Get your evenings and weekends back
With over 3,000 pre-built automations and a no-code way to build new ones, BackBox lets you confidently automate critical tasks like OS Upgrades, Backups, and Configuration Compliance.Start A Trial
Enabling Flexible, Scalable, More Efficient Organization Management
Built from the ground up as a multitenant solution, BackBox enables simplified management of multiple, complex networks at scale, making it especially valuable to managed service providers (MSPs), federated management teams, and other large organizations requiring shared, auditable, and scalable infrastructures.
Role-Based, Streamlined Administration
BackBox has standalone capabilities for flexible mapping of roles to privileges, while also providing integration with both password vaults and SSO solutions to simplify security. This streamlines administration across Sites while providing restricted roles-based access for runbook automation, allowing for flexible, secure, and auditable delegation of network tasks.
Maximum Deployment Flexibility
Diverse Deployment Models
The BackBox automation platform can run on-premise, in the cloud, or as a service, giving customers and MSPs maximum deployment flexibility.
BackBox can connect to devices either directly or through an agent, so your network and site architecture requirements are never restricted.
Powerful Robust Automation Library
Proven, Reliable Backups
If you can’t trust the validity of your backup, it’s not worth much. That’s why BackBox ensures success by validating every single one of your backups with an intensive verification process – first when it’s created, and then again before restoring. Specifically, we check for the most common indications of a corrupted backup:
- File corruption
- Zero-byte backup
- File integrity
- File size deviation
A suite of other valuable protection benefits:
By collecting license keys and other metadata, rapid restores can happen straight from BackBox to bare metal as long as the new device can be reached by an IP address.
Dynamic Metadata Collection
Without any extra overhead, our Dynamic Inventory feature actively empowers CMDBs and other inventory systems.
Your devices’ backups histories can be used as a powerful tool for troubleshooting, allowing you to compare changes over time, or — better yet — to prevent configuration drift by notifying administrators of changes before they become a risk to the organization.
Flexible, Efficient OS Update Automation
BackBox's robust Automation Library contains flexible upgrade automations, including multi-step upgrade automation flows. Our award-winning, trusted backup automations will backup your devices before and after any changes, ensuring that your networks can be restored with just a single click. Automations are also "high-availability aware" to ensure that upgrades are done with careful consideration to the operating theater.
Save your organization:
Managing OS updates in large networks can be complex, grueling, full-time work. Automating OS updates can save your organization hundreds–if not thousands–of employee work-hours, freeing your people to do something more meaningful, while minimizing errors. Our pre-built automations can be easily customized to fit into any organization's internal processes, with pre- and post-check tasks ensuring that each step of the upgrade process is successful and includes verification. Additionally, BackBox updates network inventory and compliance systems, so that all tracking is updated as part of the upgrade process.
Secure Your Network
Vendors are often late to issue vulnerability patches, leaving your system at risk.BackBox automates communication with all potentially affected devices, understands the level of vulnerability, and can automatically remediate exposures.
BackBox's unique approach to automation, combined with its simplicity and scalability, allow for such powerful, proactive security measures.
Easily audit and compare system changes
When unexpected problems in your networks arise, the first question is: What has changed?
With BackBox, this question is always easy to answer because changes in your configurations have auditable histories that are easy to access, read and compare.
BackBox's built-in Compare Tool allows network admins to easily and clearly compare configuration baseline parameters, compliance expectations, or any other files.
Our automations can query your network's devices to make sure they are running according to best practices and organizational policy,
and can even remediate discrepancies, ensuring compliance. Remediation can be auto-triggered or user-resolved, notifications being served through a variety of methods, such as email, ServiceNow or any other
ITSM, integrating with and enabling your management flow.
Automate Compliance at Scale
The larger the network, the more difficult it is to ensure compliancy. For organizations with multiple large networks to manage, such as MSPs and MSSPs, the resulting complexity requires a powerful solution.
BackBox’s extensive Automation Library can automatically check your networks’ devices against critical parameters, generate and send (and archive) reports detailing their level of compliance, and automatically remediate discrepancies (or open a trouble ticket in ServiceNow or other ITSM to await administrator confirmation).
Thus, BackBox allows you to easily achieve and maintain compliancy with both external regulations (such as HIPAA, PCI, and CIS), as well as internally defined policy (such as password complexity), across networks of all sizes.
Accurate, Up-to-date, and Accessible Device Details Inventory
BackBox's Dynamic Inventory™ feature automates the collection of your network devices' details, gathering and organizing useful information such as device models, hostnames, specific OS versions, CPU type, total RAM, and many more–even MAC addresses and serial numbers. Customizable and flexible, BackBox makes it easy to add custom detail types and queries to include in your inventory.
The inventory is able to be tied to regularly scheduled tasks, such as backups, and/or on its own schedule, ensuring you have a detailed picture of your network as you want, when you want it.
You can use this inventory to populate any system that can be reached via an API, allowing for powerful external integrations. Likewise, any information accessible from the device via either CLI or API can be included in an inventory.
We're here for you
BackBox's award-winning support team is your partner on the journey to automate administration of your network and security devices. As part of our support agreement, BackBox will create automations on demand and works with you to meet your organization's own specific needs.
The BackBox services team has over a decade of experience creating complex network device automations in the platform, and is always ready to help.
Whatever you need, we'll get it done.
Other Popular Features
Our flexible, versatile API enables powerful custom integrations; any information that can be gathered from a device via CLI or API can be used to intelligently enhance BackBox automations with external data. The REST API is accessible to all customers with a standard swagger definition. API access is governed by the same roles and administrative privileges as the BackBox UI.
BackBox allows administrators to access terminal sessions and commands that connect to many devices simultaneously, saving time, tedious work, and preventing fat-finger mistakes common to the manual entering of repetitive commands.
Access Management can also record terminal sessions, allowing administrators to easily audit and review access history (and utilize them for compliance and training purposes), ensuring commands are successfully completed while providing status notifications.
BackBox also allows the automation of a run-book with permission boundaries for first-line team members. Combined with the granularity of roles that BackBox provides, Access is an innovative, flexible, and powerful way to automate large scale network administration.
Inform decision making by running automations that generate customized reports specific to your environment and processes. For example, a proactive network health report showing all devices whose licenses expire within a given timeframe, or whose version is not up to the corporate standard.