Alternatives to SolarWinds Network Configuration Manager

Compare SolarWinds Network Configuration Manager alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to SolarWinds Network Configuration Manager in 2024. Compare features, ratings, user reviews, pricing, and more from SolarWinds Network Configuration Manager competitors and alternatives in order to make an informed decision for your business.

  • 1
    NinjaOne

    NinjaOne

    NinjaOne

    NinjaOne automates the hardest parts of IT, empowering more than 17,000 IT teams with visibility, security, and control over all endpoints. The NinjaOne platform increases productivity while reducing risk and IT costs. Organizations use NinjaOne, including its wide range of IT and security integrations, for use cases including endpoint management, patch management, mobile device management, software deployment, remote access, endpoint backup, and more.
    Leader badge
    Compare vs. SolarWinds Network Configuration Manager View Software
    Visit Website
  • 2
    Auvik

    Auvik

    Auvik Networks

    Auvik's cloud-based network management software gives you instant insight into the networks you manage, and automates complex and time-consuming network tasks. You get complete network visibility and control. Real-time network mapping & inventory means you'll always know exactly whats where, even as your users move. Automated config backup & restore on network devices means you'll mitigate network risk with no manual effort. And deep network traffic insights is a game changer.
    Compare vs. SolarWinds Network Configuration Manager View Software
    Visit Website
  • 3
    JS7 JobScheduler
    JS7 JobScheduler is an Open Source workload automation system designed for performance, resilience and security. It provides unlimited performance for parallel execution of jobs and workflows. JS7 offers cross-platform job execution, managed file transfer, complex no-code job dependencies and a real REST API. Platforms - Cloud scheduling from Containers for Docker®, Kubernetes®, OpenShift® etc. - True multi-platform scheduling on premises for Windows®, Linux®, AIX®, Solaris®, macOS® etc. - Hybrid use for cloud and on premises User Interface - Modern, no-code GUI for inventory management, monitoring and control with web browsers - Near real-time information brings immediate visibility of status changes and log output of jobs and workflows - Multi-client capability, role based access management High Availability - Redundancy and Resilience based on asynchronous design and autonomous Agents - Clustering for all JS7 products, automatic fail-over and manual switch-over
    Partner badge
    Compare vs. SolarWinds Network Configuration Manager View Software
    Visit Website
  • 4
    ManageEngine OpManager
    OpManager is a network management tool geared to monitor your entire network. Ensure all devices operate at peak health, performance, and availability. The extensive network monitoring capabilities lets you track performance of switches, routers, LANs, WLCs, IP addresses, and firewalls. Monitor the finer aspects of your network with: Hardware monitoring enables CPU, memory, and disk monitoring, for efficient. performance of all devices. Perform seamless faults and alerts management with real-time notifications and detailed logs for quick issue detection and resolution. Achieve network automation, with workflows enabling automated diagnostics and troubleshooting actions. Advanced network visualization-including business views, topology maps, heat maps, and customizable dashboards give admins an at-a-glance view of network status. 250+ pre-built reports covering metrics like device performance, network usage, uptime, facilitate capacity planning and improved decision-making.
    Compare vs. SolarWinds Network Configuration Manager View Software
    Visit Website
  • 5
    BackBox

    BackBox

    BackBox

    BackBox offers a simple way to intelligently automate the backup, restoration, and management of all devices on a network by providing centralized management of devices such as firewalls, routers, switches, and load balancers. Each of these devices plays a critical role in the availability and security of an organization’s network, and BackBox ensures they all continue to function effectively and effortlessly, streamlining operations for optimal performance. BackBox provides a foundation to harmonize the configuration between multiple devices, enabling seamless integration, and assuring compliance to organization or industry security policies, standards, or guidelines. IT administrators can easily employ BackBox to track configuration changes and see the deviation with the baseline for compliance validation and remediation.
    Compare vs. SolarWinds Network Configuration Manager View Software
    Visit Website
  • 6
    PathSolutions TotalView
    PathSolutions TotalView network monitoring and troubleshooting software bridges the gap between NETWORK MONITORING and TROUBLESHOOTING RESOLUTION telling you WHEN, WHERE and WHY network errors occur. PathSolutions TotalView continuously monitors and tracks the performance of every device and every link in your entire network, going deeper than other solutions by collecting error counters, performance data, configuration information and connectedness. A built-in heuristics engine analyzes all of this information to produce plain-English answers to problems. This means that complex problems can be solved by junior level engineers leaving the senior level engineers to work on more strategic level projects. The core product includes everything needed to run a perfectly healthy network: Configuration management, server monitoring, cloud service monitoring, IPAM, NetFlow, path mapping, and diagramming. Get Total Network Visibility on your network and solve more problems faster.
    Leader badge
    Partner badge
    Compare vs. SolarWinds Network Configuration Manager View Software
    Visit Website
  • 7
    NetBrain

    NetBrain

    NetBrain Technologies

    NetBrain, founded in 2004, provides a powerful no-code automation platform for hybrid network observability, allowing organizations to enhance their operational efficiency through automated workflows. The platform applies automation across three key workflows: troubleshooting, change management, and assessment. Get network-wide and contextualized analysis across your multi-vendor, multi-cloud network Visualize and document the entire hybrid network using dynamic network maps and end-to-end paths Automate network discovery and ensure data accuracy for a single source of truth Auto-discover and decode your network's golden configurations, discover day 1 issues, and automate configuration drift prevention Automate pre- and post-validations for network changes with application performance context understanding Automate collaborative troubleshooting from human to machine For every network troubleshooting idea, create a map, apply automation from your own library
  • 8
    Cruz Operations Center (CruzOC)
    CruzOC is a scalable multi-vendor network management and IT operations tool for robust yet easy-to-use netops. Key features of CruzOC’s integrated and automated management include performance monitoring, configuration management, and lifecycle management for 1000s of vendors and converging technologies. With CruzOC, administrators have implicit automation to control their data center operations and critical resources, improve network and service quality, accelerate network and service deployments, and lower operating costs. The result is comprehensive and automated problem resolution from a single-pane-of-glass. Cruz Monitoring & Management. NMS, monitoring & analytics -- health, NPM, traffic, log, change. Automation & configuration management -- compliance, security, orchestration, provisioning, patch, update, configuration, access control. Automated deployment -- auto-deploy, ZTP, remote deploy. Deployments available on-premise and from the cloud.
  • 9
    SaltStack

    SaltStack

    SaltStack

    SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure—on-prem, in the cloud, or at the edge. It’s built on a unique and powerful event-driven automation engine that detects events in any system and reacts intelligently to them, making it an extremely effective solution for managing large, complex environments. With the newly launched SecOps offering, SaltStack can detect security vulnerabilities and non-compliant, mis-configured systems. As soon as an issue is detected, this powerful automation helps you and your team remediate it, keeping your infrastructure securely configured, compliant, and up-to-date. The SecOps suite includes both Comply and Protect. Comply scans and remediates against CIS, DISA-STIG, NIST, PCI, HIPAA compliance standards. And Protect scans for vulnerabilities and patches and updates your operating systems.
  • 10
    Skybox Security

    Skybox Security

    Skybox Security

    The Skybox approach to risk-based vulnerability management starts with fresh vulnerability data from your entire network — physical IT, multi–cloud and operational technology (OT). Skybox uses a wide range of sources, including asset and patch management systems and network devices, to assess vulnerabilities without a scan. We also collect, centralize and merge data from multiple scanners to give you the most accurate vulnerability assessments on demand. Centralize and enhance vulnerability management processes from discovery to prioritization and remediation. Harness the power vulnerability and asset data, as well as network topology and security controls. Use network modeling and attack simulation to find exposed vulnerabilities. Augment vulnerability data with intelligence on the current threat landscape. Know your best remediation option, including patching, IPS signatures and network–based changes.
  • 11
    ManageEngine Network Configuration Manager
    Network Configuration Manager is a multi-vendor network change, configuration and compliance management (NCCM) solution for switches, routers, firewalls and other network devices. NCM helps automate and take total control of the entire life cycle of device configuration management. Schedule device configuration backups, track user activity and spot changes by comparing configuration versions all from a centralized web GUI. Monitor configuration changes, get instant notifications and prevent unauthorized changes to make your networking environment secure, stable and compliant. Define standard practices and policies, check device configurations for violations and readily apply remedial measures to ensure device compliance. Save time by automating repetitive, time-consuming configuration management tasks and also by centrally applying configuration changes to devices in bulk.
  • 12
    Wireshark

    Wireshark

    Wireshark

    Wireshark is the world’s foremost and widely-used network protocol analyzer. It lets you see what’s happening on your network at a microscopic level and is the de facto (and often de jure) standard across many commercial and non-profit enterprises, government agencies, and educational institutions. Wireshark development thrives thanks to the volunteer contributions of networking experts around the globe and is the continuation of a project started by Gerald Combs in 1998. Wireshark® is a network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. It has a rich and powerful feature set and is world’s most popular tool of its kind. It runs on most computing platforms including Windows, macOS, Linux, and UNIX. Network professionals, security experts, developers, and educators around the world use it regularly. It is freely available as open source, and is released under the GNU General Public License version 2.
  • 13
    AlgoSec

    AlgoSec

    AlgoSec

    Discover, map and migrate business application connectivity to the cloud. Proactively analyze security risk from the business perspective Automate network security policy changes - with zero touch Link cyber-attacks to business processes. Automatically discover, map, and securely provision network connectivity for business applications. Manage on-premise firewalls and cloud security groups in a single pane of glass. Automate the security policy change process – from planning through risk analysis, implementation and validation. Proactively assess every security policy change to minimize risk, avoid outages and ensure compliance. Automatically generate audit-ready reports and reduce audit preparation efforts and costs by up to 80%. Clean up firewall rules and reduce risk – without impacting business requirements.
  • 14
    IBM Netcool Operations Insight
    IBM® Netcool® Operations Insight powered with AI and Machine learning capabilities helps reduce event noise, automatically groups events related to the same problem and provides relevant context for faster resolution, allowing you to work smarter, not harder. It provides a consolidated view across your local, cloud and hybrid environments and delivers actionable insight into the performance of services and their associated dynamic network and IT infrastructures. You can now modernize and simplify your IT Operations with greater insight into highly dynamic environments, and option for containerized deployment on IBM Cloud Private.
  • 15
    SolarWinds Kiwi CatTools
    Powerful network automation and configuration management software. Affordable network configuration management for small business networks. Schedule automatic backup activities and roll out configuration changes to multiple devices at the same time. Pre-schedule changes to your network device configurations to occur only on the devices you choose, and only when you want them to. Get alerted on changes to your network equipment so you can head off any malicious activities. Quickly rollback configuration changes when needed to avoid issues before their impact is felt. Schedule automated backups of network device configuration from routers, switches, firewalls, etc. Managing one-off config changes isn’t easy, not to mention the impact a minor issue can have on your entire network. Simultaneously perform or schedule configuration changes across multiple network devices with great ease. Changes to config files, outside of your knowledge, could be a sign of something insidious.
  • 16
    Restorepoint

    Restorepoint

    ScienceLogic

    Restorepoint enables organizations to increase availability, security and compliance by automating critical tasks across their multi-vendor infrastructures Restorepoint automates network configuration backup, recovery, compliance analysis, and change management for more than 100 network and security vendors. Save hours of network administration, auditing time, and reduce risk by using a single solution for multi-vendor management. Meet internal, best practice or external network security standards such as PCI, GDPR, ITIL, ISO27001, NIST, SOX and HIPAA. Automate network change processes, make complex network configuration changes in seconds, and see the results. Automatically discover manage and track your network assets. Forget about maintaining network asset management spreadsheets. Save hours of administration per week, backup network configurations without complex scripts or manual process.
  • 17
    Itential

    Itential

    Itential

    Itential is the only automation and orchestration solution built to support both network and cloud, making it easy for enterprise and service provider organizations to maintain network compliance, reduce manual operations, and simplify network management. The Itential Automation Platform is a low-code solution that seamlessly connects IT systems with network technologies for end-to-end network configuration, compliance, and automation. With Itential’s industry-leading patented network automation and orchestration solutions, network and cloud teams can: • Consolidate, Organize & Modernize Your CLI Automation Assets • Use Pre-Built Automations or Design & Build Your Own Automation Workflows • Backup, Manage, & Validate Network Configurations • Integrate with Everything in Your Environment • Manage, Measure, & Scale Automation Across your Organization
  • 18
    TrueSight Automation for Networks
    Network configuration and automation for better agility, security, and efficiency. Includes automated vulnerability management to analyze vulnerabilities, enhance visibility, and respond to threats across network devices. Leverage integration with vendor and NIST National Vulnerability DB security notifications to identify vulnerabilities, remediate device images, and upgrade devices with zero downtime. Drive fast configuration changes across thousands of network devices with automated roll-back and change tracking. Control device access to view or change settings, deploy pre-configured policies for regulatory standards such as CIS and DISA and remediate non-compliance. Deploy new physical or virtual network devices rapidly with gold-standard configurations to respond to business needs. Browse real-time device configurations to troubleshoot, view status of jobs, or complete a compliance audit.
  • 19
    Unimus

    Unimus

    Unimus

    We aim to make automation, disaster recovery, change management and configuration auditing painless and affordable for a network of any size. Deploying Unimus to manage your entire network requires only minutes, allowing for rapid deployment without headaches. Unimus was designed to be as simple and intuitive as possible, with no need to spend hours reading pages of documentation. A web GUI makes it fast and comfortable to work with Unimus. No need to learn a CLI or deal with configuration files. Unimus is developed using modern technology and conforms to modern application architecture and security principles. Unimus uses application-layer encryption of sensitive data, helping with compliance without the need for database-level encryption.
    Starting Price: $5.90 per device per year
  • 20
    Pliant

    Pliant

    Pliant.io

    Pliant’s solution for IT Process Automation simplifies, streamlines, and secures how teams build and deploy automation. Reduce human error, ensure compliance, and elevate your efficiency, with Pliant. Ingest existing automation and write new automation with single-pane orchestration. Ensure compliance using consistent, practical built-in governance. Pliant has abstracted thousands of vendor APIs to create intelligent action blocks allowing users to drag-and-drop blocks, rather than writing and rewriting lines of code. From a single platform, citizen developers are able to build consistent and meaningful automation across platforms, services, and applications in minutes — maximizing value across the entire technology stack in one place. ​With​ ​our​ ​ability​ ​to​ ​add​ ​new​ ​APIs​ ​in​ ​15​ ​business​ ​days,​ ​anything that​ ​is​ ​not​ ​already​ ​out​ ​of​ ​the​ ​box​ ​will​ ​be​ ​in​ ​an​ ​industry​ ​leading​ ​timeframe.
  • 21
    Cisco Prime Network
    Cisco Prime Network is a cost-effective device operation, administration, and network fault-management solution. This single solution helps service providers reduce management complexity and deliver carrier-class services. It supports the physical network components as well as the compute infrastructure, and virtual elements found in data centers. Increased operational efficiency through automated network discovery, configuration and change management. Enhanced customer satisfaction through proactive service assurance using postevent fault management and trend information. Lower integration costs through preintegration with Cisco Prime Carrier Management suite and northbound interfaces to third party applications. Detailed end-to-end views of the physical and virtual network topology and inventory. GUI-based device configuration with prebuilt and downloadable scripts. Up-to-date displays of network event, state, and configuration changes.
  • 22
    racksnet

    racksnet

    racksnet

    With racksnet® you can effortlessly automate your IT network, whether in WAN, campus, data center or IoT. The smart and convenient network automation software relieves your IT staff of all those tiresome, repetitive and time-consuming tasks. Our customers decide when, where and how and on which site controllers they perform tasks. Complete independence of time and place. Important network tasks can be planned and configured during core working hours and rolled out on weekends, for example. There are no measures required on site, that means at the location itself, for the provision of network resources. All configurations are deployed via the racksnet® Cloud. In separating hardware and software, the open networking technology of racksnet® goes significantly over and above the possibilities of conventional systems.
  • 23
    UVexplorer

    UVexplorer

    UV Networks

    UVexplorer PRO automatically and quickly discovers all of the information about the devices on your network and the connections between them. UVexplorer creates network maps for documentation, meetings, presentations, sharing with your boss, or hanging on the wall. Export UVexplorer's automated network maps to PRTG, LucidChart, Microsoft Visio™, PDF, and SVG file types. UVexplorer also backups and provides change notifications for configurations of your network devices, such as routers, switches, and firewalls. Track how device configurations change over time. With UVexplorer's PRTG Connector, add powerful network discovery, detailed device inventory, and automatic network maps to PRTG Network Monitor. Capture detailed device and network inventory information to help meet documentation requirements of governmental regulations like PCI, HIPAA, FISMA, SOX, etc. Analyze and solve network and device problems with UVexplorer's suite of diagnostic tools.
  • 24
    Ansible

    Ansible

    Red Hat

    Ansible is a radically simple automation engine that automates cloud provisioning, configuration management, application deployment, intra-service orchestration, and many other IT needs. Ansible Automation Platform has grown over the past years to provide powerful automation solutions that work for operators, administrators and IT decision makers across a variety of technology domains. It’s a leading enterprise automation solution from Red Hat®, a thriving open source community, and the de facto standard technology of IT automation. Scale automation, manage complex deployments, and speed productivity with an enterprise automation platform that can be used across entire IT teams. Red Hat or partner consulting services help you advance your end-to-end automation journey for faster time to value.
  • 25
    Resolve

    Resolve

    Resolve Systems

    Resolve is the #1 IT automation and orchestration platform, powering more than a million automations every day from simple, high-volume tasks to incredibly complex processes that go well beyond what you imagine is automatable. With more than a decade of automation expertise under our belts, we know how to build an intelligent automation and orchestration platform to meet the growing demands faced by today’s IT Operations and Network Operations teams. In fact, millions of automations are powered by Resolve on a daily basis… many of which go well beyond what you imagine is automatable. We know it sounds impossible, but it’s true. Just ask the customers who have cracked the code on tough automations like PIM testing, updating active load balancers, CUCM onboarding in seconds, true end-to-end patch management, interacting with Watson for NLP, maintaining infrastructure in segregated networks and hybrid cloud deployments, and more. Keep reading to see how we do it.
  • 26
    WeConfig

    WeConfig

    Westermo

    WeConfig makes network configuration and maintenance more efficient, simple and reliable. Many hours of work can be saved in the initial installation, as well as in ongoing maintenance throughout the life of the network. Time-consuming tasks can be automated and configuration updates can be deployed in bulk. WeConfig minimizes the risk of configuration errors and makes it simple to optimize network security. A properly configured and monitored network with simple and robust maintenance processes will minimize any risk of network downtime.Cyber security deployment and analysis. Simple deployment of system wide security features minimises the risk for unauthorized access. Security analysis lets you find and fix network vulnerabilities. WeConfig makes it easy to create and maintain a robust network security standard. Diagnostic tools for high network reliability. WeConfig makes your network transparent and gathers all information in one place.
  • 27
    rConfig

    rConfig

    rConfig

    rConfig is an open source network device configuration management utility that takes frequent configuration snapshots of devices. Open source, and built by Network Architects. We know what you need! rConfig is completely open source. Event the professional version. Built on top of world class open source software (Laravel & Vuejs), It is extensible, and you can participate in its development. Take snapshots of your routing table, mac, arp tables, as well as running configs and any other show commands. Get your network device's status for any point in time. rConfig allows you to deliver configs much faster throughv intuative, and simple automation capabilties. rConfig has implemented enhanced security to protect your assets with more coming in future releases. Such as SSO, config encryption & MFA. Add customizations, contribbute to rConfig, or purchase support for priority feature addition to your rConfig installations.
  • 28
    Lan-Secure Configuration Center
    Configuration Center is a network configuration management software that allows controlling and maintaining changes of network devices configuration from any vendor supporting Telnet SSH and SNMP version 1/2/3 protocols. It provides backup configurations, monitor history changes, compare changes and restore configurations of network devices. The software overcomes the need of using several vendor specific configuration tools in multi vendor devices environment and helps to control and reduce configuration errors in IT environments. Configuration Center software can monitor any number of devices from any network location using Telnet and SSH shell protocols and SNMP version 1/2/3 protocols. The software monitoring engine can be operated manually by user request or run automatically on specific dates and times. It can provide automatic actions such as executing commands, sending SNMP traps or email notifications on specific configuration changes.
  • 29
    opConfig

    opConfig

    Opmantek

    opConfig can automate everything from config push to alerting on changes and enforcing compliance. Introduce operational delegation to your organization and allow the troubleshooting of your network devices without giving 'root' access. Implement your compliance policy with PCI-DSS, HIPPA, COBIT and more using prebuilt industry standard rule sets (eg Cisco-NSA) or customize your own. Collects and backs-up configuration information in all environments, all vendors hardware and software, cloud-based, on-premise and hybrid. opConfig gives you the ability to create robust command sets that can aid in root cause analysis of faults. Our software solutions scale horizontally and vertically. We have provided monitoring and management solutions for over 200k nodes. Compare configuration data with older versions or against other devices. Use compliance policies as a task sheet to ensure all devices are compliant.
  • 30
    ThirdEye

    ThirdEye

    LogicVein

    ThirdEye by LogicVein includes advanced network configuration and change management (NCCM) capabilities and network monitoring system (NMS) for large enterprise data centers. ThirdEye is an integrated and cloud ready solution. Including the tools, reporting, automation and integration capabilities you need in a low cost and easy to use package. With ThirdEye, you will reduce cost, save time, manage your configurations and changes, in addition, be alerted if there are any issues with your devices. ThirdEye has all the features and functions of Net LineDancer, with enhanced additional features that allow you to monitor, alert and generate traps on devices. All the features you have in Net LineDancer, you still have in Thirdeye, but with the additional enhanced features of performance monitoring and alarming. By creating a dashboard for each site or system, you can check the monitoring status for each site at a glance.
  • 31
    WatchTower Security Management App
    Monitor your network with Check Point’s WatchTower Security Management app and quickly mitigate security threats on the go with your mobile phone. The intuitive WatchTower Security Management App provides real-time monitoring of network events, alerts you when your network is at risk, enables you to quickly block security threats, and configure the security policy for multiple gateways. View the devices connected to your network and any potential security threats. Real-time notification of malicious attacks or unauthorized device connections. Quickly block malware-infected devices and view infection details for further investigation. Customize notifications for your top-priority security events. View all security events by category and drill down for further information. Configure the security settings for multiple gateways. Manage advanced security policy settings securely via web user interface.
  • 32
    Cisco DNA Center
    Cisco DNA Center is the network management and command center for Cisco DNA, your intent-based network for the enterprise. Provision and configure all your network devices in minutes. Use advanced artificial intelligence (AI) and machine learning (ML) to proactively monitor, troubleshoot, and optimize your network. Integrate with third-party systems for improved operational processes.​ Cisco DNA Center is a powerful network controller and management dashboard that can help you take charge of your network, optimize your Cisco investment, and lower your IT spending. Translate business intent into zero-trust network policies. Identify all endpoints and optimize user experience based on business requirements. Automate deployment and management of network devices and integration of security solutions, to promote consistency across configurations, reduce errors, and save time.
  • 33
    Palo Alto Networks Panorama
    Panorama™ offers easy-to-implement, centralized management features that provide insight into network-wide traffic and simplify configurations. Create and edit security rules in accordance with your organization’s security policy, across your firewall deployment, from one central location. Gain visibility and actionable insights into network traffic and threats via the Application Command Center (ACC) for comprehensive security management and protection. Leverage the automated correlation engine to reduce data clutter so you can identify compromised hosts and surface malicious behavior more quickly. Manage up to 5,000 Next-Generation Firewalls, or use the Panorama Interconnect plugin to centralize configuration management for tens of thousands of devices. Panorama simplifies security with an intuitive UI that can be used to monitor, configure and automate security management.
  • 34
    Net LineDancer
    Net LineDancer (NetLD) is a sophisticated but simplistic and easy to use NCCM software designed to help network engineers manage the configurations on the network devices (routers, switches, etc.) in their enterprises. This is great solution for managing your network from a single location even if your network has multiple subnets with overlapping IP spaces. Provides an integrated Terminal Proxy that allows users already authenticated into Net LineDancer to SSH/Telnet into network devices. Full hardware inventory for audit including daughter card serial numbers, as well as power-supplies, and even fan tray assemblies. Cisco PnP devices, in combination with a Cisco PnP-compliant server, can provide “hands free” configuration of new equipment in your network.
  • 35
    Forward Enterprise

    Forward Enterprise

    Forward Networks

    Forward Enterprise documents, searches, verifies, and predicts the behavior of your network by creating an always-accurate software copy of your entire network infrastructure for both on-prem and cloud. With available REST APIs, it easily integrates into your existing network management workflow and tools. Forward Enterprise can be deployed on-prem or via cloud hosting for complete implementation flexibility. Automatically create an always-accurate network diagram with full details about the topology of your environment. Access a complete inventory of your hardware and software across vendors, platforms and versions. Visualize the network-wide L2, L3 and L4 state of your network and all device configurations. Search network behavior, configuration and state network-wide with an intuitive and powerful tool. Find any device on your network, including its connections and all forwarding behavior for fast root-cause isolation and incident remediation.
  • 36
    Gluware

    Gluware

    Gluware

    Gluware brings a powerful layer of intelligence to today’s complex, multi-vendor enterprise networks so organizations can automate their networks at scale—code-free and error-free. Large global enterprise teams trust Gluware’s proven Intent-Based Networking system and off-the-shelf software package to help them safeguard their mission-critical networks and ensure business continuity. The GluwareⓇ Device Manager application helps large organizations quickly execute network device auto-discovery across their entire network, no matter how large or complex. Gluware Device Manager intelligently interrogates your network to build a database of your device inventory that includes hi-resolution details critical to automating your entire network code-free and at scale.
  • 37
    FireMon

    FireMon

    FireMon

    Maintaining a strong security and compliance posture requires comprehensive visibility across your entire network. See how you can gain real-time visibility and control over your complex hybrid network infrastructure, policies and risk. Security Manager provides real-time visibility, control, and management for network security devices across hybrid cloud environments from a single pane of glass. Security Manager provides automated compliance assessment capabilities that help you validate configuration requirements and alert you when violations occur. Whether you need audit reports ready out-of-the-box or customizable reports tailored to your unique requirements, Security Manager reduces the time you spend configuring policies and gives you the confidence that you’re ready to meet your regulatory or internal compliance audit demands.
  • 38
    Junos Security Director

    Junos Security Director

    Juniper Networks

    Security Director is your portal to SASE, bridging your current security deployments with your future SASE rollout. Security Director enables organizations to manage security anywhere and everywhere, on-premise and in the cloud with unified policy management that follows users, devices, and applications wherever they go. Policies can be created once and applied everywhere. Customers can use both Security Director Cloud and on-premises instances simultaneously to securely transition to a SASE architecture. Security Director provides extensive security policy management and control through a centralized interface and enforces policies across physical, virtual, and containerized firewalls on-premises and across multiple clouds simultaneously. Quickly manage all phases of the security policy lifecycle for firewalls, including zero-touch provisioning and configuration, and gain insight into sources of risk across your network.
  • 39
    cBackup

    cBackup

    cBackup

    cBackup provides network equipment configuration data backup for multiple platforms and devices. We constantly add support for new devices and distribute it via our content delivery system. It is crucial not only to back up the configuration, but also to have version control to be able track changes. cBackup uses Git functionality to support diff and history for plain-text configurations. We create highly configurable environment, you can set up discovery and backup policies as well as customize hardware support. Don’t hesitate to share your customizations. Out of box English and Russian languages are supported. We are on Transifex and everyone is welcome to share their translations on more languages for more convenient tool. cBackup is released under AGPLv3 license and available for free use with no hidden payments or feature limitations. New device support and policies are also distributed free of charge.
  • 40
    Cellwize

    Cellwize

    Cellwize

    Cellwize CHIME is all about enabling the networks of the future today. It is a cloudified and AI-driven RAN automation and orchestration platform that enables MNOs to accelerate 5G network deployment and go-to-market. Easily gain clarity into network configuration needs, quickly and accurately resolve performance issues, transform business processes with closed loop automation. For data collection, enrichment, and distribution, addressing multiple needs & use cases. Enabling self-development of algorithms and apps and connecting them to the RAN through open APIs.
  • 41
    NetMRI

    NetMRI

    Infoblox

    Network infrastructures are now more complex than ever–increasingly diverse, siloed and powered by multiple vendors. IT admins often struggle to meet escalating demands for service delivery and reliability in these environments. Infoblox NetMRI can help. It’s a network change and configuration management solution that automates routine workflows such as device provisioning and security operations, enabling tighter compliance, faster incident response and quicker app deployment. Automatically discover all devices on your network, where they reside and how they link together. Proactively monitor and analyze network configurations to identify configuration problems early. Rapidly provision new services and implement network modifications in minutes instead of days or weeks with NetMRI’s automated management tools.
  • 42
    NetYCE

    NetYCE

    NetYCE

    The NetYCE platform is not an application, so it's the perfect choice when you require flexibility and agility with lots of room to grow. It is Full Stack, which means it comes out-of- the-box with extensive built-in functionality for configuration management, advanced monitoring and standard automation use cases. It also offers intent-based automation and the flexibility to implement your own logic and design rules. It's fully API-driven, open and easy to maintain. Insight into all your network configuration changes. Automated validation of policies and rules across your entire network. Auto-mitigate non-compliance and drive more changes through network automation. Enforce network intent through integrated inventory, design modelling and collaboration. NetYCE enables organizations to easily build network automation solutions that are manageable, scalable and secure. Its full-stack platform and unique implementation approach ensure fast results without risk.
  • 43
    Anuta ATOM

    Anuta ATOM

    Anuta Networks

    Accelerate your automation journey with Anuta ATOM. Monitoring & Closed-Loop Automation for Multi-Vendor Networks. Automate and Monitor your multi-vendor network with one single integrated solution. Anuta ATOM supports all major vendors, including Cisco, Juniper, Arista, F5 and many more. Didn’t find the network vendor you are looking for? Anuta ATOM’s super extensible framework enables a quick turnaround time of 2-6 weeks for vendor addition. IPAM, ITSM tools, or public cloud integrations – ATOM supports it all. ATOM supports tight integration to ecosystem vendors to enhance your network automation. Ensure network compliance with ATOM’s remediation capabilities. ATOM offers accurate configurations for non-compliant policies pushed on-demand or scheduled to keep your network 100% compliant. Run on-demand & scheduled multi-vendor compliance checks to understand your configuration consistency. Use ATOM to run compliance checks against a group of devices or a region.
  • 44
    LONI

    LONI

    LONI

    Take action instantly from anywhere. Real-time vendor-agnostic network management tool for your existing network, security, & cloud infrastructure with the power of true ZeroCode automation. Unified management, automation, intelligence, and operations for your security, cloud, network, and IOT infrastructure. Single source of truth for actionable data. Manage any device with an IP address. Automate any task in your IT infrastructure without writing a single line of code. Let infrastructure engineers focus on infrastructure and let LONI focus on code. Never restore a configuration or device from scratch again with our rollback feature. The power to leverage your smartphone, tablet, or smartwatch for the automation and management of your network, cloud, or IoT infrastructure. Instantly mitigate any cyber attack from your smartphone, tablet, or smartwatch. Automate and manage your security infrastructure with the power of mobile.
  • 45
    TriOSS

    TriOSS

    Nayatel

    TriOSS is a GPON automation solution to perform user’s creation and service provisioning instantly, in FTTH networks. It saves operational costs in terms of technical man-hours, increases efficiency and drastically reduces provisioning and fault identification time, thus improving quality of service and customer experience. TriOSS acts as a black box that connects with the NMS (Network Management System) to perform its functions on both OLT (Optical Line Terminal) and ONT (Optical Network Terminal). Automated ONT configuration and service provisioning is available in real time as well as one-click configuration method. There are multiple options for Customer data management pertaining to a billing mechanism. You can choose from day-wise or time-dependent crones for implementation of all related functionalities.
  • 46
    Entuity

    Entuity

    Park Place Technologies

    We know how important it is to support diverse network environments. With Entuity™ Software you can discover, monitor, manage, and optimize your entire network across countless devices supplied by a whole host of different vendors. Entuity™ supports thousands of devices out of the box across hundreds of vendors. Entuity automates network discovery and uses intuitive workflows that make it easy to see when something has gone wrong. Responsive dashboards allow you to take a high-level view to gauge your network health or drill down to the component level to quickly and efficiently fix network problems. Keeping network availability high and reducing mean time to repair (MTTR) is critical to business. With data volumes doubling every two years, you need network management software that simplifies the process of managing, monitoring and analyzing your network data.
  • 47
    6connect

    6connect

    6connect

    Revolutionary network automation & provisioning for ISP's and enterprises around the world. Easy to deploy and integrate with, whether you use the 6connect cloud or deploy ProVision behind the firewall. Regain your sanity. Avoid the costly pitfalls of ad hoc solutions and manual network resource management. Global resource management, complete IPAM automation, easy management of DNS, DNSSEC, and DHCP. Flexible data model that seamlessly supports multi-tenant permissions, works with RADIUS, LDAP, 2FA, SAML2. Integrates, synchronizes and automates workflows over a dozen DNS platforms. Also makes migrations a snap! Easy DHCP configuration and scope management that integrates with other systems. From allocation to assignment, from CGN to IPv6, ProVision knows how to handle IPs. Carrier-grade API for easy integration across global system, fast, well documented and tested. Easy to use Peering workflows built-in – from email to BGP config pushes to reporting, it’s all there.
  • 48
    Netbox Cloud

    Netbox Cloud

    NetBox Labs

    Spreadsheets are like swiss army knives: Ok for many things but excellent for none. The NetBox Cloud data model helps you to avoid the manual errors and duplication created by spreadsheets by enforcing physical and logical rules about your network. NetBox Cloud’s central database allows anyone to query any data at any time and get a consistent, accurate answer. Join a fast growing group of users who are using NetBox Cloud to drive their Network Automation initiatives. Use NetBox Cloud as the foundation to drive device provisioning, automated testing, monitoring updates and more. Every action in NetBox Cloud is recorded in an audit log, making it dead simple to figure out what happened after the fact. NetBox Cloud also inherits NetBox’s powerful automated reporting capabilities, so you gain insight quickly, and satisfy the needs of your stakeholders without losing time.
  • 49
    Syxense Manage
    Syxsense Manage lets users see and manage all endpoints inside and outside the network with coverage for all major operating systems and endpoints, including IoT devices. Syxsense provides users with a complete view of their IT infrastructure with an intuitive interface, and all-inclusive features. The service is designed to provide full endpoint intelligence with OS, hardware, and software inventory details. Know if patches are missing or security standards are compromised. Critical devices are color coded in the datagrid, dashboards, and reports. Use sites, queries, and groups to target and view devices in logical subsets. Scan and prioritize security and patching priorities relative to exposed risk. Find out which patches have been released, their severity, and if vulnerabilities are being exploited. Automated Maintenance and Blackout Windows protect business productivity while deploying updates.
  • 50
    TrueSight Automation for Servers
    TrueSight Automation for Servers manages security vulnerabilities and provisions, configures, patches, and secures physical, virtual, and cloud servers. Cross-platform server automation for better security, compliance, agility, and scalability. Threat remediation: Includes automated vulnerability management to rapidly analyze security vulnerabilities, obtain necessary patches, and take corrective action. Patching: Real-time visibility to patch compliance, automate maintenance windows and change management processes. Compliance: Integrate role-based access control, pre-configured policies for CIS, DISA, HIPAA, PCI, SOX documentation and remediation. Configuration: Harden deployments at time of provisioning and in production, detect and remediate drift, and manage change activities to ensure stability and performance. Service provisioning: Automated build-out of service or application from VM provisioning to fully operational.