Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 4 Ratings

Total
ease
features
design
support

Alternatives to Consider

  • Unimus Reviews & Ratings
    30 Ratings
    Company Website
  • PathSolutions TotalView Reviews & Ratings
    43 Ratings
    Company Website
  • NetBrain Reviews & Ratings
    218 Ratings
    Company Website
  • Site24x7 Reviews & Ratings
    894 Ratings
    Company Website
  • Device42 Reviews & Ratings
    173 Ratings
    Company Website
  • Domotz Reviews & Ratings
    282 Ratings
    Company Website
  • AdRem NetCrunch Reviews & Ratings
    148 Ratings
    Company Website
  • Addigy Reviews & Ratings
    259 Ratings
  • ManageEngine OpManager Reviews & Ratings
    1,592 Ratings
    Company Website
  • Chainguard Reviews & Ratings
    46 Ratings
    Company Website

What is TrueSight Automation for Networks?

Improving agility, security, and efficiency through the strategic configuration and automation of networks is crucial. This methodology employs automated vulnerability management to continuously assess vulnerabilities, enhance visibility, and effectively counteract threats across different network devices. By leveraging integrations with vendor alerts and the NIST National Vulnerability Database, organizations can swiftly identify vulnerabilities, refresh device images, and carry out upgrades without causing interruptions. Moreover, rapid configuration changes can be executed across thousands of devices, equipped with automated rollback capabilities and change tracking to ensure seamless operations. Access control mechanisms regulate who can view or modify settings, while the implementation of pre-configured policies that adhere to regulatory frameworks such as CIS and DISA aids in addressing any compliance shortfalls. In addition, organizations can quickly roll out new physical or virtual network devices using configurations designed based on best practices to align with business needs. Real-time access to device configurations allows for effective troubleshooting, monitoring of job statuses, and the execution of compliance audits, leading to a more agile and responsive network environment that can adapt to changing circumstances. Ultimately, the combination of these practices fosters a strong network infrastructure that remains both secure and efficient while enhancing the organization’s overall operational resilience.

What is BackBox?

Network engineers streamline their workflows using the BackBox Automation Platform for Network Teams, which efficiently automates and audits labor-intensive manual processes. Featuring a collection of more than 3,000 ready-made automations and a user-friendly, script-free interface for creating additional ones, BackBox simplifies the initiation of your automation efforts. This platform serves as an intuitive point-and-click solution for managing backups of firewalls and network devices, performing OS updates and patching, conducting configuration compliance audits and remediation, overseeing network vulnerability management, and handling changes in network configurations, among other tasks. By leveraging BackBox, network teams can enhance their productivity and focus on strategic initiatives rather than repetitive tasks.

Media

Media

Integrations Supported

AlgoSec
AppWall
Array APV Series
Axway Amplify
Check Point Infinity
Clearswift Secure Email Gateway
CyberArk Privileged Access Manager
FireMon
Forcepoint Trusted Gateway System
IBM QRadar SIEM
MySQL
Nexpose
Radware Alteon
Radware DefensePro
Radware LinkProof NG
Riverbed SteelHead
Trellix Endpoint Security (HX)
VMware vCenter
WALLIX Bastion

Integrations Supported

AlgoSec
AppWall
Array APV Series
Axway Amplify
Check Point Infinity
Clearswift Secure Email Gateway
CyberArk Privileged Access Manager
FireMon
Forcepoint Trusted Gateway System
IBM QRadar SIEM
MySQL
Nexpose
Radware Alteon
Radware DefensePro
Radware LinkProof NG
Riverbed SteelHead
Trellix Endpoint Security (HX)
VMware vCenter
WALLIX Bastion

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

BMC Software

Date Founded

1980

Company Location

United States

Company Website

www.bmc.com/it-solutions/truesight-network-automation.html

Company Facts

Organization Name

BackBox

Date Founded

2009

Company Location

United States

Company Website

backbox.com/request-a-demo/

Categories and Features

Network Automation

Compliance Monitoring
Configuration Backup
Configuration Changes
Network Orchestration
Performance Monitoring
Tool Access Control
Vulnerability Assessments

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IT Management

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

MSP

Backup Management
Billing & Invoicing
CRM
Dashboard
Help Desk
Issue Management
Live Chat
Patch Management
Privileged Access Management (PAM)
Project Management
Remote Access
Remote Systems Monitoring
Scheduling

Network Automation

Compliance Monitoring
Configuration Backup
Configuration Changes
Network Orchestration
Performance Monitoring
Tool Access Control
Vulnerability Assessments

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Popular Alternatives

Popular Alternatives

Unimus Reviews & Ratings

Unimus

NetCore j.s.a. (Unimus)