Company Website

Ratings and Reviews 30 Ratings

Total
ease
features
design
support

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

What is Unimus?

Unimus stands out as a robust solution for network automation, configuration backup, and change management, aimed at streamlining network operations for organizations of varying sizes. With compatibility for over 400 types of devices from more than 150 vendors, Unimus operates as a network-agnostic tool that reduces the need for manual intervention while bolstering both security and reliability. By automating configuration backups, Unimus facilitates efficient disaster recovery, enabling IT teams to swiftly retrieve historical configurations and monitor real-time changes. Its auditing capabilities grant immediate insight into configuration uniformity, regulatory compliance, and potential security vulnerabilities. The process of change management becomes more straightforward with automated change detection, comprehensive version tracking, and tailored notifications. The user-friendly, web-based interface of Unimus allows for effective network management without necessitating extensive technical knowledge, and the integrated CLI access provides opportunities for immediate troubleshooting and command execution. Whether your goals include automating large-scale configuration updates, executing firmware upgrades, or enhancing overall network transparency, Unimus offers a flexible and economically viable solution for contemporary network environments. Additionally, its ongoing updates and customer support ensure that users can maximize their network efficiency and security over time.

What is Ivanti?

Ivanti is a comprehensive IT management platform that helps organizations automate, secure, and optimize their technology environments. With Unified Endpoint Management, Ivanti provides centralized, user-friendly control over all endpoints, enabling IT teams to manage devices seamlessly regardless of location. Their Enterprise Service Management suite enhances operational insights, streamlining workflows and reducing IT service disruptions for a better employee experience. Ivanti also delivers robust network security and exposure management solutions, helping businesses identify vulnerabilities and prioritize remediation efforts to strengthen cybersecurity defenses. Trusted by over 34,000 customers worldwide, including major brands such as Foxwoods Casino and Conair, Ivanti supports secure work-from-anywhere strategies that boost productivity and flexibility. The company regularly publishes research reports on key topics like cybersecurity posture, digital employee experience, and workplace technology trends. Ivanti’s customer advocacy initiatives demonstrate a commitment to partnership and success, with dedicated support teams ensuring clients achieve their goals. Their solutions are scalable and adaptable, fitting the needs of organizations of all sizes. Ivanti empowers IT leaders to turn visibility into actionable value, driving efficient and secure operations. Ultimately, Ivanti’s integrated approach helps businesses navigate the evolving digital landscape with confidence.

Media

Media

No images available

Integrations Supported

Ivanti Application Control
Ivanti Avalanche
Ivanti Connect Secure
Ivanti Docs@Work
Ivanti Endpoint Manager
Ivanti File Director
Ivanti Neurons
Ivanti Neurons for ASPM
Ivanti Neurons for Discovery
Ivanti Neurons for IIoT
Ivanti Neurons for ITSM
Ivanti Neurons for Zero Trust Access
Ivanti Security Controls
Ivanti User Workspace Manager
Ivanti Velocity Voice
LDAP
Nautobot
Observium
Paessler PRTG
Slack

Integrations Supported

Ivanti Application Control
Ivanti Avalanche
Ivanti Connect Secure
Ivanti Docs@Work
Ivanti Endpoint Manager
Ivanti File Director
Ivanti Neurons
Ivanti Neurons for ASPM
Ivanti Neurons for Discovery
Ivanti Neurons for IIoT
Ivanti Neurons for ITSM
Ivanti Neurons for Zero Trust Access
Ivanti Security Controls
Ivanti User Workspace Manager
Ivanti Velocity Voice
LDAP
Nautobot
Observium
Paessler PRTG
Slack

API Availability

Has API

API Availability

Has API

Pricing Information

$5.90 per device per year
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

NetCore j.s.a. (Unimus)

Date Founded

2016

Company Location

Slovakia

Company Website

unimus.net

Company Facts

Organization Name

Ivanti

Date Founded

2017

Company Location

United States

Company Website

www.ivanti.com

Categories and Features

Change Management

Unimus is a robust on-premises solution for Network Automation and Configuration Management (NCM) that prioritizes swift implementation and user-friendliness. This tool facilitates the seamless deployment of large-scale changes, allowing you to schedule, automate, and review modifications across thousands of devices through an efficient and user-friendly graphical interface or API that integrates smoothly into your current processes. Stay updated with real-time notifications via Slack, Pushover, or email whenever network changes take place, ensuring you are always aware of what modifications have been made and when. You can also add comments to each change for additional context, aiding your team in connecting changes to support tickets or documenting decisions, such as the rationale behind disabling STP on the core switch. Unimus enhances the process of comparing configurations between devices or different versions, making it simpler to address problems like network loops. Whether you're updating a single device or overseeing thousands, Unimus empowers you with complete control, including direct CLI access to any device. Begin your network management journey today with a forever-free license for up to five devices by visiting unimus.net.

Approval Workflow
Audit Trail
Automated Notifications
Change Calendar
Change Planning
Compliance Management
Prioritization
Release Management
Task Management
Tracking & Reporting
Training Management

Configuration Management

Unimus empowers you to manage your network devices effectively, offering support for over 400 models from 150 different manufacturers. With a growing array of tools tailored for Network Administrators, Unimus caters to networks ranging from just a few devices to extensive infrastructures with thousands. With Unimus, you can swiftly navigate your network's configurations, accessing both current and historical data. This feature enables you to conduct audits, track changes over time, and annotate modifications for better collaboration and accountability. Stay informed about your network's configuration changes with alerts delivered via Email, Pushover, and Slack. Additionally, Unimus seamlessly integrates into your existing processes through its robust API and network management system connectors. Take charge of your network management with Unimus, utilizing features like Mass Configuration Pushes or the integrated Device CLI. Whether you need to implement changes on a single device or across numerous devices, Unimus allows you to do so in mere seconds or according to your preferred schedule. Experience enhanced confidence, transparency, and control over your network infrastructure with Unimus.

Access Control / Permissions
Application Deployment
Automated Provisioning
Infrastructure Automation
Node Management
Orchestration
Reporting Analytics / Visualization
Task Management

Disaster Recovery

Unimus is a robust on-premise solution for Network Automation and Configuration Management (NCM), crafted for quick implementation and user-friendly operation. This platform facilitates the swift restoration of network device configurations in case of data loss or hardware issues. With a comprehensive versioned backup history and customizable backup workflows, Unimus enhances disaster recovery processes and reduces downtime. Through automated backups, essential device configurations are saved at user-specified intervals, allowing for a seamless restoration when necessary. Backups can be easily exported and stored offsite, with sensitive information such as passwords securely encrypted within the database. Compatible with over 400 device types from more than 150 manufacturers, Unimus provides a versatile, vendor-independent environment for Network Automation, Change Management, and Configuration Auditing. It helps eliminate human errors, strengthens network reliability, and accelerates operational efficiency — all without the need for programming. Unimus ensures that your network remains secure, easily recoverable, and manageable, even in unforeseen circumstances.

Administration Policies
Bare-Metal Recovery
Encryption
Failover Testing
Flexible Data Capture
Multi-Platform Support
Multiple Data Type Support
Offline Storage

Network Automation

At its essence, Unimus is an advanced solution for Network Automation and Configuration Management, designed to operate on-premises and compatible with nearly any hardware setup. The setup process is quick and straightforward, allowing you to begin monitoring the configurations of over 400 device types from 150 different manufacturers within minutes, with ongoing updates for new device compatibility. Thanks to Unimus' sleek, user-friendly interface, you can gather real-time network data, analyze configuration variations, and implement changes — all from a single dashboard. The tool efficiently compiles results from thousands of devices in mere seconds or according to your preferred schedule, minimizing human errors, enhancing productivity, and empowering your team. For immediate access, the integrated Terminal Client lets you manage CLI remotely from any location. Additionally, the robust RegEx-based configuration search allows for rapid audits of your network. Unimus is highly scalable, making it suitable for managing anywhere from a few devices to tens of thousands.

Compliance Monitoring
Configuration Backup
Configuration Changes
Network Orchestration
Performance Monitoring
Tool Access Control
Vulnerability Assessments

Network Configuration

Unimus is a robust on-premises solution for Network Automation and Configuration Management (NCM) that prioritizes quick setup and user-friendliness. It optimizes network configuration processes, maintaining uniformity while minimizing manual tasks. Administrators can effortlessly implement changes—such as deploying VLANs or updating firmware—across numerous devices without the need for any scripting. With the Config Search feature, users can conduct immediate, comprehensive searches throughout both active and archived configurations. The integrated Device Command Line Interface (CLI) provides a secure and centralized method for device management, all accessible from a single dashboard. Additionally, Unimus enhances compliance by verifying device configurations against established policies, ensuring conformity with organizational standards. Compatible with over 400 device types from more than 150 different vendors, Unimus stands as a versatile, vendor-neutral option for Network Automation, Change Management, and Configuration Auditing. It reduces the risk of manual errors, enhances security, and accelerates operational efficiency—all without requiring any programming skills.

Network Discovery

Unimus is a user-friendly Network Automation and Configuration Management (NCM) tool designed for quick setup and ease of use. Its robust Network Discovery feature thoroughly scans the network to identify all connected devices, gathering essential information such as hostnames, serial numbers, vendor details, operating system information, and open SSH/Telnet ports. Once discovered, devices are readily accessible for tasks like backups, audits, configuration deployments, and command-line access. Users can schedule scans and the system allows for IP exclusions to ensure targeted discovery. This functionality provides IT teams with comprehensive network insights with minimal effort required. Supporting over 400 device types from more than 150 vendors, Unimus offers a vendor-agnostic approach to automation, change management, and configuration auditing. It minimizes the risk of manual errors, enhances security, and accelerates workflow — all without the need for any coding expertise.

Network Management

Unimus is the essential solution for Network Administrators seeking to gain complete control over their network configurations. With the ability to automate and oversee more than 400 device types from 150 different vendors, this on-premise tool puts you in charge of your network environment. Rather than merely receiving alerts about alterations, Unimus provides detailed insights into what precisely changed and allows you to review both current and historical configurations across your entire network. Take advantage of these insights by managing devices through the integrated Device CLI or by deploying configuration changes to thousands of devices in mere seconds—whether on an as-needed basis or according to a predetermined schedule. The robust RegEx-based Configuration Search feature enables you to quickly locate any needed information across your network. Unimus effortlessly integrates with your current tools through its API, NMS synchronization, and notifications sent via Email, Pushover, and Slack. By minimizing manual errors, mitigating risks, and enhancing team productivity—all without the need for scripting—Unimus streamlines your network management. Begin your journey to confident network management today. Experience Unimus with a complimentary lifetime license for 5 devices at unimus.net.

Network Security

Unimus is a comprehensive on-premise solution for Network Automation and Configuration Management (NCM) that prioritizes quick installation and user-friendliness. This platform enhances network security by offering a unified view of configurations and providing real-time alerts for unauthorized changes. Its robust API allows seamless integration with SIEM systems, enhancing overall visibility and supporting security operations. With Compliance Reporting features, Unimus ensures that configurations align with internal security standards and audit requirements. The Mass Config Push functionality facilitates scheduled firmware updates, enabling you to address vulnerabilities throughout your network efficiently, without the need for manual intervention. Supporting over 400 device types from more than 150 different manufacturers, Unimus serves as a vendor-agnostic platform for Network Automation, Change Management, and Configuration Auditing. It minimizes the risk of human errors, bolsters security, and accelerates operational processes, all while being accessible to users without programming expertise.

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Categories and Features

Application Delivery Controllers (ADC)

CGNAT
Content Redirection
IP Traffic Optimization
Load Balancing
Proxy / Reverse Proxy
SSL Offload
Server Health Monitoring
Traffic Chaining / Steering
Web Application Firewall (WAF)

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Business Intelligence

Ad Hoc Reports
Benchmarking
Budgeting & Forecasting
Dashboard
Data Analysis
Key Performance Indicators
Natural Language Generation (NLG)
Performance Metrics
Predictive Analytics
Profitability Analysis
Strategic Planning
Trend / Problem Indicators
Visual Analytics

Cloud Cost Management

Cost Reduction Optimization
Dashboard
Data Import/Export
Data Storage
Data Visualization
Resource Usage Reporting
Roles / Permissions
Spend and Cost Reporting

Configuration Management

Access Control / Permissions
Application Deployment
Automated Provisioning
Infrastructure Automation
Node Management
Orchestration
Reporting Analytics / Visualization
Task Management

Document Management

Access Controls
Archiving & Retention
Collaboration Tools
Compliance Tracking
Document Archiving
Document Assembly
Document Capture
Document Conversion
Document Delivery
Document Indexing
Document Retention
Electronic Signature
Email Management
File Recovery
File Type Conversion
Forms Management
Full Text Search
Offline Access
Optical Character Recognition
Print Management
Version Control

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

File Sync

Audit Trail
Backup and Recovery
Conflict Detection
Real Time Synchronization
Remote Synchronization
Synchronization Scheduling
Two-Way Synchronization

GRC

Auditing
Disaster Recovery
Environmental Compliance
IT Risk Management
Incident Management
Internal Controls Management
Operational Risk Management
Policy Management

Help Desk

Alerts / Escalation
Automated Routing
Community Forums
Customizable Branding
Document Storage
Email Integration
IT Asset Management
Incident Management
Interaction Tracking
Knowledge Base
Known Issue Management
Live Chat
Multi-Channel Communication
Multiple Brands / Products
Network Monitoring
Real-time Chat
Self Service Portal
Service Level Agreement (SLA) Management
Ticket Management

IT Asset Management

Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
IT Service Management
Inventory Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management

IT Management

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

IT Service

Contract Management
IT Asset Management
Incident Management
Knowledge Management
Release Management
Self Service Portal
Service Catalog
Service Reporting
Ticket Management

ITSM

Asset Tracking
Availability Management
Change Management
Configuration Management
Contract/License Management
Dashboard
Incident Management
Problem Management
Project Management
Release & Deployment Management
Self Service Portal

License Management

Automatic SKU Recognition
Central LM Server
Copy Protection
History Tracking
Node Management
Online Activation
Portable License
Sarbanes-Oxley Compliance
Timing Rights
Trial License

Mobile Device Management (MDM)

Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support

Network Access Control (NAC)

Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Patch Management

Alerts/Notifications
Automatic Approval
Automatic Patch Deployment
Automatic Scans
Compliance Management
Custom Patches
Dashboard
Network Wide Management
Patch Prioritization
Patch Testing
Remote Access/Control
Vulnerability Scanning

Project Portfolio Management

Budget Management
Collaboration
Dashboard
Issue Management
Milestone Tracking
Portfolio Management
Project Planning
Requirements Management
Resource Management
Status Tracking
Task Management
Time & Expense Tracking

Reporting

Customizable Dashboard
Data Source Connectors
Drag & Drop
Drill Down
Email Reports
Financial Reports
Forecasting
Marketing Reports
OLAP
Report Export
Sales Reports
Scheduled / Automated Reports

VPN

Anonymous Browsing
DNS Leak Protection
For Digital Security
For Financial Security
For Gaming
For Streaming
Kill Switch
Multi-Language
Multi-Protocol
Peer-to-Peer
Policy Management
Remote Access
Web Inspection
White Label

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Web Application Firewalls (WAF)

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Popular Alternatives

Open-AudIT Reviews & Ratings

Open-AudIT

FirstWave

Popular Alternatives

UVexplorer Reviews & Ratings

UVexplorer

UV Networks