Best ManageEngine Network Configuration Manager Alternatives in 2024

Find the top alternatives to ManageEngine Network Configuration Manager currently available. Compare ratings, reviews, pricing, and features of ManageEngine Network Configuration Manager alternatives in 2024. Slashdot lists the best ManageEngine Network Configuration Manager alternatives on the market that offer competing products that are similar to ManageEngine Network Configuration Manager. Sort through ManageEngine Network Configuration Manager alternatives below to make the best choice for your needs

  • 1
    BackBox Reviews
    See Software
    Learn More
    Compare Both
    Network engineers save time with the BackBox Automation Platform for Network Teams by quickly automating and auditing time consuming manual tasks. With a library of over 3,000 pre-built automations and a script-free way to build new ones BackBox makes it easy to get started on your automation journey. BackBox is a point-and-click automation solution for firewall and network device backups, OS updates and patching, configuration compliance audits and remediation, network vulnerability management, network configuration change management, and more.
  • 2
    PathSolutions TotalView Reviews
    Top Pick
    Top Pick See Software
    Learn More
    Compare Both
    TotalView offers network monitoring as well as root-cause troubleshooting of problems in plain-English. The solution monitors every device as well as every interface on every device. In addition, TotalView goes deep, collecting 19 error counters, performance, configuration, and connectedness so nothing is outside of it’s view. A built-in heuristics engine analyzes this information to produce plain-English answers to problems. Complex problems can now be solved by junior level engineers leaving the senior level engineers to work on more strategic level projects. The core product includes everything needed to run a perfectly healthy network: Configuration management, server monitoring, cloud service monitoring, IPAM, NetFlow, path mapping, and diagramming. Get Total Network Visibility on your network and solve more problems faster.
  • 3
    SaltStack Reviews
    SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure--on-prem, in the cloud, or at the edge. It is built on an event-driven automation engine that detects and responds intelligently to any system. This makes it a powerful solution for managing complex environments. SaltStack's new SecOps offering can detect security flaws and mis-configured systems. This powerful automation can detect and fix any issue quickly, allowing you and your team to keep your infrastructure secure, compliant, and up to date. Comply and Protect are both part of the SecOps suite. Comply scans for compliance with CIS, DISA, STIG, NIST and PCI standards. Also, scan your operating system for vulnerabilities and update it with patches and patches.
  • 4
    Cruz Operations Center (CruzOC) Reviews
    CruzOC is a multi-vendor, scalable network management and IT operations tool that provides robust but easy-to-use netops. CruzOC's integrated, automated management features include performance monitoring, configuration management, lifecycle management, and lifecycle management of 1000s of vendors. Administrators can use CruzOC to automate their data center operations and critical resources. This will improve network and service quality, speed up network deployments and lower operating expenses. The result is comprehensive and automated problem resolution from a single-pane-of-glass. Cruz Monitoring & Management. Monitoring & Analytics, NMS -- health, NPM traffic, log, and change. Automation & configuration management -- compliance and security -- orchestration, provisioning. Automated deployment -- auto-deploy, ZTP, remote deploy. Deployments are available both on-premises and in the cloud.
  • 5
    SolarWinds Patch Manager Reviews
    Software that allows you to quickly address software vulnerabilities with patch management software
  • 6
    Skybox Security Reviews
    Skybox's risk-based vulnerability management approach starts with new vulnerability data from your entire network, including physical IT, multicloud and operational technology (OT). Skybox assesses vulnerabilities without the need to scan. Skybox uses a variety of sources including asset and patch management systems as well as network devices. Skybox also collects, centralizes and merges data from multiple scanners to provide you with the most accurate vulnerability assessments. - Centralize and improve vulnerability management processes, from discovery to prioritization to remediation - Harness power vulnerability and asset data, network topology, and security controls - Use network simulation and attack simulation to identify exposed vulnerabilities - Augment vulnerability data by incorporating intelligence on the current threat environment - Learn your best remedy option, including patching and IPS signatures, as well as network-based changes
  • 7
    SolarWinds Kiwi CatTools Reviews
    Software for configuration management and network automation. Small business networks can have affordable network configuration management. Schedule automatic backups and roll out configuration changes on multiple devices simultaneously. You can pre-schedule changes in your network device configurations so they only occur on the devices that you select and when you want them. You can prevent any malicious activity by being alerted about changes to your network equipment. To avoid problems, rollback configuration changes quickly if necessary. Automated backups of network device configurations from switches, routers, firewalls, and other devices can be scheduled. It can be difficult to manage a single configuration change. This is not to mention the potential impact on your entire network. You can schedule or perform simultaneous configuration changes across multiple network devices. It could be a sign that something is more sinister than you realize.
  • 8
    SolarWinds Network Configuration Manager Reviews
    Automate network configuration management, compliance, and save time. This can help optimize IT resources and reduce costs. Automated network configuration management and backup can reduce costs, save time, and help you stay compliant. Don't worry about whether your inventory lists and spreadsheets are reliable, accurate, current, and reliable. SolarWinds®, Network Configuration Manager (NCM) allows you to quickly create an accurate inventory of all your network devices. You can use network scanning and discovery for up-to-date information about all network devices. It is crucial to compare network configurations quickly and accurately for a variety of reasons. One example is to verify against security policies to ensure there aren't any discrepancies between saved and running configurations. Another example is to quickly identify and correct any unauthorized or failed modifications. Automating network configuration management makes it easier to schedule regular backups.
  • 9
    Unimus Reviews

    Unimus

    Unimus

    $5.90 per device per year
    Our goal is to make automation, configuration auditing, disaster recovery, change management, and change management easy and affordable for any network size. Unimus can be deployed to manage your entire network in minutes. This allows for quick deployment and no headaches. Unimus was designed to be intuitive and easy to use, without the need to read pages upon pages of documentation. Unimus is easy to use via a web GUI. There is no need to learn a CLI, or work with configuration files. Unimus uses modern technology and conforms with modern security principles and application architecture. Unimus uses application-layer encryption to protect sensitive data. This helps with compliance without the need of database-level encryption.
  • 10
    TrueSight Automation for Networks Reviews
    Automation and configuration of networks for greater agility, security, efficiency, and speed. Automated vulnerability management to detect vulnerabilities, improve visibility, and respond quickly to threats across network devices. Integrate with NIST National Vulnerability Database security notifications and vendor to identify vulnerabilities, fix images and upgrade devices with minimal downtime. Automated roll-back and change tracking make it easy to make configuration changes across thousands network devices. You can control device access to view and change settings, and you can also deploy policies for regulatory standards like DISA and CIS. To meet business needs, quickly deploy new virtual or physical network devices with gold-standard configurations. View real-time configurations of devices to troubleshoot, see job status, or perform a compliance audit.
  • 11
    Itential Reviews
    You can quickly create flexible and reusable automations, or you can leverage Itential's pre-built automations to automate routine network operations tasks. This will allow you to reclaim your time and focus on more important network issues. You can define golden configuration standards for traditional and cloud networks. Additionally, you can leverage automation and compliance together to ensure that your entire network is compliant. Automate any use case in any network domain, including cloud, IP services and network applications. There are hundreds of integrations available that can be used to automate authentication, cloud, controllers, orchestrators, DevOps, NetOps tools and inventory. You can leverage a single, aggregated API to provide network self-service capabilities for other IT teams. This allows you to consume it easily.
  • 12
    racksnet Reviews
    Racksnet®, a network automation software, allows you to automate your IT network in any location, including campus, data center, WAN, or IoT. Racksnet® is a smart, convenient network automation software that relieves IT staff from repetitive, tedious and time-consuming tasks. Our customers can choose when, where, how, and on what site controllers they perform tasks. Absolute independence in time and place. It is possible to plan and configure important network tasks during core work hours and then have them completed on weekends. For the provisioning of network resources, there are no requirements to be on-site. All configurations can be deployed via racksnet®. Racksnet®, which allows for the separation of hardware and software, is a significantly better open networking technology than conventional systems.
  • 13
    Junos Security Director Reviews
    Security Director is your gateway to SASE. It bridges your current security deployments and your future SASE rollout. Security Director allows organizations to manage security anywhere, anytime, on-premise or in the cloud. It provides unified policy management that tracks users, devices and applications wherever they go. Policies can be created once, and then applied to all devices. Customers can simultaneously use Security Director Cloud and on premises instances to secure a transition to a SASE architecture. Security Director offers extensive security policy management and control via a centralized interface. Policies can be enforced across physical, virtual and containerized firewalls on-premises as well as across multiple clouds simultaneously. You can quickly manage all phases of your security policy lifecycle, including configuration and zero-touch provisioning, and gain insight into the risk sources across your network.
  • 14
    UVexplorer Reviews

    UVexplorer

    UV Networks

    $1,795 per year
    UVexplorer PRO automatically and quickly discovers all of the information about the devices on your network and the connections between them. The network maps are created for documentation, meetings, presentations, sharing with your boss, or hanging on the wall. UVexplorer PRO also backups and provides change notifications for configurations of your network devices, such as routers, switches, and firewalls. Track how device configurations change over time. UVexplorer Server is the WebUI of UVX PRO and provides silo'ed network maps for MSPs and large networks. The WebUI allows you to view each network and provide role-based access control to each technician. UVX Server is used across large networks with multiple agents. UVexplorer integrates directly into PRTG and LucidChart providing the maps directly into those systems. UVexplorer also exports the automated network maps in Microsoft Visio™, PDF, and SVG file types. Analyze and solve network and device problems with UVexplorer's suite of diagnostic tools. Find rogue IP/MAC addresses on your network, run Layer-2 traces, analyze real-time network interface performance, and much more.
  • 15
    Palo Alto Networks Panorama Reviews
    Panorama™, a centralized management tool that is easy to use, provides insight into network traffic and simplifies configurations. From one central location, you can create and edit security rules that are consistent with your organization's security policy. The Application Command Center (ACC), which provides comprehensive security management and protection, gives you visibility and actionable insights to network traffic and threats. The automated correlation engine can be used to reduce data clutter and help you identify compromised hosts and spot malicious behavior faster. You can manage up to 5,000 Next-Generation Firewalls or use the Panorama Interconnect plugin for centralizing configuration management for tens to thousands of devices. Panorama simplifies security with an intuitive user interface that allows you to monitor, configure, and automate security management.
  • 16
    opConfig Reviews
    opConfig automates everything, from config push to alerting about changes and enforcing compliance. Operational delegation can be introduced to your organization. This will allow troubleshooting of network devices without granting root access. You can implement your compliance policy using PCI-DSS and HIPPA, COBIT, and other industry standard rules (eg Cisco NSA) or create your own. All environments, hardware and software of all vendors, cloud-based, hybrid, and on-premise, are collected and backed up. opConfig allows you to create command sets that can be used for root cause analysis. Our software solutions can scale vertically or horizontally. Monitoring and management solutions have been provided for more than 200k nodes. Compare configuration data with older versions and against other devices. To ensure compliance, use compliance policies as a task list.
  • 17
    Lan-Secure Configuration Center Reviews
    Configuration Center allows you to manage and control network device configurations from any vendor that supports Telnet SSH or SNMP version 1/2/3 protocols. It can backup configurations, monitor history changes and compare changes. It can also restore configurations of network device. This software eliminates the need to use multiple vendor-specific configuration tools in multi-vendor devices environments and helps to control and minimize configuration errors in IT environments. Configuration Center software can monitor all devices from any location via Telnet and SSH shell protocols, and SNMP version 1/2/3 protocols. The software monitoring engine can either be run manually or automatically based on specific dates and time periods. It can execute commands, send SNMP traps, or notify users by email about specific configuration changes.
  • 18
    FireMon Reviews
    Comprehensive visibility across your entire network is essential for maintaining strong security and compliance. Learn how to gain real-time visibility into and control over complex hybrid network infrastructure, policies, and risk. Security Manager gives you real-time visibility, control and management of network security devices in hybrid cloud environments. It is a single pane. Security Manager offers automated compliance assessment capabilities that validate configuration requirements and alert when violations occur. Security Manager allows you to create customized reports or get audit reports right out of the box. This reduces the time spent configuring policies and gives security to ensure you are ready to meet regulatory or internal compliance audit requirements.
  • 19
    Cisco Defense Orchestrator Reviews
    Effective firewall management is now easy. Cisco Defense Orchestrator makes it easy to manage policies across Cisco firewalls as well as public cloud infrastructure. It is a cloud-based app that reduces complexity to save time and keep your company protected against the latest threats. Centralize network security policy management and device management. Reduce the time spent on repetitive security management tasks up to 90% To close security gaps and achieve consistent security, clean up policies. From a single console, manage security policy across Cisco Adaptive Security Appliance, Cisco Firepower, Meraki MX and Amazon Web Services. Analyze policies across security devices to find inconsistencies and errors. These errors can be corrected in seconds to improve security and device performance.
  • 20
    Restorepoint Reviews
    Restorepoint allows organizations to improve availability, security, and compliance by automating critical tasks within their multi-vendor infrastructures. Restorepoint automates network configuration backup and recovery, compliance analysis and change management for over 100 network and security vendors. A single solution for multi-vendor management can save you hours of network administration and auditing time. It also reduces risk. You can meet internal, best practice, and external network security standards like PCI, GDPR ITIL, ISO27001 NIST, SOX, HIPAA, NIST, SOX, SOX, and ITIL. Automate network changes, make complex network configuration modifications in seconds and see the results. Automate the discovery, management and tracking of your network assets. You can forget about maintaining spreadsheets for network asset management. You can save hours of administration each week by backing up network configurations without complicated scripts or manual processes.
  • 21
    Barracuda Cloud Security Guardian Reviews
    Barracuda Cloud Security Guardian provides a comprehensive platform for public cloud security and compliance orchestration. It continuously scans your infrastructure for misconfigurations and enforces security best practices. Barracuda Cloud Security Guardian monitors your compliance and security so that your developers can concentrate on what they do best: building great business applications.
  • 22
    WeConfig Reviews
    WeConfig makes network maintenance and configuration easier, more efficient, and more reliable. You can save many hours on the initial installation and ongoing maintenance of your network. Automating tedious tasks and deploying configuration updates in bulk can make them less time-consuming. WeConfig reduces the chance of configuration errors and optimizes network security. A well-managed network will reduce the risk of network failures by ensuring that it is properly monitored and maintained. The risk of unauthorized access is minimized by simple deployment of security features across the entire system. Security analysis allows you to identify and fix network vulnerabilities. WeConfig makes it easy for you to establish and maintain a strong network security standard. High network reliability through diagnostic tools WeConfig makes your network transparent, and collects all information in one place.
  • 23
    Net LineDancer Reviews
    Net LineDancer (NetLD), a simple but powerful NCCM software, is designed to assist network engineers in managing the configurations of network devices (routers and switches, etc.). In their companies. This is a great way to manage your network from one location, even if you have multiple subnets that share the same IP space. It provides an integrated Terminal Proxy, which allows users who have already authenticated into Net LineDancer SSH/Telnet into the network devices. Audit complete hardware inventory, including serial numbers for daughter cards, power-supplies, fan tray assemblies, and power-supplies. Cisco PnP devices can be used in conjunction with a Cisco PnP compliant server to provide "hands-free" configuration of new equipment within your network.
  • 24
    Cisco Prime Network Reviews
    Cisco Prime Network is a cost-effective solution for device administration, network fault-management, and device operation. This single solution allows service providers to reduce complexity and provide high-quality services. It supports both physical network components and the compute infrastructure. Automated network discovery, configuration, and change management can increase operational efficiency. Customer satisfaction is enhanced by proactive service assurance through postevent fault management, trend information, and proactive service assurance. Integration costs are reduced through preintegration using Cisco Prime Carrier Management suite, and northbound interfaces with third-party applications. Detailled end-to-end view of the physical and virtual network topology, inventory and infrastructure. Configuration of devices via GUI using prebuilt or downloadable scripts. Displays the most recent network events, state, configuration changes, and other information.
  • 25
    NetMRI Reviews
    Network infrastructures are more complex than ever. They are increasingly diverse, siloed, and powered by multiple vendors. IT administrators often have difficulty meeting the increasing demands for service delivery and reliability in these environments. Infoblox NetMRI can help. It is a network change management and configuration management solution that automates routine workflows like device provisioning and security operations. This allows for tighter compliance, faster incident response, and faster app deployment. Automatically identify all devices in your network, their locations, and how they connect together. Monitor and analyze network configurations in real time to spot potential problems before they become serious. NetMRI's automated management tools allow you to quickly provision new services and make network modifications in minutes, instead of waiting days or weeks.
  • 26
    Anuta ATOM Reviews
    Anuta ATOM will help you accelerate your automation journey. Monitoring & Closed-Loop Automation for Multi-Vendor Networks. One integrated solution that automates and monitors multi-vendor networks. Anuta ATOM supports all major vendors including Cisco, Juniper and Arista. F5 is also supported. Are you unable to find the network vendor that you are looking for Anuta ATOM's super extensible framework allows for quick turnaround times of 2-6 weeks for vendor adds. ATOM supports IPAM, ITSM tools and public cloud integrations. ATOM supports tight integration with ecosystem vendors to improve your network automation.
  • 27
    AppViewX AUTOMATION+ Reviews
    AUTOMATION+ is a tool that Enterprise IT uses to automate, manage, and orchestrate their application delivery and network security services. AUTOMATION+ gives you an application-centric view of the state of multi-cloud application delivery and network security infrastructures. Self-service automation workflows can be built by application, network, security, and engineering engineers to ensure compliance and business agility.
  • 28
    ThirdEye Reviews
    ThirdEye from LogicVein offers advanced network configuration and change management capabilities (NCCM) and network monitoring system for large enterprise data centres (NMS). ThirdEye integrates with the cloud and is ready to go. It includes all the tools, reporting and automation you need. ThirdEye will help you save time, reduce costs, and manage your configurations. You'll also be notified if your devices have any problems. ThirdEye offers all the functions and features of Net LineDancer with enhanced features that allow you monitor, alert, and generate traps for devices. You still have all the features in Net LineDancer but Thirdeye has enhanced performance monitoring and alarming. You can quickly check the status of each site or system by creating a dashboard.
  • 29
    WatchTower Security Management App Reviews
    You can monitor your network using Check Point's WatchTower Security Management App and respond quickly to security threats from anywhere with your mobile phone. The intuitive WatchTower Security Management App allows you to monitor your network in real time, alerts you when it is at risk, and configure security policies for multiple gateways. You can view all devices connected to your network as well as any security threats. Real-time notification for malicious attacks and unauthorized device connections. Block malware-infected devices quickly and view details to assist with further investigation. You can customize notifications to your top security events. You can view all security events by category. Click the link to drill down for more information. You can configure security settings for multiple gateways. Securely manage advanced security policy settings via the web user interface.
  • 30
    indeni Reviews
    Indeni's security infrastructure platform automates firewall health monitoring and automatically detects license expirations or misconfigurations before they impact network operations. It prioritizes issues automatically so that you only get the most important alerts. Indeni takes a snapshot of your cloud environment before it is built. Our cloud security analysis tool, Cloudrail, reviews your infrastructure-as-code files so you can identify violations earlier in development when they're easier to fix. Continuous detection of HA unreadiness due to cross-device inconsistencies with security policies, forwarding table, and other configurations. Consistent measurement that device configuration skews against locally-defined organizational standards. Collect relevant configuration and performance data from firewalls, load balancers and other security infrastructure.
  • 31
    The ZoneRanger Reviews
    ZoneRanger allows network operations teams to extend their management applications to networks that have been traditionally restricted by security restrictions. Network operations have complete visibility to their networks thanks to ZoneRanger, which allows them to capture 100% of all management traffic, regardless of protocol. Deep packet inspection (DPI), which offers enhanced security and remote airgap network monitoring, has a narrower attack surface due to minimized open firewall ports in your networks. This reduces the need for rule changes management and the possibility of human error. You can confidently deploy management applications in traditional DMZ, mixed-trust and zero trust networks. This provides transparency to management applications and end devices, statistical analysis of UDP trafic, and accelerated network Onboarding - particularly useful for managed service providers or large company mergers/divestures.
  • 32
    Stormshield Management Center Reviews
    All Stormshield Network Security firewalls can be managed from one location. Stormshield Management Center features make it easy to monitor, configure, and maintain your Stormshield Network Security firewalls. Our Stormshield Management Center solution (SMC), was designed to address the unique characteristics and requirements of multisite networks. It will impress you with its many benefits, including its operational simplicity. SMC allows you to exchange configuration and supervision data for SNS firewalls, while protecting their confidentiality. Its intuitive interface minimizes configuration errors and its global management of security policies and filtering policies eliminates repetitive tasks. This reduces maintenance time and allows you to focus on security operations with higher added value. The product sheet contains a more detailed list of SMC features.
  • 33
    AWS Firewall Manager Reviews
    AWS Firewall Manager allows you to centrally manage and configure firewall rules across all your accounts and applications within AWS Organization. Firewall Manager allows you to easily bring new applications and resources in compliance with a common set security rules. You now have one service that can create firewall rules, security policies, enforce them across your entire infrastructure in a consistent and hierarchical fashion. AWS Firewall Manager allows you to easily roll out AWS WAF Rules for your Application Load Balancers and API Gateways. AWS Shield Advanced protections can be created for your Application Load Balancers. ELB Classic Load Balancers. Elastic IP addresses and CloudFront distributions. AWS Firewall Manager allows you to enable security groups for Amazon EC2 or ENI resource types within Amazon VPCs.
  • 34
    Tufin Reviews
    Tufin allows organizations to automate their security policy visibility and risk management across their multi-vendor hybrid environment. Customers have visibility and control over their network. They can also ensure compliance with security standards throughout their development and workflows. Your organization's business agility will be improved by eliminating the security bottleneck. Manual approaches to managing network changes can be slow and error-prone, leading to potential security risks. Tufin's policy based automation is used by organizations around the globe to automate visibility, provisioning, and maximize business agility. In today's fragmented and complex networks, it is difficult to maintain and demonstrate compliance with industry regulations and internal policies. Tufin allows enterprises to maintain audit readiness and ensure continuous compliance.
  • 35
    AlgoSec Reviews
    Map, discover and migrate business applications to the cloud. Analyze security risks from a business perspective. Automate network security policy modifications - with zero touch. Link cyber-attacks with business processes. Automated discovery, mapping, and secure provisioning of network connectivity for business applications. All on-premise firewalls as well as cloud security groups can be managed from one window. Automate the security policy modification process, from planning through risk analysis, implementation, validation and validation. To minimize risk, avoid outages, and ensure compliance, proactively assess each security policy change. Automate the generation of audit-ready reports, which can reduce audit preparation time and costs by upto 80%. Reduce risk and clean up firewall rules - without affecting business requirements.
  • 36
    Multi-Domain Security Management Reviews
    Multi-Domain Security Management provides more security and control by dividing security management into multiple virtual realms. Virtual domains can be created by businesses of any size based on business unit, geography, or security function. This will simplify management and strengthen security. Allows for the isolation of roles and granular administration of multi-tenant security management architectures. One security management configuration for VPN and Firewall, IPS, or other protections. All network security management domains can be viewed, accessed and controlled from one console. Multiple administrators can be created and centrally managed in multi-domain security management environments. Administrators can be granted permission to manage specific domains and other aspects of the multidomain system. Multiple administrators can work simultaneously on different security management domains.
  • 37
    Forward Enterprise Reviews
    Forward Enterprise documents, verifies, predicts, and searches the behavior of your network. It creates an always-up-to-date software copy of your entire network infrastructure, both on-prem as well as in the cloud. It integrates seamlessly into existing network management tools and workflows thanks to its REST APIs. Forward Enterprise can be deployed either on-prem, or via cloud hosting to provide complete flexibility in implementation. Automatically create a network diagram that is accurate and complete with details about your environment. A complete inventory of all your hardware and software, across platforms and versions. Visualize the network-wide L2, 3 and 4 states and all device configurations. An intuitive and powerful tool allows you to search network behavior, configuration, and state network-wide. For fast root-cause isolation, and incident remediation, locate any device in your network including all connections.
  • 38
    OpenText Network Automation Reviews
    With proactive policy enforcement, audit and compliance reports, you can easily pass audits and comply with compliance requirements. You can improve your network security by identifying and fixing security flaws before they affect your network. Automating manual compliance and configuration tasks can reduce costs. Greenlight group helped a customer with over 4000 retail outlets automate their network provisioning. They also enabled Network Automation to facilitate hardware upgrades, which resulted in lower costs and better business support. Network stability and uptime can be increased by preventing misconfigurations and inconsistencies. Configuration changes can be used to determine if performance problems are related.
  • 39
    cBackup Reviews

    cBackup

    cBackup

    €480 per year
    cBackup offers network equipment configuration data backup on multiple platforms and devices. We add support for new devices regularly and distribute it through our content delivery system. It is important to not only back up the configuration but also to have version control in order to track changes. cBackup supports plain-text configurations with Git functionality. You can customize hardware support and set up discovery and backup policies in a highly configurable environment. Do not hesitate to share your customizations. Russian and English are supported out of the box. Transifex is available and everyone is invited to share their translations in other languages. cBackup is available under the AGPLv3 license. It is free to use without any hidden fees or feature limitations. Free of charge are also available new device support and policies.
  • 40
    Batfish Reviews
    Open-source network configuration analysis tool. Batfish detects errors and guarantees correctness of current or planned network configurations. It allows for safe and rapid network evolution without fear of security breaches or outages. Researchers at Microsoft Research, UCLA and USC originally created Batfish. It has been developed by many others. Intentionet maintains it, and also offers Batfish Enterprise, which extends and enhances Batfish's core capabilities. Batfish can be used to analyze firewall rules and ACLs. You can analyze forwarding paths using traceroute or reachability queries. Analyze the impact failures have on the network and perform Chaos Monkey-style testing. Analyze Batfish routing tables. An abstract representation is used to quickly analyze control planes. Network analysis in multivendor networks with Cisco, Arista and Cumulus.
  • 41
    NetYCE Reviews
    NetYCE platform does not function as an application. It is the ideal choice for those who need flexibility and agility, with plenty of room to grow. It is Full Stack which means that it comes out of the box with extensive functionality for configuration management, advanced monitoring, and standard automation use cases. It offers intent-based automation, as well as the flexibility to create your own logic and design rules. It is fully API-driven, open, and easy to maintain. Get insight into all network configuration changes. Automated validation across your entire network of policies and rules. Automate compliance and drive more changes with network automation. Integrate inventory, design modeling and collaboration can enforce network intent. NetYCE allows organizations to quickly build network automation solutions that can be managed, scaled, and secured. Its unique implementation approach and full-stack platform ensure rapid results with minimal risk.
  • 42
    RANCID Reviews
    RANCID monitors the configuration of a router (or any device) and uses CVS, Subversion, or Git to keep track of changes. RANCID also has looking glass software. It is based on Ed Kern's looking glass which was once used for http://nitrous.digex.net/, for the old-school folks who remember it. Our version adds functions, supports cisco and juniper and foundry, and uses the login scripts included with rancid. It can connect to your devices using telnet and ssh. Rancid supports Allied Telesis switches with AW+, Cisco routers and Juniper routers. It also supports Catalyst switches and Foundry switches (now Brocade), Redback NASs and ADC EZT3 muxes. It can also connect to HP Procurve switches, Alteon switches, MRTd (and therefore likely IRRd), and Alteon switches.
  • 43
    Pliant Reviews
    Top Pick
    Pliant's solution to IT Process Automation streamlines, secures, and simplifies the way teams build and deploy automation. Pliant will reduce human error, ensure compliance and increase your efficiency. Pliant allows you to integrate existing automation and create new automation using single-pane orchestration. You can ensure compliance with consistent, practical, built-in governance. Pliant has abstracted thousands from vendor APIs to create intelligent actions blocks that allow users to drag-and drop blocks rather than writing lines of code. Citizen developers can create consistent and meaningful automation across platforms and services in minutes. This allows them to maximize the value of the entire technology stack from one platform. We can add APIs in as little as 15 business days. This is an industry-leading timeframe.
  • 44
    Amdocs Network Optimization Suite Reviews
    Analytics-driven, scalable platform that provides a single workspace for all network optimization and analytics operations for 5G, 4G/LTE, and converged mobile networks. The most widely used multi-vendor, multitechnology optimization platform in the world. It enables planning, building, launch and management of all networks, from GSM to 5G/LTE, more efficiently and with better service quality. Our solution leverages drive, indoor configuration management, performance management, and subscriber trace data sources to enable countrywide analysis and benchmarking across the network. It also supports loading, processing and analysis of large data volumes via centralized and distributed deployment models. For maximum visibility and experience enhancement, map subscriber demand and experience down to the block/street level.
  • 45
    BlueCat Gateway Reviews
    End users can access self-service capabilities, making IT more accessible throughout the enterprise. Access an automation library that simplifies complex tasks and integrates with third-party solutions to increase the value of existing solutions. Automate the setup and teardown of cloud and on-premises resources. IT can respond quicker to requests. Increase visibility from the data centre to the cloud by continuous synchronization and discovery of cloud-based IP addresses and DNS-resources. Automating the reconciliation between DNS records and IP addresses reduces time and speeds up investigations. With centralized management and integration to native DNS and IP configuration services within public clouds, you can accelerate application delivery and eliminate outages. Flexible control over DNS failover manual or automatic allows you to align custom network emergency plans.
  • 46
    rConfig Reviews

    rConfig

    rConfig

    €499 per year
    rConfig, an open-source utility for network device configuration management, takes frequent configuration snapshots of devices. Open source, built by Network Architects. We have the right tools to help you! rConfig can be used as an open-source project. The professional version is available. It is built on top of Vuejs and Laravel open-source software. You can take snapshots of your routing tables, arp, and mac tables as well as run configs or any other show commands. Check the status of your network devices at any time. rConfig makes it easy to deliver configs faster via simple automation capabilities and intuitive. rConfig has enhanced security to protect your assets. Future releases will include more. SSO, config encryption and MFA are some of the features. You can add customizations to rConfig or buy support for priority feature enhancements to your rConfig installation.
  • 47
    Cisco FlexConnect Reviews
    FlexConnect is a wireless solution that can be used to deploy branch offices and remote offices. Customers can configure and control access point (AP) in a branch office or remote office via a wide area network link (WAN), without the need to deploy a controller in each of their offices. FlexConnect access points can be used to switch client data traffic locally, and perform client authentication locally if their connection to the controller goes down. They can also send traffic back and forth to the controller when they are connected to it. The FlexConnect access point can also perform local authentication in the connected mode. FlexConnect APs can tunnel client data in CAPWAP over the controller (called Central Switching) or allow client data to egress at the AP’s LAN port (called local switching). Locally Switched WLANs allow the AP to tag client traffic in separate VLANs. This allows the AP to segregate the traffic from its management interface.
  • 48
    Cisco ACI Reviews
    Automated resource management can help you achieve greater resource flexibility. For security, governance, compliance, and compliance, ensure consistent policy management across multiple cloud and on-premise instances. A zero-trust security model ensures business continuity, disaster recovery, high-security networking, and secure networking. Transform Day 2 operations into a proactive model that automates troubleshooting, root cause analysis, and remediation. It optimizes performance and allows for single-click access to facilitate automation and central management. On-premises ACI networks can be extended to remote locations, bare metal clouds, and colocation providers that don't require hardware. Cisco's Multi-Site Orchestrator provides provisioning and health monitoring and manages Cisco ACI network policies. This solution automates network connectivity, provides consistent policy management and simplifies operations for multicloud environments.
  • 49
    Outpost24 Reviews
    With continuous security testing across all networks, devices, containers, and applications, you can better understand your attack surface and reduce cyber exposure to an attacker. You won't get any help if you have only limited information. Even the most experienced security personnel can be overwhelmed by the sheer volume of alerts and vulnerabilities that they must deal with. Our tools are powered by threat intelligence and machine-learning and provide risk-based insight to help prioritize remediation and decrease time to patch. Our predictive risk-based vulnerability management tools make your network security proactive. This will help you reduce the time it takes to patch and more efficiently remediate. This industry-leading process continuously identifies application flaws and secures your SDLC for faster and safer software releases. Cloud workload analytics, CIS configuration assessment, and contain inspection for multi- and hybrid clouds will help you secure your cloud migration.
  • 50
    Cisco DNA Center Reviews
    Cisco DNA Center is your network management and command centre for Cisco DNA, the enterprise's intent-based network. In minutes, you can configure and provision all your network devices. Advanced artificial intelligence (AI), and machine learning (ML), can be used to monitor, troubleshoot and optimize your network. Integrate with third party systems to improve operational processes. Cisco DNA Center, a powerful network controller, management dashboard, and management dashboard, can help you take control of your network, optimize Cisco investment, lower your IT costs, and manage your network. Transform business intent into zero trust network policies. Identify all endpoints, optimize user experience based upon business requirements. Automate the deployment and management network devices and integrate security solutions to increase consistency across configurations, reduce errors and save time.