+
+

Related Products

  • Unimus
    31 Ratings
    Visit Website
  • PathSolutions TotalView
    43 Ratings
    Visit Website
  • Site24x7
    909 Ratings
    Visit Website
  • NetBrain
    241 Ratings
    Visit Website
  • ManageEngine OpManager
    1,631 Ratings
    Visit Website
  • Domotz
    281 Ratings
    Visit Website
  • Cloudflare
    1,918 Ratings
    Visit Website
  • UTunnel VPN and ZTNA
    118 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • NinjaOne
    4,254 Ratings
    Visit Website

About

BackBox offers a simple way to intelligently automate the backup, restoration, and management of all devices on a network by providing centralized management of devices such as firewalls, routers, switches, and load balancers. Each of these devices plays a critical role in the availability and security of an organization’s network, and BackBox ensures they all continue to function effectively and effortlessly, streamlining operations for optimal performance. BackBox provides a foundation to harmonize the configuration between multiple devices, enabling seamless integration, and assuring compliance to organization or industry security policies, standards, or guidelines. IT administrators can easily employ BackBox to track configuration changes and see the deviation with the baseline for compliance validation and remediation.

About

Get your easy-to-use NTFS permissions tool to analyze and report NTFS security! Report NTFS permissions in a nicely formatted Excel sheet or HTML report. Report effective NTFS permissions owner to the owner of the data. Get User-specific effective NTFS permissions of a share or folder and its hierarchy. You can save any Permissions Report using Company Edition or Enterprise Edition to either a local built-in database or an external Microsoft SQL Server, to load it at any time to see the differences. Keep your NTFS Permissions Report clean and exclude any Active Directory security groups from the scan. There is no need to report the names of known accounts, e.g. backup operator or share operator. In case there are some special ACEs set to folders you can translate these security settings to meaningful labels.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprises and managed service providers in need of an intelligent automation solution for their network and security devices

Audience

IT teams in need of a network security solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

€997 per year
Free Version
Free Trial

Reviews/Ratings

Overall 4.5 / 5
ease 4.5 / 5
features 4.2 / 5
design 4.0 / 5
support 4.8 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

BackBox
Founded: 2009
United States
backbox.com/request-a-demo/

Company Information

G-TAC Software
India
www.foldersecurityviewer.com

Alternatives

Unimus

Unimus

NetCore j.s.a. (Unimus)

Alternatives

DSRAZOR for Windows

DSRAZOR for Windows

Visual Click Software
Quest ControlPoint

Quest ControlPoint

Quest Software
UQube

UQube

Upper Quadrant

Categories

Categories

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security Features

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

IT Management Features

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

Network Automation Features

Compliance Monitoring
Configuration Backup
Configuration Changes
Network Orchestration
Performance Monitoring
Tool Access Control
Vulnerability Assessments

Integrations

AppWall
Array APV Series
Bitdefender GravityZone
Check Point Infinity
Clearswift Secure Email Gateway
FireMon
Forescout
FortiGate NGFW
Imprivata
Nexpose
ONTAP
Proofpoint Email Protection
Radware DefensePro
RedSeal
Sophos Firewall
VMware ESXi
VMware NSX
VMware vCenter
WALLIX Bastion

Integrations

AppWall
Array APV Series
Bitdefender GravityZone
Check Point Infinity
Clearswift Secure Email Gateway
FireMon
Forescout
FortiGate NGFW
Imprivata
Nexpose
ONTAP
Proofpoint Email Protection
Radware DefensePro
RedSeal
Sophos Firewall
VMware ESXi
VMware NSX
VMware vCenter
WALLIX Bastion
Claim BackBox and update features and information
Claim BackBox and update features and information
Claim NTFS Permissions Reporter and update features and information
Claim NTFS Permissions Reporter and update features and information