than 190 enterprises worldwide rely on Cetbix® ISMS to efficiently manage information security and ensure ongoing compliance with the Data Protection Regulation and other regulations.
  • 31
    Amdocs Network Optimization Suite
    Analytics-driven scalable platform, providing a unified workspace for all network analytics and optimization operations for 5G, 4G/LTE and converged mobile networks. The world’s most powerful and widely deployed multi-vendor, multi-technology optimization platform, enabling planning, building, launch, management and optimization of all networks from GSM to 5G-NR more effectively and efficiently – while delivering service quality. Leveraging drive, indoor, configuration management, performance management and subscriber trace-data sources, our solution enables countrywide analysis and benchmarking across your network, including supporting loading, processing, and analysis of large data volumes using centralized and distributed deployment models. Map subscriber experience and demand down to the street/block level for full visibility and experience enhancement.
  • 32
    ShieldRisk

    ShieldRisk

    ShieldRisk AI

    ShieldRisk is an Artificial Intelligent powered platform for third-party vendor risk assessment with speed and accuracy. The platform is a single, unified platform, executing vendor audits on global security & regulatory framework including GDPR, ISO 27001, NIST, HIPAA, COPPA, CCPA, SOC 1, SOC 2. ShieldRisk AI enables the analysis of auditing and advisory functions, involving time savings, faster data analysis, increased levels of accuracy, more in-depth insight into vendor security posture. ShieldRisk, in consistence with global compliance standards, helps the organizations transform cybersecurity programs to enable and provide risk free digital business strategies. We help organizations measure their vendors’ digital resilience, maximize recoveries, and lower their total cost of risk, while providing cybersecurity build-or-buy decisions. Our family of single and dual view platforms are easy to use and provide the clearest, most accurate screening and security analysis.
  • 33
    OpenText Network Automation
    Pass audit and compliance requirements easily with proactive policy enforcement and audit and compliance reports. Improve network security by recognizing and fixing security vulnerabilities before they impact your network. Reduce costs by automating time-consuming manual compliance and configuration tasks. Hear how Greenlight group enabled one customer with over 4000 retail outlets to automate their network provisioning and facilitate hardware upgrades with Network Automation, resulting in lower costs and increased business support. Increase network stability and uptime by preventing inconsistencies and misconfigurations. Utilize configuration changes to determine if performance issues are related.
  • 34
    ControlCase

    ControlCase

    ControlCase

    Almost every business has to comply with multiple information security related standards and regulations. IT compliance audits are complicated, expensive, and full of challenges. These can include but are not limited to PCI DSS, ISO 27001, GDPR, HIPAA, HITRUST, FISMA, NIST 800-53, MARS-E, BITS FISAP. Managing these audits individually poses a number of challenges for a business; including repetition of efforts, managing multiple audit firms, increased costs, complexity and time. While standards such as PCI DSS, ISO and SOC provide a benchmark for protecting data, criminals are always on the hunt for security vulnerabilities and malware to exploit organizations. The ControlCase Data Security Rating is focused exclusively on understanding your environment and providing solutions that seamlessly integrate security and go beyond just compliance.
  • 35
    LONI

    LONI

    LONI

    Take action instantly from anywhere. Real-time vendor-agnostic network management tool for your existing network, security, & cloud infrastructure with the power of true ZeroCode automation. Unified management, automation, intelligence, and operations for your security, cloud, network, and IOT infrastructure. Single source of truth for actionable data. Manage any device with an IP address. Automate any task in your IT infrastructure without writing a single line of code. Let infrastructure engineers focus on infrastructure and let LONI focus on code. Never restore a configuration or device from scratch again with our rollback feature. The power to leverage your smartphone, tablet, or smartwatch for the automation and management of your network, cloud, or IoT infrastructure. Instantly mitigate any cyber attack from your smartphone, tablet, or smartwatch. Automate and manage your security infrastructure with the power of mobile.
  • 36
    Infoblox Cloud Network Automation
    Chances are, your use of private, hybrid and multi-cloud architectures is becoming critical to business agility and efficiency. And yet the complexity of managing essential network services such as DNS can prevent you from realizing the full promise of the cloud. Automation at the network layer is fundamental to your success. Infoblox dramatically shortens the time needed for provisioning and deprovisioning critical network services in cloud and virtualized environments. Infoblox can deliver local, redundant (highly available) DDI services for every cloud instance at every location. Through the Cloud Platform Appliance flexible deployment architecture, critical network services can be deployed in a variety of ways to suit your unique requirements. In addition to the massive manual labor savings gained through task automation, Infoblox provides one central management GUI for all cloud network automation tasks, regardless of the number, size and geographical location of the clouds.
  • 37
    Cisco ACI
    Achieve resource elasticity with automation through common policies for data center operations. Extend consistent policy management across multiple on-premises and cloud instances for security, governance, and compliance. Get business continuity, disaster recovery, and highly secure networking with a zero-trust security model. Transform Day 2 operations to a more proactive model and automate troubleshooting, root-cause analysis, and remediation. Optimizes performance, and single-click access facilitates automation and centralized management. Extend on-premises ACI networks into remote locations, bare-metal clouds, and colocation providers without hardware. Cisco's Multi-Site Orchestrator offers provisioning and health monitoring, and manages Cisco ACI networking policies, and more. This solution provides automated network connectivity, consistent policy management, and simplified operations for multicloud environments.
  • 38
    TriOSS

    TriOSS

    Nayatel

    TriOSS is a GPON automation solution to perform user’s creation and service provisioning instantly, in FTTH networks. It saves operational costs in terms of technical man-hours, increases efficiency and drastically reduces provisioning and fault identification time, thus improving quality of service and customer experience. TriOSS acts as a black box that connects with the NMS (Network Management System) to perform its functions on both OLT (Optical Line Terminal) and ONT (Optical Network Terminal). Automated ONT configuration and service provisioning is available in real time as well as one-click configuration method. There are multiple options for Customer data management pertaining to a billing mechanism. You can choose from day-wise or time-dependent crones for implementation of all related functionalities.
  • 39
    Dash ComplyOps
    Dash ComplyOps provides security teams with a solution for building security programs in the cloud and meeting regulatory and compliance standards including HIPAA and SOC 2 Type 2. Dash enables teams to develop and maintain compliance controls across their IT infrastructure and cloud environments. Dash streamlines security and compliance operations, so your organization can easily manage HIPAA compliance. Security teams can save hundreds of man-hours a month by using Dash. Dash makes it easy to create administrative policies mapped to relevant regulatory standards and security best practices. Dash empowers teams to set and enforce high security and compliance standards. Our automated compliance process enables your team to set administrative and technical controls across your cloud environment. Dash continuously scans and monitors your cloud environment and connected security services for compliance issues, allowing your team to identify and resolve issues quickly.
  • 40
    Infinera Transcend Software Suite
    Transcend Software Suite, accessible, modular, application-based network automation. Transcend the current boundaries of your network's capabilities with Infinera's multi-layer, multi-domain, multi-vendor software suite. The Infinera Transcend Software Suite is a comprehensive software platform, offering network automation solutions that support operational simplification, resource optimization, and fast service delivery, enabling network transformation. Built on cloud-native technologies, Transcend unleashes the power of network automation through applications ranging from network discovery and path computation to closed-loop automation and analytics. Industry-proven open and modular solutions that are easy to deploy. Infinera is a global supplier of innovative networking solutions that enable enterprises, governments, carriers, and cloud operators to scale network bandwidth, accelerate service innovation, and automate network operations.
  • 41
    Batfish

    Batfish

    Batfish

    An open source network configuration analysis tool. Batfish finds errors and guarantees the correctness of planned or current network configurations. It enables safe and rapid network evolution, without the fear of outages or security breaches. Batfish was originally developed by researchers at Microsoft Research, UCLA, and USC. Many others have since contributed to it. It is currently maintained by Intentionet, who also offers Batfish Enterprise, a service that extends and enhances the core capabilities of Batfish. Analyze ACLs and firewalls rules using Batfish. Forwarding paths can be analyzed using traceroute and reachability queries. Analyze the impact of failures on the network and conduct Chaos Monkey style testing. Analyze routing tables computed by Batfish. Fast control plane analysis using an abstract representation. Network analysis in multivendor network with Cisco, Arista, Cumulus.
  • 42
    cBackup

    cBackup

    cBackup

    cBackup provides network equipment configuration data backup for multiple platforms and devices. We constantly add support for new devices and distribute it via our content delivery system. It is crucial not only to back up the configuration, but also to have version control to be able track changes. cBackup uses Git functionality to support diff and history for plain-text configurations. We create highly configurable environment, you can set up discovery and backup policies as well as customize hardware support. Don’t hesitate to share your customizations. Out of box English and Russian languages are supported. We are on Transifex and everyone is welcome to share their translations on more languages for more convenient tool. cBackup is released under AGPLv3 license and available for free use with no hidden payments or feature limitations. New device support and policies are also distributed free of charge.
    Starting Price: €480 per year
  • 43
    compliance.sh

    compliance.sh

    compliance.sh

    Built for startups, scale-ups and enterprises. don't let compliance slow you down. Our platform enables you to get compliant with any framework quicker than its ever been possible. Close deals faster with our AI security questionnaire automation. Our AI generates all of the answers based on your documentation and policies. Use AI to generate any policies you need for all of the common frameworks like ISO 27001, SOC 2 Type II, HIPAA, NIST and GDPR. Use the power of AI to respond to any questionnaire, in any format - all based on your policies and documentation. Use AI to generate any policy you need for any compliance framework with our generative artificial intelligence. Add any associated risks to your risk register, remediate, update and report on each risk under one roof.
  • 44
    Diligent Risk Intelligence Data
    Automated real-time monitoring and search tool for negative news, watchlist, sanction, and politically exposed person data. Protect your institution from reputational, AML, and financial crime risks. Diligent’s patented search and monitoring capability offers real-time, accurate negative news and risk information using machine learning and relevancy score calculation. Screen against 1400+ watchlists, sanctions, and embargo lists in real-time with our comprehensive screening capability. Utilize automated monitoring for sanctions, watchlists, and state-owned entities. Map beneficial ownership and detect risks during crises for customers and vendors. We are committed to providing a robust and secure service that protects all our customers’ data. Diligent’s Security Program is governed based on the NIST Cybersecurity Framework and Diligent follows ISO/IEC 27001 standards to keep information assets secure by implementing an Information Security Management System (ISMS).
  • 45
    ISMS.online

    ISMS.online

    Alliantist

    Compliance and control for multiple certifications, standards and regulations including ISO 27001, ISO 27701, ISO 22301 and GDPR. A pre-configured ISMS offering up to 77% progress for ISO 27001 the minute you log on. All the help you need with Virtual Coach, Assured Results Method, live customer support and an in-built knowledge base. We’ve developed a series of intuitive features and toolsets to save you time, money and hassle. With ISMS.online you can quickly achieve ISO 27001 certification and then maintain it with ease. Forget about time consuming and costly training. Our Virtual Coach video series is available 24/7 to guide you through. Save time with our pre-configured asset inventory – specifically compiled to reflect the most common information assets in ISO 27001 – or add your own. Assign team members to input and review details and track progress. You can even identify priorities based on the risk and financial value of your assets.
  • 46
    Scytale

    Scytale

    Scytale

    Scytale is the global leader in security compliance automation, helping companies get compliant and stay compliant with security frameworks like SOC 1, SOC 2, ISO 27001, HIPAA, GDPR, PCI-DSS, and more, without breaking a sweat. Our experts offer personalized guidance to streamline compliance, enabling faster growth and boosting customer trust. Simplify compliance with automated evidence collection and 24/7 control monitoring. Everything you need to get audit-ready 90% faster. Centralize, manage, and track workflows in one place. You can increase sales by showing proof of information security to customers. You can continue to do business as usual, and automate your SOC 2 project. Transform compliance into a well-organized process that allows you to track the status of your workflows. The ultimate automation platform that assists SaaS companies in achieving ISO 27001 and SOC 2 compliance.
  • 47
    SolarWinds Network Automation Manager
    Scale environments from 1,000 to tens of thousands of nodes with comprehensive performance, traffic, WAN, and switch port monitoring, automated change and configuration management, and IP address management in an integrated network automation software solution. NAM network automation software can provide insights into network fault, network availability, performance, bandwidth, configuration, and IP address management in a single console. No two networks are alike. Dashboards, maps, alerts, and reports are easily customized to accommodate the specifics of your environment. Enterprise network monitoring with do-it-yourself installation and deployment means you can be up and running faster without relying on professional services or consultants, so you can get back to the other projects on your list.
  • 48
    Nile

    Nile

    Nile

    Built from the ground up to deliver secure wired and wireless networking, as a service. It was re-engineered from the ground up to eradicate decades of costly complexities. A revolutionary new system built with 360° continuous monitoring and unprecedented levels of automation to arrive at a fully autonomous network experience. A system designed to increase reliability dramatically and to protect against advanced cyber attacks. We took these steps because we wanted to offer the most advanced wired and wireless LAN to serve as the backbone of a new network service, one that would forever shape enterprise networking and establish a new standard for Network as a Service (NaaS). Nile’s service is built on top of a system that eliminates complex operations like configuration and automates processes like upgrades and security patching. Customers are no longer burdened by the daily tasks of network operations.
  • 49
    Pica8 AmpCon
    Enterprise campus, distributed sites, and data center networks are replacing thousands of Cisco Catalyst switches with PicOS Software Switches on hardware provided by Dell and Edgecore. Through a single GUI, Pica8’s AmpCon™ Network Controller centrally manages and automates switch deployments as an alternative to Cisco DNA Center. Customers secure an increase in freedom and reduction in expense that every C-level executive will appreciate. Pica8’s AmpCon is a network controller that manages the lifecycle of any number of open network switches in enterprise campus and branch/retail office access networks. AmpCon comprises a set of server-based tools that enable enterprises to remotely install, configure and provision hundreds, or thousands, of PicOS Software, Switches deployed on white box switch hardware. It is the first network controller that leverages both advanced proprietary and open technology allowing network operators to run their networking software with full visibility.
  • 50
    FusionLayer

    FusionLayer

    FusionLayer

    Managing complex networks is a challenge where the cost of failure is enormous. FusionLayer collates all network data into a single source of truth for visibility and automation. On-premise, public clouds, and the cloud edges. Reassuring real-time information. Downtime can cost tens of millions a year. FusionLayer allows you to eliminate downtime through standardized processes and provides a single source of truth for network automation. Most organizations manage parts of their network data in spreadsheets. FusionLayer stores all network data in a single system, simplifying network automation. Managing network data in spreadsheets leads to network downtime, inability to automate, and a low level of security. FusionLayer allows you to eliminate these issues. From aviation to e-commerce, military to telecoms, FusionLayer ensures that the world’s leading organizations stay online and minimize expensive downtime.