fbpx
Use Cases 2020-08-10T05:30:39-06:00
Home > Product > Use Cases

BackBox Use Cases

BackBox Software provides a whole robust solution for Network Security and Automation.
We support over 180+ Vendors and Technology partners to provide the best support needed.

Find out how your organisation can benefit from using BackBox’s solution in these Hands-On
Use Cases Demonstrations.

Technology Partners

Pulse Secure >

Automate Enable and Disable of In Case of Emergency (ICE) License for Pulse Secure

2003, 2019

Automating Device Discovery Population in BackBox Through API enabled CMDB and Ticketing Systems

Categories: Blog, Product, Use Case Series|Tags: , , , , |

  Use Case: Automating Device Discovery Population in BackBox Through API enabled CMDB and Ticketing Systems (task automation)   Abstract Organizations are using multiple,

602, 2019

CheckPoint Upgrades using BackBox

Categories: Blog, Featured, Product, Use Case Series|Tags: , , , , , |

  Use Case: Smarter CheckPoint Upgrades Using BackBox BackBox’s approach to upgrades allows an organization to save valuable time and money. Define upgrades to run on

1111, 2018

Automating Network Configuration Changes – Check Point API

Categories: Product, Use Case Series|Tags: , , |

Use Case: Automating Network Configuration Changes with Check Point API’s   Network automation is gaining more importance in today’s ever-growing, complex networks. The ability to automate the management

1111, 2018

New Hardware Disaster Recovery

Categories: Product, Use Case Series|Tags: , , , , |

Use Case: Disaster Recovery on New Hardware Platform   Situation Disaster recovery procedures dictate the need to automate network and security device configuration. It's best practice to keep

1111, 2018

Restoring Device Configuration – Disaster Recovery

Categories: Product, Use Case Series|Tags: , , , |

Use Case: Restoring Device Configuration to a Previous state   Situation Disaster recovery procedures dictate the need to automate network and security device configuration. It's best

811, 2018

Security Configurations & Firewall Upgrades

Categories: Product, Use Case Series|Tags: , , , , |

  Use Case: Security Network Configuration Changed by A Firewall Upgrade   Situation From time to time organizations encounter the need of upgrading their network and

811, 2018

Multiple Device Configuration Commands – Use Case

Categories: Product, Use Case Series|Tags: , , , |

Use Case: Push Bulk Network Configuration Commands To Multiple Devices   Situation When organizations grow, network and security teams deal with a variety of challenges. One of the

1107, 2018

Automating Firewall Management Office 365

Categories: Blog, Product, Use Case Series|Tags: , , , , |

Use Case: Automating Firewall Management - Microsoft Office 365 Cloud Access   BackBox Use Case Over the last few years, more and more organizations are migrating to

Customers

Nothing speaks louder on the behalf of your solution, than a satisfied customer. Together, with over 500 customers, we are shaping the IT infrastructure of global organizations, to become operational efficient.

F5 Critical TMUI RCE Vulnerability CVE-2020-5902

The Traffic Management User Interface (TMUI),
also referred to as the Configuration utility, has
a Remote Code Execution (RCE) vulnerability in
undisclosed pages. (CVE-2020-5902).
BackBox Intelligent Automation solutions help
you Mitigate the recent TMUI RCE Vulnerability.

Telefonica

“BackBox was the first real tool that allowed us
to do any form of automation”
Michael Rhodes, TELEFONICA UK/O2

Looking for something else? 
CONTACT US