Best Configuration Management Software of 2024

Find and compare the best Configuration Management software in 2024

Use the comparison tool below to compare the top Configuration Management software on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Itential Reviews
    You can quickly create flexible and reusable automations, or you can leverage Itential's pre-built automations to automate routine network operations tasks. This will allow you to reclaim your time and focus on more important network issues. You can define golden configuration standards for traditional and cloud networks. Additionally, you can leverage automation and compliance together to ensure that your entire network is compliant. Automate any use case in any network domain, including cloud, IP services and network applications. There are hundreds of integrations available that can be used to automate authentication, cloud, controllers, orchestrators, DevOps, NetOps tools and inventory. You can leverage a single, aggregated API to provide network self-service capabilities for other IT teams. This allows you to consume it easily.
  • 2
    Micro Focus Dimensions CM Reviews
    This allows for parallel collaborative development to reduce rework, visualize, reduce conflict, and lower team risk. It also improves team velocity and throughput. It preserves the integrity of baseline configurations, simplifies rollback, recovery, streamlines approval, and keeps integrity when automating builds or deployments. It is much easier to identify issues early in the lifecycle. CM allows issues can be identified as soon a code commit is made via Pulse. All actions drive shift left: CI build, unit testing and code review. Integration with developer friendly repositories, IDEs (such git, IntelliJ Eclipse, Microsoft.net), detailed auditing, logging, immutable versioning, and history Reduces preparation time and effort for regulatory compliance and audits with a comprehensive audit trail and tamperproof history.
  • 3
    VerifyTool Reviews
    VerifyTool is a powerful tool that was developed in Go. It is intended for software developers, DevOps Engineers, IT administrators, and security experts. It helps to protect the integrity of files. VerifyTool is a great tool for professionals who are concerned about security and need to verify the authenticity of files. This tool performs two crucial operations: scan and compare. The scan operation analyzes the directory to generate a report that contains all the necessary information about the files. The compare operation compares two reports to show the difference. This helps in detecting any unauthorised changes in the files.
  • 4
    DriveLock Reviews
    DriveLock makes it easy to protect your business data, IT systems and endpoints. DriveLock makes it easier than you might think. We share our knowledge and use the latest technologies. You don't need to worry about data security throughout its lifecycle or across all your endpoints. DriveLock Zero Trust Platform - Instead of closing gaps in an environment with independent and individual security silos, this model prevents access to all data. DriveLock’s centralized policies only allow access to data and applications needed by individual employees and endpoints, in line with the maxim “never trust, never verify”.
  • 5
    PerfectScale Reviews
    PerfectScale delivers comprehensive visibility and data driven intelligence across large distributed systems. We provide DevOps teams and SRE teams the data they need to correctly size their K8s environments, and meet demand. PerfectScale automates your cloud costs and keeps your environment stable and resilient by reducing manual effort and labor. Our safe, autonomous actions, which are constantly calibrated to your environment's changing demand, configurations and code releases, ensure that you always meet the demand in the most cost effective way possible. Eliminate misconfigurations before they cause SLA breaches and compromise performance and resilience. PerfectScale automatically eliminates errors in under-provisioning that cause downtime, latency, and outages.
  • 6
    IBM Rational Synergy Reviews
    Software configuration management solution that is task-based and brings together distributed teams of developers worldwide on a single platform. IBM®, Rational®, Synergy (SCM) is a task-based software configuration management (SCM), solution that brings together global, distributed developers on a single platform. It offers capabilities that enable software and systems developers to collaborate and work faster. IBM Rational Synergy assists software delivery teams to manage global collaboration's complexity and improves overall productivity.
  • 7
    Auto-Trol Reviews
    Using a powerful, flexible, and extensible tool-set, optimize and streamline technical illustration creation, configuration, and management to improve product cycle. The IgniteTechAuto-Trol technical configuration tool includes two products: Konfig (or Technical Illustrator). Konfig is a single configuration management tool that integrates electronic document/data management, product data/lifecycle management and workflow capabilities into a single integrated solution. Technical Illustrator is a computer aided design (CAD), software that creates and manages technical illustrations. Effectively store documents, manage version control, and automate workflows. Your company relies on detailed technical illustrations to ensure product assembly, service, support, and training.
  • 8
    Tripwire Reviews
    Cybersecurity for Industrial and Enterprise Organizations. The industry's most trusted foundational security controls will protect you from cyberattacks. Tripwire is able to detect threats, identify vulnerabilities, and harden configurations instantly. Tripwire Enterprise is trusted by thousands of organizations as the heart of their cybersecurity programs. You can join them and have complete control of your IT environment using sophisticated FIM/SCM. Reduces the time required to detect and limit damage caused by anomalies, threats, and suspicious behavior. You have a clear, unrivalled view of your security system status and can assess your security posture at any time. Integrates with existing toolsets of both IT and security to close the gap between IT & security. Policies and platforms that go beyond the box enforce regulatory compliance standards.
  • 9
    IBM Rational ClearCase Reviews
    IBM Rational ClearCase allows for restricted access to software assets such as code, requirements, designs, models, test plans, and test results. It offers parallel development support, automated workspace and baseline management, secure version management and reliable build auditing. You can also access it virtually anywhere, anytime. You can delete older versions, create and delete branch, list version histories, compare and merge versions. It provides development and integration models, private workspaces, and public integration areas. Allows for user authentication and audit trails, which help you meet compliance requirements with minimum administrative hassle. This program allows you to manage your personal workspaces and gives you access to the file versions and directories you need.
  • 10
    Micro Focus OpsBridge Reviews
    Micro Focus®, Operations Bridge (OpsBridge), monitors your IT environment, consolidates data from existing tools, and provides analytics. It automates data discovery, monitoring, analysis, and remediation across traditional, private and public, multi-cloud, container-based infrastructure. OpsBridge automates AIOps using machine learning and analytics. This reduces the number of events and speeds up root cause identification and remediation. Executive stakeholders get actionable insight into their mobile devices through tailored dashboards that show key status, business and IT KPIs. Hybrid IT is quickly becoming the norm, and IT operations teams must be able to meet the business's needs. They must be able offer both cloud and on-premises options to support critical business services and applications. They must be able to adapt quickly to new technologies and seamlessly adopt new cloud vendors and other services selected by the business.
  • 11
    Vagrant Reviews
    Vagrant allows you to create and manage virtual machine environments using a single workflow. Vagrant is a tool that automates the creation of virtual machine environments. It has an easy-to use workflow and focuses on automation.
  • 12
    AccuRev Reviews

    AccuRev

    Micro Focus

    AccuRev provides solutions to optimize, automate and accelerate the software development process in organizations that use Agile, waterfall, hybrid or hybrid development processes. Multiple codebases can be supported at different levels of complexity. TimeSafe ensures reproducibility of source base and allows for a strong audit trail. Change Packages ensure that stories, issues, or defects are identified in a release. The "change asset" can be traced throughout the entire SDLC. Graphically modeling the development process allows you to dynamically manage all "in-progress" changes across the entire development organization. AccuRev is tightly integrated with the Eclipse, Visual Studio and IntelliJ Integrated Development Environments. This allows developers to work in one integrated environment without having to switch between AccuRev and an IDE.
  • 13
    AWS OpsWorks Reviews
    AWS OpsWorks provides managed instances for Chef and Puppet. Chef and Puppet allow you to use code in order to automate your server configurations. OpsWorks allows you to use Chef and Puppet in order to automate the configuration, deployment, and management of servers across your Amazon EC2 instances and on-premises compute environments.
  • 14
    Cisco Intersight Reviews
    Cisco Intersight, Cisco's system management platform, delivers intuitive computing via cloud-powered intelligence. This platform provides a more intelligent level in management that allows IT organizations to analyze, simplify and automate their environments in a way that was not possible with previous generations of tools. This capability allows organizations to save significant amounts on Total Cost of Ownership (TCO), and to deliver applications faster to support new business initiatives.
  • 15
    Hillstone Security Management Platform Reviews
    Hillstone's Security Manager improves network security by allowing businesses the ability to segment their networks into multiple virtual realms. Domains can be created based on business unit, geography, or security function. It allows Hillstone to manage its infrastructure with the flexibility it needs. It simplifies configuration, accelerates deployment cycles, and reduces management overhead.
  • 16
    Quali CloudShell Reviews
    All the best practices, none of the bottlenecks Automate multi-cloud provisioning, deployment, policy-driven compliance, and cloud cost management.
  • 17
    RANCID Reviews
    RANCID monitors the configuration of a router (or any device) and uses CVS, Subversion, or Git to keep track of changes. RANCID also has looking glass software. It is based on Ed Kern's looking glass which was once used for http://nitrous.digex.net/, for the old-school folks who remember it. Our version adds functions, supports cisco and juniper and foundry, and uses the login scripts included with rancid. It can connect to your devices using telnet and ssh. Rancid supports Allied Telesis switches with AW+, Cisco routers and Juniper routers. It also supports Catalyst switches and Foundry switches (now Brocade), Redback NASs and ADC EZT3 muxes. It can also connect to HP Procurve switches, Alteon switches, MRTd (and therefore likely IRRd), and Alteon switches.
  • 18
    racksnet Reviews
    Racksnet®, a network automation software, allows you to automate your IT network in any location, including campus, data center, WAN, or IoT. Racksnet® is a smart, convenient network automation software that relieves IT staff from repetitive, tedious and time-consuming tasks. Our customers can choose when, where, how, and on what site controllers they perform tasks. Absolute independence in time and place. It is possible to plan and configure important network tasks during core work hours and then have them completed on weekends. For the provisioning of network resources, there are no requirements to be on-site. All configurations can be deployed via racksnet®. Racksnet®, which allows for the separation of hardware and software, is a significantly better open networking technology than conventional systems.
  • 19
    CA Panvalet Reviews
    It reduces the complexity and overhead of maintaining business applications by providing a single repository that allows visibility to and control over your entire programming environment. CA Panvalet maintains and protects a control repository of source programs, JCL, and card-image data files. It allows for immediate maintenance and processing, as well as effective control and protection against theft and other losses. CA Panvalet is a tool that can improve staff efficiency, enable reliable change management, and improve machine performance. It provides a central library on a DASD (direct access storage device) and automates resource-intensive manual processes. Allows you to quickly access application components, streamlining application development. Protects against accidental loss of source code or other program assets. Reduces the complexity and overhead involved in developing applications.
  • 20
    Opsera Reviews
    We take care of everything. You can create the perfect CI/CD platform that meets your company's needs with zero vendor lock-in. Stop building toolchain automation and stop writing manual scripts. Your engineers can now focus on your core business. The declarative model of pipeline workflows allows you to focus on what's required, not how it's done. This includes software builds, security scans and unit testing, as well as deployments. Blueprints allows you to diagnose any failures within Opsera by displaying the console output of each step of your pipeline execution. Comprehensive software delivery analytics for your CI/CD process in one view. This includes Lead Time, Change Failure Ratio, Deployment Frequency and Time to Restore. Contextualized logs allow for faster resolution, improved auditing, and compliance.
  • 21
    FNT Command Platform Reviews
    FNT Command provides complete transparency into all IT and telecoms structures. It can be used to manage IT assets, cabling, infrastructure, data centers and telecommunications resources. FNT Command allows the provision of high-value IT services and telecommunications services. We approach all resources holistically, from cabling to service provision, just like our customers. Data centers must address issues such as budget and cost pressures, service delivery bottlenecks, compliance guidelines, and capacity bottlenecks. FNT Command is a centralized management and optimization tool that gives you complete visibility into your entire data center infrastructure. This includes the facility level, hardware and software, networking, power and air conditioning. This comprehensive view allows you to improve operational reliability and speed up your day-today business processes.
  • 22
    Right Click Tools Reviews
    Every environment has potential vulnerabilities. It is nearly impossible to find and address all of them without the right tools. Right Click Tools reduces enterprise risk by ensuring compliance with encryption, privileged login, software updates and more. Automating repetitive and error-prone processes can save you hundreds of hours each year. Empower your team with the ability to surface critical information, reveal vulnerabilities, quickly rectify issues, ensure compliance and enhance security. You may be worried about certain aspects of the system management infrastructure. Be sure to do what you plan to manage. With Right Click Tools, you can achieve and maintain your system management goals more easily and reliably than ever before.
  • 23
    ServiceNow IT Service Management Reviews
    Deliver resilient IT services, and create experiences to help your team be more productive. AI and machine-learning can help you resolve issues faster and accelerate innovation, all using a single cloud platform. Consolidate IT tools and services to simplify your business and deliver modern IT experiences. Automate critical processes and run them on the Now Platform - a single system for action in the enterprise. Increase the productivity of your IT staff by reducing the workload. AI-assisted Intelligence helps you identify, track and resolve incidents quickly. Virtual agents that speak natural language can provide instant solutions to repetitive IT tasks. ITSM comes with powerful platform capabilities that allow you to optimize processes, create seamless customer experiences, and create new value through innovation. Transform your enterprise with a single platform.
  • 24
    Azure App Configuration Reviews
    Store configurations for all Azure apps in one universal location. Manage configurations in real-time, with accuracy and reliability, without impacting customers, by avoiding lengthy redeployments. Azure App Configuration was designed for speed, scalability and security. You can toggle specific features behind feature tags and fix critical issues in real-time. You have more control over your program when you avoid costly redeployments. Modern programs, particularly those that run in the cloud, have multiple distributed components. Spreading configuration settings over these components can lead to difficult-to-resolve errors during application deployments. These errors can be eliminated by using a single configuration store that contains all your settings.
  • 25
    Ivanti Patch Management Reviews
    Most exploits target known vulnerabilities--those for which a patch has been available for at least a year. To ensure that systems are properly patched, you can't rely only on manual processes or users. Ivanti DSM incorporates Patch Management to identify and fix vulnerabilities across heterogeneous OSes and configurations. This includes all major third-party applications. Your entire organization is protected from all threats, including those that affect your servers, desktops, or laptops.