+
+

Related Products

  • Unimus
    30 Ratings
    Visit Website
  • PathSolutions TotalView
    43 Ratings
    Visit Website
  • Site24x7
    894 Ratings
    Visit Website
  • NetBrain
    218 Ratings
    Visit Website
  • Domotz
    282 Ratings
    Visit Website
  • ManageEngine OpManager
    1,591 Ratings
    Visit Website
  • Syncro
    538 Ratings
    Visit Website
  • Cloudflare
    1,915 Ratings
    Visit Website
  • Device42
    173 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website

About

BackBox offers a simple way to intelligently automate the backup, restoration, and management of all devices on a network by providing centralized management of devices such as firewalls, routers, switches, and load balancers. Each of these devices plays a critical role in the availability and security of an organization’s network, and BackBox ensures they all continue to function effectively and effortlessly, streamlining operations for optimal performance. BackBox provides a foundation to harmonize the configuration between multiple devices, enabling seamless integration, and assuring compliance to organization or industry security policies, standards, or guidelines. IT administrators can easily employ BackBox to track configuration changes and see the deviation with the baseline for compliance validation and remediation.

About

JumpCloud® delivers a unified open directory platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform. Everything in One Platform Grant users Secure, Frictionless Access™ to everything they need to do their work however they choose. Manage it all in one unified view. Cross-OS Device Management Manage Windows, macOS, Linux, iOS, iPad, and Android devices. One Identity for Everything Connect users to thousands of resources with one set of secure credentials. Comprehensive Security Enforce device policies, patches, MFA, and other security and compliance measures. Automated Workflows Connect to whatever resources you need, including Microsoft Active Directory, Google Workspace, HRIS platforms, and more.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprises and managed service providers in need of an intelligent automation solution for their network and security devices

Audience

IT teams looking for a complete Cloud Management solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$9/user
Free Version
Free Trial

Reviews/Ratings

Overall 4.5 / 5
ease 4.5 / 5
features 4.2 / 5
design 4.0 / 5
support 4.8 / 5

Reviews/Ratings

Overall 5.0 / 5
ease 5.0 / 5
features 5.0 / 5
design 5.0 / 5
support 5.0 / 5

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

BackBox
Founded: 2009
United States
backbox.com/request-a-demo/

Company Information

JumpCloud
Founded: 2012
United States
jumpcloud.com

Alternatives

Unimus

Unimus

NetCore j.s.a. (Unimus)

Alternatives

Auth0

Auth0

Okta

Categories

Categories

IT Management Features

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

Network Security Features

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Automation Features

Compliance Monitoring
Configuration Backup
Configuration Changes
Network Orchestration
Performance Monitoring
Tool Access Control
Vulnerability Assessments

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IT Management Features

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

MSP Features

Backup Management
Billing & Invoicing
CRM
Dashboard
Help Desk
Issue Management
Live Chat
Patch Management
Privileged Access Management (PAM)
Project Management
Remote Access
Remote Systems Monitoring
Scheduling

Authentication Features

Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On

Cloud Management Features

Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval

Endpoint Protection Features

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

IT Service Features

Contract Management
Incident Management
IT Asset Management
Knowledge Management
Release Management
Self Service Portal
Service Catalog
Service Reporting
Ticket Management

Identity Management Features

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Password Management Features

Credential Management
Multifactor Authentication
Password Generator
Password Reset
Password Synchronization
Single Sign On
User Management

Policy Management Features

Approval Process Control
Attestation
Audit Trails
Policy Creation
Policy Library
Policy Metadata Management
Policy Training
Reporting / Analytics
Version Control
Workflow Management

Privileged Access Management Features

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Server Management Features

CPU Monitoring
Credential Management
Database Servers
Email Monitoring
Event Logs
History Tracking
Patch Management
Scheduling
User Activity Monitoring
Virtual Machine Monitoring

Single Sign On Features

Biometric
Credential Management
Identity Federation
Multifactor Authentication
Password Management
Policy Management
Social Sign On
User Management

Integrations

Adaptive Security
Avaya Cloud Office
Carbide
ChatBetter
Cypago
Files.com
Gigamon
Greenhouse
Hyperproof
ONTAP
Paessler PRTG
Paillor
Progression
Proofpoint Email Protection
ReadyMembership
Riverbed SteelHead
Satori
Slice
Unified.to
Vanta

Integrations

Adaptive Security
Avaya Cloud Office
Carbide
ChatBetter
Cypago
Files.com
Gigamon
Greenhouse
Hyperproof
ONTAP
Paessler PRTG
Paillor
Progression
Proofpoint Email Protection
ReadyMembership
Riverbed SteelHead
Satori
Slice
Unified.to
Vanta
Claim BackBox and update features and information
Claim BackBox and update features and information
Claim JumpCloud and update features and information
Claim JumpCloud and update features and information