Unimus Description

Our goal is to make automation, configuration auditing, disaster recovery, change management, and change management easy and affordable for any network size. Unimus can be deployed to manage your entire network in minutes. This allows for quick deployment and no headaches. Unimus was designed to be intuitive and easy to use, without the need to read pages upon pages of documentation. Unimus is easy to use via a web GUI. There is no need to learn a CLI, or work with configuration files. Unimus uses modern technology and conforms with modern security principles and application architecture. Unimus uses application-layer encryption to protect sensitive data. This helps with compliance without the need of database-level encryption.

Pricing

Pricing Starts At:
$5.90 per device per year
Free Version:
Yes
Free Trial:
Yes

Integrations

API:
Yes, Unimus has an API

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Unimus
Year Founded:
2016
Headquarters:
Slovakia
Website:
unimus.net
Update This Listing
Recommended Products
Twilio Segment - the Leading Customer Data Platform Icon
Twilio Segment - the Leading Customer Data Platform

Get started with a free Segment account and access 450+ integrations, features and capabilities.

We’ll show you how Segment helps 25,000+ businesses to collect, clean, and activate their data. Twilio is the #1 CDP for market share four years in a row per IDC (2019-2022).

Product Details

Platforms
Windows
Mac
Linux
Type of Training
Documentation
Videos
Customer Support
Phone Support
24/7 Live Support
Online

Unimus Features and Options

Configuration Management Software

Access Control / Permissions
Application Deployment
Automated Provisioning
Infrastructure Automation
Node Management
Orchestration
Reporting Analytics / Visualization
Task Management

Network Automation Software

Compliance Monitoring
Configuration Backup
Configuration Changes
Network Orchestration
Performance Monitoring
Tool Access Control
Vulnerability Assessments