+
+

Related Products

  • Unimus
    30 Ratings
    Visit Website
  • PathSolutions TotalView
    43 Ratings
    Visit Website
  • Site24x7
    894 Ratings
    Visit Website
  • NetBrain
    218 Ratings
    Visit Website
  • ManageEngine OpManager
    1,591 Ratings
    Visit Website
  • Domotz
    282 Ratings
    Visit Website
  • Syncro
    538 Ratings
    Visit Website
  • Cloudflare
    1,915 Ratings
    Visit Website
  • Device42
    173 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website

About

BackBox offers a simple way to intelligently automate the backup, restoration, and management of all devices on a network by providing centralized management of devices such as firewalls, routers, switches, and load balancers. Each of these devices plays a critical role in the availability and security of an organization’s network, and BackBox ensures they all continue to function effectively and effortlessly, streamlining operations for optimal performance. BackBox provides a foundation to harmonize the configuration between multiple devices, enabling seamless integration, and assuring compliance to organization or industry security policies, standards, or guidelines. IT administrators can easily employ BackBox to track configuration changes and see the deviation with the baseline for compliance validation and remediation.

About

rConfig is an open source network device configuration management utility that takes frequent configuration snapshots of devices. Open source, and built by Network Architects. We know what you need! rConfig is completely open source. Event the professional version. Built on top of world class open source software (Laravel & Vuejs), It is extensible, and you can participate in its development. Take snapshots of your routing table, mac, arp tables, as well as running configs and any other show commands. Get your network device's status for any point in time. rConfig allows you to deliver configs much faster throughv intuative, and simple automation capabilties. rConfig has implemented enhanced security to protect your assets with more coming in future releases. Such as SSO, config encryption & MFA. Add customizations, contribbute to rConfig, or purchase support for priority feature addition to your rConfig installations.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprises and managed service providers in need of an intelligent automation solution for their network and security devices

Audience

Companies wanting a network configuration manager solution to protect their network assets

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

€499 per year
Free Version
Free Trial

Reviews/Ratings

Overall 4.5 / 5
ease 4.5 / 5
features 4.2 / 5
design 4.0 / 5
support 4.8 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

BackBox
Founded: 2009
United States
backbox.com/request-a-demo/

Company Information

rConfig
United States
www.rconfig.com

Alternatives

Unimus

Unimus

NetCore j.s.a. (Unimus)

Alternatives

Unimus

Unimus

NetCore j.s.a. (Unimus)
WeConfig

WeConfig

Westermo
opConfig

opConfig

FirstWave
ConfigOS

ConfigOS

SteelCloud

Categories

Categories

IT Management Features

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Automation Features

Compliance Monitoring
Configuration Backup
Configuration Changes
Network Orchestration
Performance Monitoring
Tool Access Control
Vulnerability Assessments

Network Security Features

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Integrations

MySQL
Avaya Cloud Office
Axway Amplify
Centerity
Ciena Manage, Control and Plan (MCP)
Device42
F5 BIG-IP
FortiAnalyzer
Gigamon
Imprivata
MariaDB
NetWitness
Radware DefensePro
Sophos Firewall
Sophos UTM
Symantec Endpoint Protection
Trellix Endpoint Security (HX)
Trend Micro Deep Discovery
VMware NSX
WatchGuard Firebox Cloud

Integrations

MySQL
Avaya Cloud Office
Axway Amplify
Centerity
Ciena Manage, Control and Plan (MCP)
Device42
F5 BIG-IP
FortiAnalyzer
Gigamon
Imprivata
MariaDB
NetWitness
Radware DefensePro
Sophos Firewall
Sophos UTM
Symantec Endpoint Protection
Trellix Endpoint Security (HX)
Trend Micro Deep Discovery
VMware NSX
WatchGuard Firebox Cloud
Claim BackBox and update features and information
Claim BackBox and update features and information
Claim rConfig and update features and information
Claim rConfig and update features and information