Cyber Resilience

Network configuration management

What is Network Configuration Management?

Network configuration management is a set of tools or capabilities that support network engineers in performing their day-to-day roles in managing the lifecycle of network devices, including monitoring, maintaining, and updating configurations. These solutions are meant to improve team efficiency and reduce manual errors that result from the tedious task of device administration. Key components […]

Network automation

Why Automate?

At BackBox, we discuss automation as if it’s the best choice for everyone without questioning why that may be the case. We talk about features, and we have the best backup solution, among other things. Why would you automate? What are you doing today that would benefit from some automation, particularly the kind that aligns

Modern IT network concept of sleek, unified automation dashboard connecting on-prem and cloud devices

Five Common Questions About Configuration Management

We’ve explained the difference between traditional and modern approaches to network configuration management and the features to look for in a solution. Here, we thought we’d share a few questions network and security teams often ask, and you may also be wondering about them. 1. What is the impact of automation on our internal processes?

BackBox Platform Home Page

Announcing BackBox Platform Release 8.0

BackBox is thrilled to announce that the latest innovation in our network cyber resilience platform, BackBox 8.0, will soon be available! To learn about the release, you can register for our upcoming webinar or visit our What’s New page. As we have journeyed with our customers and partners over the past year, we have noticed

Firewall security graphic highlighting network security

7 Firewall Best Practices for Securing Your Network

Network security and reliability are paramount to business success. For network administrators, a network firewall is the most crucial security tool for network cyber resilience, so it has to be as robust as possible. However, network firewall configuration can be challenging as you have to strike the perfect balance between security and user performance. Cyber

Q&A: Fireside Chat with Rekha Shenoy on Cyber Resilience in 2025

Originally shared on March 27, 2025, by ITProToday, Information Week Virtual Event and edited for length and clarity. This event focused on cyber resilience in 2025 and explored strategies for maintaining business continuity. BackBox CEO, Rekha Shenoy, addressed this challenge during a fireside chat, highlighting that cyber resilience necessitates a more continuous approach to remediation.

AI and Automation: Key Pillars for Building Cyber Resilience

Originally published in Cybersecurity Insiders on March 7, 2025 According to Gartner’s latest Hype Cycle for I&O Automation, by 2026, 50% of enterprises are expected to use AI functions to automate Day 2 network operations, compared to fewer than 10% in 2023. This is where the newest innovation in AI, distinct from ML, is enabling additional

vulnerability lifecycle

Managing the Vulnerability Lifecycle with Intelligence and Speed

Vulnerability management is a fundamental element of cyber hygiene. So, why do 56% of organizations report that their most recent data breach resulted from a known vulnerability not properly patched or addressed? As networks become more complex and include network and security devices from multiple vendors, vulnerabilities increase, putting pressure on teams to identify and

Fortinet Addresses Multiple Critical and High-Risk Flaws

This month, Fortinet released a significant security update that addressed multiple vulnerabilities. This addresses issues across its product portfolio, including FortiOS, FortiProxy, FortiManager, and FortiAnalyzer. Such disclosures are not uncommon. However, they pose a challenge to network and security professionals striving to secure their networks. Already overwhelmed, news of new vulnerabilities might not even cut