Ratings and Reviews 17 Ratings
Ratings and Reviews 4 Ratings
Integrations Supported
Paessler PRTG
AlgoSec
Array APV Series
F5 BIG-IP
Forcepoint Trusted Gateway System
Forescout
IBM QRadar SIEM
LibreNMS
Nautobot
NetXMS
Integrations Supported
Paessler PRTG
AlgoSec
Array APV Series
F5 BIG-IP
Forcepoint Trusted Gateway System
Forescout
IBM QRadar SIEM
LibreNMS
Nautobot
NetXMS
API Availability
Has API
API Availability
Has API
Pricing Information
$5.90 per device per year
Free Trial Offered?
Free Version
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
NetCore j.s.a. (Unimus)
Date Founded
2016
Company Location
Slovakia
Company Website
unimus.net
Company Facts
Organization Name
BackBox
Date Founded
2009
Company Location
United States
Company Website
backbox.com/request-a-demo/
Categories and Features
Change Management
Approval Workflow
Audit Trail
Change Calendar
Change Planning
Compliance Management
Prioritization
Release Management
Task Management
Training Management
Configuration Management
Access Control / Permissions
Application Deployment
Automated Provisioning
Infrastructure Automation
Node Management
Orchestration
Reporting Analytics / Visualization
Task Management
Disaster Recovery
Administration Policies
Bare-Metal Recovery
Encryption
Failover Testing
Flexible Data Capture
Multi-Platform Support
Multiple Data Type Support
Offline Storage
Network Automation
Compliance Monitoring
Configuration Backup
Configuration Changes
Network Orchestration
Performance Monitoring
Tool Access Control
Vulnerability Assessments
Network Security
Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Categories and Features
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
IT Management
Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
MSP
Backup Management
Billing & Invoicing
CRM
Dashboard
Help Desk
Issue Management
Live Chat
Patch Management
Privileged Access Management (PAM)
Project Management
Remote Access
Remote Systems Monitoring
Scheduling
Network Automation
Compliance Monitoring
Configuration Backup
Configuration Changes
Network Orchestration
Performance Monitoring
Tool Access Control
Vulnerability Assessments
Network Security
Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning