Company Website

Ratings and Reviews 144 Ratings

Total
ease
features
design
support

Ratings and Reviews 4 Ratings

Total
ease
features
design
support

Media

Media

Integrations Supported

AlgoSec
Ansible
AppWall
Arista Converged Cloud Fabric
Cisco AnyConnect
Forcepoint Trusted Gateway System
FortiAnalyzer
FortiGate NGFW
FortiMail
Gigamon
MySQL
NETSCOUT Arbor DDoS
Radware Alteon
Radware DefensePro
RedSeal
Sophos Email
Sophos Firewall
Sophos Managed Threat Response
Syslog-ng
Trend Micro Deep Discovery

Integrations Supported

AlgoSec
Ansible
AppWall
Arista Converged Cloud Fabric
Cisco AnyConnect
Forcepoint Trusted Gateway System
FortiAnalyzer
FortiGate NGFW
FortiMail
Gigamon
MySQL
NETSCOUT Arbor DDoS
Radware Alteon
Radware DefensePro
RedSeal
Sophos Email
Sophos Firewall
Sophos Managed Threat Response
Syslog-ng
Trend Micro Deep Discovery

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

NetBrain Technologies

Date Founded

2004

Company Location

United States

Company Website

www.netbraintech.com

Company Facts

Organization Name

BackBox

Date Founded

2009

Company Location

United States

Company Website

backbox.com/request-a-demo/

Categories and Features

CMDB

Change Management
Configuration Management
Data Visualization
Device Auto Discovery
IT Asset Management
Impact Management
License Management
Performance Management
Relationship Mapping

IT Management

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

Network Automation

Compliance Monitoring
Configuration Backup
Configuration Changes
Network Orchestration
Performance Monitoring
Tool Access Control
Vulnerability Assessments

Network Mapping

Color Codes / Icons
Compliance Management
Device Auto Discovery
Hierarchical Mapping
Location-Based Mapping
Map Exporting
On-Demand Mapping
Reporting/Analytics
Self-Updating Maps
Web Traffic Reporting

Network Monitoring

Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting

Network Troubleshooting

Alerts / Escalation
Bandwidth Troubleshooting
Change Management
Configuration Management
Connectivity Management
Data Visualization
Historical Audit
Mobile Network Troubleshooting
Network Analysis
Network Monitoring

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IT Management

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

MSP

Backup Management
Billing & Invoicing
CRM
Dashboard
Help Desk
Issue Management
Live Chat
Patch Management
Privileged Access Management (PAM)
Project Management
Remote Access
Remote Systems Monitoring
Scheduling

Network Automation

Compliance Monitoring
Configuration Backup
Configuration Changes
Network Orchestration
Performance Monitoring
Tool Access Control
Vulnerability Assessments

Network Security

Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Popular Alternatives

Popular Alternatives

Unimus Reviews & Ratings

Unimus

NetCore j.s.a. (Unimus)