Alternatives to AWS Config
Compare AWS Config alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to AWS Config in 2026. Compare features, ratings, user reviews, pricing, and more from AWS Config competitors and alternatives in order to make an informed decision for your business.
-
1
Unimus
NetCore j.s.a. (Unimus)
Unimus is a powerful, on-premise Network Automation and Configuration Management (NCM) solution designed for fast deployment and ease of use. As one of the most versatile NCM solutions available, it simplifies network management with features such as: 🔹Disaster Recovery – Automated configuration backups ensure business continuity 🔹Change Management – Detect, review, and audit configuration changes with real-time notifications 🔹Configuration Auditing - Search and validate configurations and runtime state across your entire network 🔹Network Automation – Push large-scale configuration changes or perform firmware upgrades in minutes 🔹Compliance Reporting – Ensure adherence to internal policies and industry standards across your network devices 🔹Integrated Device CLI – Access device terminals directly within Unimus Supporting 450+ device types across 160+ vendors, Unimus is a vendor-agnostic NCM that boosts security and speeds network operations with no programming needed. -
2
Cruz Operations Center (CruzOC)
Dorado Software
CruzOC is a scalable multi-vendor network management and IT operations tool for robust yet easy-to-use netops. Key features of CruzOC’s integrated and automated management include performance monitoring, configuration management, and lifecycle management for 1000s of vendors and converging technologies. With CruzOC, administrators have implicit automation to control their data center operations and critical resources, improve network and service quality, accelerate network and service deployments, and lower operating costs. The result is comprehensive and automated problem resolution from a single-pane-of-glass. Cruz Monitoring & Management. NMS, monitoring & analytics -- health, NPM, traffic, log, change. Automation & configuration management -- compliance, security, orchestration, provisioning, patch, update, configuration, access control. Automated deployment -- auto-deploy, ZTP, remote deploy. Deployments available on-premise and from the cloud.Starting Price: $1350 -
3
Amazon GuardDuty
Amazon
Amazon GuardDuty is a threat detection service that continuously monitors for malicious activity and unauthorized behavior to protect your AWS accounts, workloads, and data stored in Amazon S3. With the cloud, the collection and aggregation of account and network activities is simplified, but it can be time consuming for security teams to continuously analyze event log data for potential threats. With GuardDuty, you now have an intelligent and cost-effective option for continuous threat detection in AWS. The service uses machine learning, anomaly detection, and integrated threat intelligence to identify and prioritize potential threats. GuardDuty analyzes tens of billions of events across multiple AWS data sources, such as AWS CloudTrail event logs, Amazon VPC Flow Logs, and DNS logs. With a few clicks in the AWS Management Console, GuardDuty can be enabled with no software or hardware to deploy or maintain. -
4
Amazon Inspector
Amazon
Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. Amazon Inspector automatically assesses applications for exposure, vulnerabilities, and deviations from best practices. After performing an assessment, Amazon Inspector produces a detailed list of security findings prioritized by level of severity. These findings can be reviewed directly or as part of detailed assessment reports which are available via the Amazon Inspector console or API. Amazon Inspector security assessments help you check for unintended network accessibility of your Amazon EC2 instances and for vulnerabilities on those EC2 instances. Amazon Inspector assessments are offered to you as pre-defined rules packages mapped to common security best practices and vulnerability definitions. Accelerate MTTR by using over 50 sources for vulnerability intelligence to help identify zero-day vulnerabilities quickly. -
5
AWS CloudTrail
Amazon
AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS account. With CloudTrail, you can log, continuously monitor, and retain account activity related to actions across your AWS infrastructure. CloudTrail provides event history of your AWS account activity, including actions taken through the AWS Management Console, AWS SDKs, command line tools, and other AWS services. This event history simplifies security analysis, resource change tracking, and troubleshooting. In addition, you can use CloudTrail to detect unusual activity in your AWS accounts. These capabilities help simplify operational analysis and troubleshooting. Detect unauthorized access using the Who, What, and When information in CloudTrail Events. Respond with rules-based EventBridge alerts and automated workflows. Continuously monitor API usage history using machine learning (ML) models to spot unusual activity in your AWS accounts, and determine root cause. -
6
AWS Systems Manager
Amazon
AWS Systems Manager is a comprehensive solution that enables centralized visualization, management, and operation of nodes at scale across AWS, on-premises, and multi-cloud environments. It provides a unified console experience, consolidating various tools to facilitate common node tasks across AWS accounts and regions. With Systems Manager, you can automate routine operational tasks, reducing the time and effort required for system maintenance. It offers secure remote management of nodes without the need for bastion hosts, SSH, or remote PowerShell, simplifying operations and enhancing security. The platform also supports automated patching of operating systems and software, ensuring that your infrastructure remains up-to-date and compliant. Additionally, Systems Manager provides real-time insights into your node infrastructure, allowing for quick identification and resolution of issues. Its integration capabilities extend across hybrid and multi-cloud environments. -
7
AWS Trusted Advisor
Amazon
AWS Trusted Advisor is an online tool that provides you real time guidance to help you provision your resources following AWS best practices. Trusted Advisor checks help optimize your AWS infrastructure, increase security and performance, reduce your overall costs, and monitor service limits. Whether establishing new workflows, developing applications, or as part of ongoing improvement, take advantage of the recommendations provided by Trusted Advisor on a regular basis to help keep your solutions provisioned optimally. AWS Basic Support and AWS Developer Support customers get access to 6 security checks (S3 Bucket Permissions, Security Groups - Specific Ports Unrestricted, IAM Use, MFA on Root Account, EBS Public Snapshots, RDS Public Snapshots) and 50 service limit checks. AWS Business Support and AWS Enterprise Support customers get access to all 115 Trusted Advisor checks (14 cost optimization, 17 security, 24 fault tolerance, 10 performance, and 50 service limits). -
8
ConfigCobra
ConfigCobra
ConfigCobra is a CIS-certified SaaS that automates security compliance assessments for Microsoft 365 using the CIS Microsoft 365 Foundations Benchmark. It scans your tenant against CIS controls, detects configuration drift, and provides clear, actionable remediation guidance for every finding. Customers can run on-demand assessments or schedule recurring scans for continuous compliance monitoring, and generate CIS-certified, audit-ready PDF reports with evidence. ConfigCobra integrates with Microsoft Entra ID for secure access and uses Microsoft APIs to evaluate tenant configuration without making changes.Starting Price: $2/user/month -
9
SolarWinds Kiwi CatTools
SolarWinds
Powerful network automation and configuration management software. Affordable network configuration management for small business networks. Schedule automatic backup activities and roll out configuration changes to multiple devices at the same time. Pre-schedule changes to your network device configurations to occur only on the devices you choose, and only when you want them to. Get alerted on changes to your network equipment so you can head off any malicious activities. Quickly rollback configuration changes when needed to avoid issues before their impact is felt. Schedule automated backups of network device configuration from routers, switches, firewalls, etc. Managing one-off config changes isn’t easy, not to mention the impact a minor issue can have on your entire network. Simultaneously perform or schedule configuration changes across multiple network devices with great ease. Changes to config files, outside of your knowledge, could be a sign of something insidious.Starting Price: $811 -
10
ConfigCat
ConfigCat
10 minutes trainable feature flag and configuration management service with unlimited team size, awesome support and no surprises. Turn your features on/off using ConfigCat's dashboard even after your code is deployed. ConfigCat lets you target user segments based on region, email, subscription or any other custom user attribute. We support % rollouts, A/B testing and variations. ConfigCat is a hosted service for feature flag and configuration management. It enables you to decouple feature releases from code deployments. We provide open source SDKs to support easy integration with your Mobile, Desktop application, Website or any Backend system. Separate marketing releases from code deployments. This way you can deploy code anytime the development is done or even incomplete. And turn on the feature later when you are ready. Soft launch, just like the cool kids.Starting Price: €79 per month -
11
ConfigBox
Rovexo
ConfigBox is a multi-functional Product Configurator for Joomla, WordPress and Magento with integrated Order Management and implements the whole order process from product configuration, request for quotation (RFQ), ordering and shipping. With a ConfigBox license, you do not need any additional software for a complete eCommerce solution. There are extra packages for integration with third-party systems and open interfaces to create adapters for other ERP or CRM systems. ConfigBox enables you to present complex products and services in a simple and professional fashion and prevents incompatibilities and calculates intelligent pricing automatically. All this comes in full integration with Joomla/Magento and soon for a broader range of content management and eCommerce systems. Product data entry is done with interfaces that are specifically designed for user-friendliness and intuitive handling. -
12
opConfig
FirstWave
opConfig can automate everything from config push to alerting on changes and enforcing compliance. Introduce operational delegation to your organization and allow the troubleshooting of your network devices without giving 'root' access. Implement your compliance policy with PCI-DSS, HIPAA, COBIT and more using prebuilt industry standard rule sets (eg Cisco-NSA) or customize your own. Collects and backs-up configuration information in all environments, all vendors hardware and software, cloud-based, on-premise and hybrid. opConfig gives you the ability to create robust command sets that can aid in root cause analysis of faults. Our software solutions scale horizontally and vertically. We have provided monitoring and management solutions for over 200k nodes. Compare configuration data with older versions or against other devices. Use compliance policies as a task sheet to ensure all devices are compliant. -
13
rConfig
rConfig
rConfig is an open source network device configuration management utility that takes frequent configuration snapshots of devices. Open source, and built by Network Architects. We know what you need! rConfig is completely open source. Event the professional version. Built on top of world class open source software (Laravel & Vuejs), It is extensible, and you can participate in its development. Take snapshots of your routing table, mac, arp tables, as well as running configs and any other show commands. Get your network device's status for any point in time. rConfig allows you to deliver configs much faster throughv intuative, and simple automation capabilties. rConfig has implemented enhanced security to protect your assets with more coming in future releases. Such as SSO, config encryption & MFA. Add customizations, contribbute to rConfig, or purchase support for priority feature addition to your rConfig installations.Starting Price: €499 per year -
14
SolarWinds Network Configuration Manager
SolarWinds
Automate network configuration management and compliance, which can help save time and optimize IT resources. Reduce cost, save work hours, and remain compliant with automated network configuration management and backup. Stop worrying whether inventory spreadsheets and lists are accurate, up-to-date, and reliable. With SolarWinds® Network Configuration Manager (NCM), you can quickly build an accurate inventory of your network devices by using network scanning and discovery to obtain up-to-date information on all network devices. When it comes to network configuration management, it’s critical to quickly and precisely compare configurations for a number of reasons. Some examples could be to check against security policies, to ensure there are no discrepancies between running and saved configs, and to quickly identify and fix unauthorized or failed changes. Automation of network configuration management simplifies processes like scheduling regular backups.Starting Price: $2,995 one-time fee -
15
Easy2Patch
E2P
Easy2Patch is a software that enables centralized updating of third-party products running on computers within IT ınfrastructures. It works integrated with WSUS, ConfigMgr, and Intune. Its scope is limited to third-party Updates on Windows Operating System Platforms. Easy2Patch does not allow the archiving of updates or the archiving of setup processes. This design ensures that your updating and installing processes are automatically on time. Updates for third-party products are securely provided with the original site link. With the Defender feature, Easy2Patch can automatically send third-party applications to the computers within the group the system administrators determined. These are on the CVE score to be determined but forgotten or not configured to be sent via Easy2Patch. *Stay up to date *Extensive application pool for wide use *Automatic protection of computers with Microsoft Defender feature -
16
WeConfig
Westermo
WeConfig makes network configuration and maintenance more efficient, simple and reliable. Many hours of work can be saved in the initial installation, as well as in ongoing maintenance throughout the life of the network. Time-consuming tasks can be automated and configuration updates can be deployed in bulk. WeConfig minimizes the risk of configuration errors and makes it simple to optimize network security. A properly configured and monitored network with simple and robust maintenance processes will minimize any risk of network downtime.Cyber security deployment and analysis. Simple deployment of system wide security features minimises the risk for unauthorized access. Security analysis lets you find and fix network vulnerabilities. WeConfig makes it easy to create and maintain a robust network security standard. Diagnostic tools for high network reliability. WeConfig makes your network transparent and gathers all information in one place. -
17
SaleConfig
SaleConfig
Tasks such as creating offers, preparing pricing and calculating costs are very time consuming, but now they can be easily automated with SaleConfig. Configurator, the main component of SaleConfig, is used to store product information and sales data (cost and pricing). This significantly reduces the amount of work for product designers, cost and sales data administrators. The configurator algorithm allows you to create any dependencies between the parameters of your products. A simple interface allows you to easily and quickly prepare your product. SaleConfig helps you prepare your offer and shows you all available options, configurations and dependencies. This allows even less experienced salesmen to create an offer, as well as reducing the time needed for their training. Your salesmen can work on site and have access to SaleConfig, they just need access to the internet. -
18
Terraform
HashiCorp
Terraform is an open-source infrastructure as code software tool that provides a consistent CLI workflow to manage hundreds of cloud services. Terraform codifies cloud APIs into declarative configuration files. Write infrastructure as code using declarative configuration files. HashiCorp Configuration Language (HCL) allows for concise descriptions of resources using blocks, arguments, and expressions. Run terraform plan to check whether the execution plan for a configuration matches your expectations before provisioning or changing infrastructure. Apply changes to hundreds of cloud providers with terraform apply to reach the desired state of the configuration. Define infrastructure as code to manage the full lifecycle — create new resources, manage existing ones, and destroy those no longer needed. -
19
Streamline and simplify Kubernetes (north-south) network traffic management, delivering consistent, predictable performance at scale without slowing down your apps. Advanced app‑centric configuration – Use role‑based access control (RBAC) and self‑service to set up security guardrails (not gates), so your teams can manage their apps securely and with agility. Enable multi‑tenancy, reusability, simpler configs, and more. A native, type‑safe, and indented configuration style to simplify capabilities like circuit breaking, sophisticated routing, header manipulation, mTLS authentication, and WAF. Plus if you’re already using NGINX, NGINX Ingress resources make it easy to adapt existing configuration from your other environments.
-
20
Concourse
Concourse
Concourse is an open-source continuous thing-doer. Built on the simple mechanics of resources, tasks, and jobs, Concourse presents a general approach to automation that makes it great for CI/CD. A Concourse pipeline is like a distributed, continuous Makefile. Each job has a build plan declaring the job's input resources and what to run with them when they change. Your pipeline is then visualized in the web UI, taking only one click to get from a failed job to seeing why it failed. The visualization provides a "gut check" feedback loop: if it looks wrong, it probably is wrong. Jobs can depend on other jobs by configuring passed constraints. The resulting chain of jobs and resources is a dependency graph that continuously pushes your project forward, from source code to production. All configuration and administration is done using the fly CLI. The fly set-pipeline command pushes the config up to Concourse. Once it looks good, you can then check the file in to source control.Starting Price: Free -
21
XMRig
XMRig
High performance, open source, cross platform RandomX, KawPow, CryptoNight and AstroBWT CPU/GPU miner, RandomX benchmark and stratum proxy. The preferred way to configure XMRig is the JSON config file as it is more flexible and human friendly. The command line interface does not cover all features, such as mining profiles for different algorithms. Important options can be changed during runtime without miner restart by editing the config file or executing API calls. Wizard helps you create initial configuration for the miner. Workers helps manage your miners via HTTP API. Default donation 1% (1 minute in 100 minutes) can be increased via option donate-level or disabled in source code. XMRig source code available on GitHub under terms of GPLv3 license. Binary downloads and build instructions available for most popular platforms. We use a self hosted buildbot to create binaries for every commit. -
22
Zipher
Zipher
Zipher is an autonomous optimization platform specifically designed to improve the performance and cost efficiency of Databricks workloads by eliminating manual tuning and resource management and continuously adjusting clusters in real time. It uses proprietary machine learning models and the only Spark-aware scaler that actively learns and profiles workloads to adjust cluster resources, select optimal configurations for every job run, and dynamically tune settings like hardware, Spark configs, and availability zones to maximize efficiency and cut waste. Zipher continuously monitors evolving workloads to adapt configurations, optimize scheduling, and allocate shared compute resources to meet SLAs, while providing detailed cost visibility that breaks down Databricks and cloud provider costs so teams can identify key cost drivers. It integrates seamlessly with major cloud service providers including AWS, Azure, and Google Cloud and works with common orchestration and IaC tools. -
23
Chef Infra
Progress Software
Chef® Infra® configuration management software eliminates manual efforts and ensures infrastructure remains consistent and compliant over its lifetime — even in the most complex, heterogenous, and large-scale environments. Define configurations and policies as code that are testable, enforceable and can be delivered at scale as part of automated pipelines. Ensure configurations only change if a system diverges from the desired defined state and automatically correct configuration drift, if needed. Manage Windows and Linux systems running on prem, ARM systems running in the cloud or Macs laptops running at the edge all the same way. Use simple declarative definitions for common tasks or easily extend them to support the most unique environmental requirements. Enforce policy by converging the system to the state declared by the various resources. Reduce risks by iterating on policy changes before pushing them to production.Starting Price: $127 per year -
24
Chef
Progress Software
Chef turns infrastructure into code. With Chef, you can automate how you build, deploy, and manage your infrastructure. Your infrastructure becomes as versionable, testable, and repeatable as application code. Chef Infrastructure Management ensures configurations are applied consistently in every environment with infrastructure management automation. Chef Compliance makes it easy to maintain and enforce compliance across the enterprise. Deliver successful application outcomes consistently at scale with Chef App Delivery. Chef Desktop allows IT teams to automate the deployment, management, and ongoing compliance of IT resources. Ensure configurations are applied consistently in every environment. Powerful policy-based configuration management system software. Runbook automation to consistently define, package & deliver applications. IT automation & DevOps dashboards for operational visibility. -
25
SupportXMR
SupportXMR
SupportXMR is a mining pool for Monero (XMR). SupportXMR helps Monero miners increase their mining yield. Getting started is easy and this pool has a large and friendly community that are happy to help you. SupportXMR recommends XMRig (CPU, Nvidia, AMD). It is very user-friendly and comes with their own Setup Wizard for easy config generation. Each mining software will have it's own config, but they will all ask for the same information. You can also set worker names or fixed difficulty through the configuration. -
26
Leanides Lab Station
Leanides
The Leanides Lab Station started out as a way to transfer Virtual GNS3 lab configs to Real Cisco devices. We have achieved that goal and it has developed into a complete Lab system that can now store all the Cisco lab configs that you do for easy retrieval and deployment. Not only that, it has emerged as a fast and easy way to transfer a text file config to a Cisco device that can change the way people prepare Cisco devices in a lab environment. After doing many Cisco Labs and setting up countless Cisco devices in the workplace from scratch, I could see the need for a tool that would be able to quickly roll out network configurations to Cisco devices. The idea of a multi-purpose tool that could be of use at all levels of Cisco study evolved with time and the purpose was to develop something that is both useful and easy to use.Starting Price: $49 per year -
27
Lepton
Lepton
Lepton is an open-source project on GitHub. It's free and we don't accept donations. If you like, feel free to donate to Wikimedia Foundation, which helps sustain free knowledge through Wikipedia and its sister projects for people around the world. Lepton replies on GitHub APIs to detect the language. Leptonis a centralized configuration file for Lepton and is parsed at the app startup. The file is not auto-generated. Lepton is a pure desktop client of GitHub Gist without its own service. All data are either saved locally or in the GitHub Gist service. Create a GitHub token with gist enabled. Put the token and other configs in the enterprise section in the Lepton config file. Lepton provides a formatted description section with title and tag support. You can group your gists based on their languages and custom tags. Letpon supports Markdown rendering. As a bonus, you can use Lepton for markdown note-taking and access it everywhere.Starting Price: Free -
28
CodeRifts
CodeRifts
CodeRifts is a zero-config GitHub App for API compatibility governance. It detects breaking changes in OpenAPI 2.0, 3.0, and 3.1 specs on every pull request — before merge. Unlike linters that only check syntax, CodeRifts scores risk across 4 dimensions, calculates blast radius, identifies affected downstream clients, and estimates economic impact in dollars. It enforces governance policies automatically and blocks risky PRs. Other tools tell you WHAT broke. CodeRifts tells you HOW MUCH it costs. Supports GitHub App, GitHub Actions, GitLab CI, Bitbucket, CLI, REST API, and MCP protocol. Built for teams where a single breaking API change costs $10k–$50k in downstream fixes. Zero CI configuration required — install the GitHub App and governance starts on the next PR. Detects 72 behavioral drift patterns including auth flow changes, retry policy drift, and agent protocol shifts. Trusted by backend and platform teams who ship APIs consumed by mobile apps, third-party integrations, andStarting Price: $49/month -
29
SolarWinds Server Configuration Monitor
SolarWinds
Server configuration and change monitoring tool that's built to be easy to use. Don’t let unexpected or unauthorized configuration changes compromise your environment. Quickly understand if config changes line up with an outage or performance issue. Get a unified experience with other SolarWinds systems, servers, and network management products. Simple-to-understand, affordable licensing allows you to fully support multiple projects. Server Configuration Monitor supports change monitoring for both Windows and Linux servers and applications. SCM is built on Orion, so it can integrate with Server & Application Monitor (SAM), allowing you to correlate change configuration to performance. Server Configuration Monitor comes with out-of-the-box profiles made to monitor hardware and software configuration changes, changes to IIS, changes to sensitive files and groups in Linux, and changes to Linux files impacting operations. -
30
Netwrix Strongpoint
Netwrix
Netwrix Strongpoint helps organizations build smart controls that automate the hardest parts of SOX compliance management and audit reporting, access reviews and segregation of duties, data security, and change management. Netwrix Strongpoint works with NetSuite and Salesforce. With tight controls to track and protect what’s in scope, Strongpoint customers are able to produce airtight audit reporting on demand, greatly reducing the cost and time of SOX compliance prep. See what’s safe to change and what requires additional review. Then, use highly sophisticated impact analysis tools to streamline the discovery process. Not subject to SOX? Netwrix Strongpoint’s award-winning data security, configuration management, and change management tools help businesses running complex business systems maintain transparency and harden their business-critical applications against security risks.Starting Price: $1000/month -
31
Patch My PC
Patch My PC
Save more time than you ever thought possible and improve security by automating the patching of third-party applications in Microsoft ConfigMgr and Intune. Extend beyond patching, auto-create applications for the initial deployment of products in Microsoft SCCM and Intune. Including icons, keywords, descriptions, and much more! We'll keep the base installs up to date automatically — no need to deploy outdated apps and wait for the updates to apply after the fact. Use existing installation methods within SCCM including task sequences and collection deployments for the initial installation of products. Add your own custom pre/post-update scripts to perform environment-specific configurations when needed. Disable the self-update feature within applications to ensure you can manage when and how updates apply in your enterprise.Starting Price: $2 per device per year -
32
Open-AudIT
FirstWave
​Open-AudIT is a powerful network discovery and inventory software that intelligently scans an organization’s network and stores the configurations of the discovered devices. This provides immediate access to software licensing, configuration changes, non-authorized devices, capacity utilization, and hardware warranty status reports. Open-AudIT can collect significant amounts of data from large and varying networks that are cataloged and can easily be configured into meaningful reports. It enables users to easily create network discovery profiles for their organization and then run a discovery with a single click or even on an automated schedule. It audits the organization’s network daily without impacting the user experience and intelligently stores the configuration of every discovered component. Open-AudIT tracks and reports on IT asset configuration changes, software licensing, shadow IT, and hardware warranty status. -
33
CloudBoost
HackerBay
You can install CloudBoost anywhere you like. We have a Docker Compose file that can help you get started with CloudBoost in few minutes and with just one command. You can use this compose file to install the service locally on your local dev machine, or you can install the service to Azure, AWS, DigitalOcean, Softlayer, Packet and more. Create a config folder in project root if it does not exist. You need to create a new file cloudboost.json under config folder and save that file with MongoDB and Redis configuration. Once the server is running. You'll see the ClusterKey and SecureKey on the console which means you've successfully started CloudBoost. If you don't see any of these keys, please raise a GitHub issue and let us know.Starting Price: $49 per month -
34
Salto
Salto
Salto simplifies, streamlines and automates the day-to-day efforts of business operations teams. By translating the configuration of business applications to a structured textual representation, Salto's platform unlocks unprecedented agility, scale and accuracy. Salto created a structured language that enables text-search, re-use of configs, in-line documentation, and more, our built-in Git client allows you to easily audit and document changes, debug and revert to previous versions. Finally, we enable you to automate tasks and processes that will save you time, and reduce human errors, bugs and breaks. Our approach stems from importing foundational best practices from the software development world and applying them to business application configuration. In the same spirit, Salto is an open source company and has an open architecture, which enables you to use it along with your other tools, such as CI servers, Git, Jira, and others. -
35
Boundless Automation
Boundless Digital
Boundless offers flexible and scalable pricing options, based on the number of networks and services your business needs. Automate the deployment, migration, and configuration of large Cisco Meraki infrastructures, and streamline overall network administration. Collect logs on what’s happening on any network infrastructure and devices and troubleshoot much faster. Easily configure and manage your public WiFi network across multiple sites. Create nice-looking captive portals with a wider variety of sign-on methods. Provide a more secure guest WiFi service to your users. Deploy thousands of networks within minutes using a CSV. Get extra flexibility to run configuration changes in bulks. Clone your config standards to create or migrate organizations. Use advanced filters to accelerate the research of your client devices. Get more control over the level of access you provide to your orgs. -
36
ConfigOS
SteelCloud
ConfigOS is currently implemented in classified and unclassified environments, tactical and weapon system programs, disconnected labs, and the commercial cloud. ConfigOS is client-less technology, requiring no software agents. ConfigOS scans endpoint systems and remediates hundreds of STIG controls in under 90 seconds. Automated remediation rollback as well as comprehensive compliance reporting and STIG Viewer Checklist output are provided. ConfigOS was designed to harden every CAT 1/2/3 STIG control around an application baseline in about 60 minutes - typically eliminating weeks or months from the RMF accreditation timeline. ConfigOS addresses Microsoft Windows workstation and server operating systems, SQL Server, IIS, IE, Chrome, and all of the Microsoft Office components. The same instance of ConfigOS addresses Red Hat 5/6/7, SUSE, Ubuntu, and Oracle Linux. ConfigOS content includes over 10,000 STIG and CIS controls. New functionality in Command Center includes a patent-pend -
37
Bitcanopy
Bitcanopy
Automated AWS security. Hands-off AWS infrastructure insights and remediation. Ensure AWS Config is enabled in all regions. Identify and stop S3 public read/write/full control. Automatically enforce S3 objects and volumes encryption. Stop login from invalid IP address. Stop non-compliant dev resources. Delete unused elastic load balancers. Automatically apply IP restriction policy on AWS resources. Delete new internet-facing ELBs. Only keep certain port open based on pre-defined policy. RDS - Terminate unencrypted public instances. Monitor and remediate your infrastructure agains 100+ such rules that include compliance against AWS CIS benchmarks and AWS Best Practices.Starting Price: $75 per month -
38
Govern cloud resource configurations and centrally manage your compliance to organization and regulatory guidelines. Manage security and compliance controls directly within the IBM Cloud® platform. With the IBM Security and Compliance Center, you view your security and compliance postures from a unified dashboard. Define provisioned resources’ rules to standardize configurations. Choose from predefined groups of controls to ensure best practices. Select specific controls to meet regulatory standards. Identify anomalies by monitoring network and user behavior. Download results as a report for audit evidence. Use custom tools to manage security findings in one place. Automate security and compliance postures. Enable configuration governance. Detect vulnerabilities and threats. Follow a guided tutorial to complete the set up that is required to manage your posture.
-
39
Otter by Inedo
Inedo
Otter helps you provision and configure your servers automatically, without ever needing to log-in to a command prompt. You can define reusable sets of configuration called roles, and then scale your infrastructure by simply assigning these roles to any number of servers. Let everyone on your team run complex scripts with a custom GUI that you develop around your script parameters. Enable anyone to develop advanced, multi-server orchestrations without needing advanced coding skills. Define desired states of configuration for your servers, detect “drift” from their actual configuration, and re-configure as needed. CI/CD for Infrastructure & Configuration Management. Read the guide to learn how you can deliver infrastructure changes using CI/CD pipelines with Otter and BuildMaster.Starting Price: $2,995/year -
40
Phonism
Phonism
Phonism was built to simplify the complexities of today’s VoIP market. Configure and provision all of your VoIP Devices using a single, unified interface. Stop editing configuration files by hand or configuring devices via their Web GUI. Configure lines, busy lamp fields (BLF), soft keys, side carts, and more without ever opening a text editor! Need even more flexibility? Raw configuration is still available if necessary through our Custom Config feature. The Visual Button Manager makes device key customization easy! Our drag-n-drop tool gives users a simple way to customize their device without the need for a technician or on-site visit. Phonism’s Templates allow administrators to configure common settings using the same familiar interface. Templates can be applied to a single device or across an entire deployment with ease. Changing voice servers? Simply change the voice server address in your Template and all of your devices configuration will be updated automatically.Starting Price: $200 per month -
41
SolarWinds Engineer's Toolset
SolarWinds
Network software that includes over 60 must-have tools. Automated network discovery. Real time monitoring and alerting. Powerful diagnostic capabilities. Enhanced network security. Configuration & log management. IP address and DHCP scope monitoring. The right network toolset designed to easily manage and troubleshoot your network. Discover your entire network, including equipment, MAC to IP address relationships, Switch Port mapping, and more. Monitor and receive alerts in real time on network availability and health. Perform robust network diagnostics for faster troubleshooting and quick resolution of complex network issues. Simulate attacks on your network to identify security vulnerabilities. Configure devices on your network and troubleshoot any config issues with specialized network engineer tools. Deploy an array of network discovery tools, including Port Scanner, Switch Port Mapper, SNMP sweep, IP Network Browser, MAC Address Discovery, Ping Sweep, and more. -
42
FluentBooks
FluentPro Software Corporation
FluentPro FluentBooks is a unique migration, configuration management, and data administration solution for Microsoft Project Server and Project Online. Simplifying PMO directors’ and PPM administrators’ work, it automatically migrates data between Project Server and Project Online instances. FluentBooks brings organization significant value: • 70% savings of time spent on migration and configuration management. • Full and selective data migrations are available. • Using advanced automation, FluentBooks eliminates all manual work in PWA configuration management and data administration. • Allows migrating any edition of Project Server or Project Online instance to another one. Along with migration, FluentBooks includes administration and change management features: • Bulk edit of projects, custom fields, SharePoint sites. • Data comparison and documentation. • Configuration audit. • Publish projects in bulk. • Download PWA configuration and SharePoint sites. -
43
OpenText Dimensions CM
OpenText
Allows for collaborative parallel development to minimize rework, visualize and reduce conflict, and lower risk while improving team velocity and throughput. Preserves the integrity of known baseline configurations, simplifies rollback and recovery, streamlines approval, and maintains integrity when automating builds and deployments. Identifying issues earlier in the lifecycle saves considerable time and effort. CM allows issues to be identified as soon as a code commit occurs via Pulse. CI build, unit test and code review all drive shift left actions. Features integration with developer friendly repositories and IDEs (such as Git, IntelliJ, Eclipse and Microsoft .net), detailed auditing and logging, and immutable versioning and history. Minimizes the preparation and effort required for audits and regulatory compliance with comprehensive and tamperproof history and audit trails. -
44
Ludwig
Uber AI
Ludwig is a low-code framework for building custom AI models like LLMs and other deep neural networks. Build custom models with ease: a declarative YAML configuration file is all you need to train a state-of-the-art LLM on your data. Support for multi-task and multi-modality learning. Comprehensive config validation detects invalid parameter combinations and prevents runtime failures. Optimized for scale and efficiency: automatic batch size selection, distributed training (DDP, DeepSpeed), parameter efficient fine-tuning (PEFT), 4-bit quantization (QLoRA), and larger-than-memory datasets. Expert level control: retain full control of your models down to the activation functions. Support for hyperparameter optimization, explainability, and rich metric visualizations. Modular and extensible: experiment with different model architectures, tasks, features, and modalities with just a few parameter changes in the config. Think building blocks for deep learning. -
45
Ajenti
Ajenti
An admin's tool for a more civilized age, providing you with a fast and secure way to manage a remote Linux box at any time using everyday tools like a web terminal, text editor, file manager and others. Ajenti Core is a streamlined and reusable framework for building web interfaces of all kinds. Includes lots of plugins for system and software configuration, monitoring and management. Ajenti won't damage your existing configuration or tell you how to do your job. Preserves config structure and comments. Easily extensible using Python. Plugin development is fast and pleasant with rich APIs. Automatic configuration of Exim 4 and Courier IMAP, including virtual e-mails, DKIM, DMARC and SPF. -
46
racksnet
racksnet
With racksnet® you can effortlessly automate your IT network, whether in WAN, campus, data center or IoT. The smart and convenient network automation software relieves your IT staff of all those tiresome, repetitive and time-consuming tasks. Our customers decide when, where and how and on which site controllers they perform tasks. Complete independence of time and place. Important network tasks can be planned and configured during core working hours and rolled out on weekends, for example. There are no measures required on site, that means at the location itself, for the provision of network resources. All configurations are deployed via the racksnet® Cloud. In separating hardware and software, the open networking technology of racksnet® goes significantly over and above the possibilities of conventional systems. -
47
Falco
Sysdig
Falco is the open source standard for runtime security for hosts, containers, Kubernetes and the cloud. Get real-time visibility into unexpected behaviors, config changes, intrusions, and data theft. Secure containerized applications, no matter what scale, using the power of eBPF. Protect your applications in real time wherever they run, whether bare metal or VMs. Falco is Kubernetes-compatible, helping you instantly detect suspicious activity across the control plane. Detect intrusions in real time across your cloud, from AWS, GCP or Azure, to Okta, Github and beyond. Falco detects threats across containers, Kubernetes, hosts and cloud services. Falco provides streaming detection of unexpected behavior, configuration changes, and attacks. A multi-vendor and broadly supported standard that you can rely on.Starting Price: Free -
48
6connect
6connect
Revolutionary network automation & provisioning for ISP's and enterprises around the world. Easy to deploy and integrate with, whether you use the 6connect cloud or deploy ProVision behind the firewall. Regain your sanity. Avoid the costly pitfalls of ad hoc solutions and manual network resource management. Global resource management, complete IPAM automation, easy management of DNS, DNSSEC, and DHCP. Flexible data model that seamlessly supports multi-tenant permissions, works with RADIUS, LDAP, 2FA, SAML2. Integrates, synchronizes and automates workflows over a dozen DNS platforms. Also makes migrations a snap! Easy DHCP configuration and scope management that integrates with other systems. From allocation to assignment, from CGN to IPv6, ProVision knows how to handle IPs. Carrier-grade API for easy integration across global system, fast, well documented and tested. Easy to use Peering workflows built-in – from email to BGP config pushes to reporting, it’s all there. -
49
Rudder
Normation
Manually managing your IT infrastructure, especially if it’s critical or hybrid, is not really efficient. The best approach is to use automation combined with configuration compliance to have full and continuous control of your systems. Rudder is built on a powerful compliance-driven automation engine, providing a simple, declarative management framework for your system configurations. No more loss of service, Rudder keeps your systems correctly configured by controlling the drift in a centralized platform. Define global parameters across your infrastructure while managing exceptions with hierarchical variables. In the same way, configure using infrastructure-as-code with the Rudder language, synchronized with the web interface allowing all teams to collaborate.Starting Price: €50 per node per year -
50
Icinga
Icinga GmbH
Icinga is a monitoring system which checks the availability of your network resources, notifies users of outages, and generates performance data for reporting. Scalable and extensible, Icinga can monitor large, complex environments across multiple locations. Icinga 2 is the monitoring server and requires Icinga Web 2 on top in your Icinga Stack. The configuration can be easily managed with either the Icinga Director, config management tools or plain text within the Icinga DSL. Find answers, take actions and become a problem-solver. Be flexible and take your own ways. Stay curious, stay passionate, stay in the loop. Tackle your monitoring challenge. The Icinga stack spans six core strengths that cover all aspects of monitoring. Level up with valuable insights and on-time notifications, eye-opening visuals and analytics. Icinga easily integrates within your systems, and gives you the power to automate your tasks.Starting Price: $0