+
+

Related Products

  • Unimus
    30 Ratings
    Visit Website
  • PathSolutions TotalView
    43 Ratings
    Visit Website
  • Site24x7
    858 Ratings
    Visit Website
  • NetBrain
    218 Ratings
    Visit Website
  • ManageEngine OpManager
    1,577 Ratings
    Visit Website
  • Domotz
    268 Ratings
    Visit Website
  • Cloudflare
    1,903 Ratings
    Visit Website
  • Syncro
    502 Ratings
    Visit Website
  • Device42
    173 Ratings
    Visit Website
  • ConnectWise Automate
    505 Ratings
    Visit Website

About

BackBox offers a simple way to intelligently automate the backup, restoration, and management of all devices on a network by providing centralized management of devices such as firewalls, routers, switches, and load balancers. Each of these devices plays a critical role in the availability and security of an organization’s network, and BackBox ensures they all continue to function effectively and effortlessly, streamlining operations for optimal performance. BackBox provides a foundation to harmonize the configuration between multiple devices, enabling seamless integration, and assuring compliance to organization or industry security policies, standards, or guidelines. IT administrators can easily employ BackBox to track configuration changes and see the deviation with the baseline for compliance validation and remediation.

About

BackBox is more than an operating system, it is a Free Open Source Community Project with the aim of promoting the culture of security in IT environment and give its contribution to make it better and safer. All this using exclusively Free Open Source Software, demonstrating the potential and power of the Community. If you’d like to know more feel free to navigate in our web site and get in touch with us. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories that are constantly updated to the latest stable version of the most popular and best known ethical hacking tools. BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprises and managed service providers in need of an intelligent automation solution for their network and security devices

Audience

Anyone looking for a free operating system offering ethical hacking tools and penetration testing services

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 4.5 / 5
ease 4.5 / 5
features 4.2 / 5
design 4.0 / 5
support 4.8 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

BackBox
Founded: 2009
United States
backbox.com/request-a-demo/

Company Information

BackBox
Founded: 2010
Italy
www.backbox.org

Alternatives

Unimus

Unimus

NetCore j.s.a. (Unimus)

Alternatives

Categories

Categories

IT Management Features

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Automation Features

Compliance Monitoring
Configuration Backup
Configuration Changes
Network Orchestration
Performance Monitoring
Tool Access Control
Vulnerability Assessments

Network Security Features

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Integrations

NorthStar Navigator
Arista Converged Cloud Fabric
Check Point Infinity
Ciena Manage, Control and Plan (MCP)
Cisco AnyConnect
Clearswift Secure Email Gateway
Forescout
FortiAnalyzer
FortiDDoS
FortiGate NGFW
IBM QRadar SIEM
NetWitness
ONTAP
RedSeal
Riverbed SteelHead
Symantec Endpoint Protection
Syslog-ng
Trend Micro Deep Discovery
VMware NSX
WALLIX Bastion

Integrations

NorthStar Navigator
Arista Converged Cloud Fabric
Check Point Infinity
Ciena Manage, Control and Plan (MCP)
Cisco AnyConnect
Clearswift Secure Email Gateway
Forescout
FortiAnalyzer
FortiDDoS
FortiGate NGFW
IBM QRadar SIEM
NetWitness
ONTAP
RedSeal
Riverbed SteelHead
Symantec Endpoint Protection
Syslog-ng
Trend Micro Deep Discovery
VMware NSX
WALLIX Bastion
Claim BackBox and update features and information
Claim BackBox and update features and information
Claim BackBox Linux and update features and information
Claim BackBox Linux and update features and information