fbpx
Chanoch Marmorstein

About Chanoch Marmorstein

This author has not yet filled in any details.
So far Chanoch Marmorstein has created 18 blog entries.

Why Your Organization Needs Intelligent Automation

By | 2019-01-14T07:33:21+00:00 January 15th, 2019|Blog, Featured, Product|

Why Your Organization Needs Intelligent Automation?   All organizations rely on a network comprised of both hardware and software. While the interconnected systems make everything more convenient, it is an arduous task to maintain every device on the network. Ensuring that every device has received a firmware update manually can be very time-consuming.

Network Monitoring | Improve Security & Efficiency

By | 2018-12-30T07:12:45+00:00 January 1st, 2019|Blog, Featured, Product|

Network Monitoring: How Can You Improve Security and Efficiency?   All major industries have been digitized and operate on networks of systems. Just installing networking systems is not enough for an organization to operate smoothly. Systems and entire networks have to undergo health checks to ensure that nothing goes wrong when least expected. With so

Why You Need Network Visualization Software | BackBox

By | 2018-12-11T11:32:25+00:00 December 9th, 2018|Blog, Featured, Product|

Why You Need Network Visualization Software   Most businesses operate using a large number of computers and different software. The hardware and software don’t exist in isolation, but all the parts come together to form a network. With the network in place, businesses can share information between different employees and make processes flow more easily.

The Importance of Identity and Access Management | BackBox

By | 2018-11-27T13:09:25+00:00 November 27th, 2018|Blog, Featured, Product|

The Importance of Identity and Access Management   When working with a large network of hardware and software systems, it becomes important to monitor what is being accessed on these systems. It is virtually impossible, for one person, to keep an eye on every single machine that is being used in a company setup. And

Automating Network Configuration Changes – Check Point API

By | 2019-01-03T07:07:09+00:00 November 11th, 2018|Product, Use Case Series|

Use Case: Automating Network Configuration Changes with Check Point API’s   Network automation is gaining more importance in today’s ever-growing, complex networks. The ability to automate the management of network configurations in an intelligent way, can allow the security and network administrators to focus their efforts on other tasks.   BackBox Task Automation One of

New Hardware Disaster Recovery

By | 2019-01-03T11:09:27+00:00 November 11th, 2018|Product, Use Case Series|

Use Case: Disaster Recovery on New Hardware Platform   Situation Disaster recovery procedures dictate the need to automate network and security device configuration. It's best practice to keep versioning the configuration so it can be restored immediately if a disaster occurs. Additionally, verification of the configuration should be done during the backup procedure. When a

Restoring Device Configuration – Disaster Recovery

By | 2019-01-03T07:25:00+00:00 November 11th, 2018|Product, Use Case Series|

Use Case: Restoring Device Configuration to a Previous state   Situation Disaster recovery procedures dictate the need to automate network and security device configuration. It's best practice to keep versioning the configuration so it can be restored immediately if a disaster occurs. Additionally, verification of the configuration should be done during the backup procedure. Situations

Automate Cisco IOS Upgrade Proces

By | 2019-01-03T05:38:02+00:00 November 11th, 2018|Product, Use Case Series|

Use Case: Automate the Upgrade Process of Cisco IOS   Situation Occasionally organisations are confronted with the challenge of upgrading their network and security devices to latest firmware or patch version. These situations are very critical in the lifecycle of a device and although needed, can cause a lot of issues if not executed properly.

Security Configurations & Firewall Upgrades

By | 2019-01-03T06:28:30+00:00 November 8th, 2018|Product, Use Case Series|

Use Case: Security Network Configuration Changed by A Firewall Upgrade   Situation From time to time organizations encounter the need of upgrading their network and security devices to latest firmware or patch version. These situations are very critical in the lifecycle of a device and although needed, can cause a lot of issues. A variety

Multiple Device Configuration Commands – Use Case – BackBox Software

By | 2018-12-13T08:58:24+00:00 November 8th, 2018|Product, Use Case Series|

Use Case: Push Bulk Network Configuration Commands To Multiple Devices   Situation When organizations grow, network and security teams deal with a variety of challenges. One of the challenges they face is handling network configuration for their devices properly and implementing their existing configuration onto the new network and security devices. When an organisation wants

USERS

Need help? BackBox Engineers are standing by.
SUPPORT PORTAL

PARTNERS

Possible opportunity? Register new deals here.
PARTNER PORTAL

EVERYONE

Looking for something else? Contact us.
CONTACT US