Network Automation

From 3 hours to 7 minutes per HA pair: Time Saved by Automating Certificate Management

A blog series that shines a spotlight on real-world moments where network engineers use BackBox security-centric automation to save their organizations from costly downtime and surprises. Synopsis All firewall vendors require that their customers keep their certificates up to date. It’s a mandatory but time-consuming and tedious administrative task that’s error-prone and usually happens at

Ransomware and Your Network

Introduction: ransomware entry and propagation Network teams and the devices they manage are not the usual audience for discussions about ransomware. Ransomware affects endpoints and is often the purview of IT administrators and security teams. However, there are things that network teams can do to help prevent ransomware from entering the enterprise, and should it

How an MSSP Turned an Upgrade Issue into a Customer Confidence Builder

A blog series that shines a spotlight on real-world moments where network engineers use BackBox security-centric automation to save their organizations from costly downtime and surprises. Synopsis During a planned maintenance window for firewall upgrades, a Managed Security Service Provider (MSSP) customer of BackBox encountered an issue that required considerable time to troubleshoot and resolve.

Why Automate?

Here at BackBox we talk about automation as if it’s the correct choice for everyone, without questioning why that might be. I mean, we get into features, and we’ve got the best backup solution, etc. ” … there’s a lot of network automation and infrastructure automation going on right now,” <— that’s from a Network

BackBox Introduces Network Vulnerability Manager (NVM)

BackBox is the first and only network automation platform to help network superheroes both track and remediate network and security device vulnerabilities (CVEs and more) in a way that especially designed for network teams. NVM gives administrators the tools to protect their networks by tying together device inventory with a threat and vulnerability intelligence feed.