Automated Backup, Recovery, Inventory and Management for Security and Networking Devices.

Slides:



Advertisements
Similar presentations
Heroix Longitude - multiplatform, automated application performance monitoring and management software.
Advertisements

Experts in OS Recovery and Migration
The System Center Family Microsoft. Mobile Device Manager 2008.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
1 Storage Today Victor Hatridge – CIO Nashville Electric Service (615)
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Enterprise Network Security Accessing the WAN Lecture week 4.
Netop Remote Control Trusted. Secure. Experienced.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Patch Management Module 13. Module You Are Here VMware vSphere 4.1: Install, Configure, Manage – Revision A Operations vSphere Environment Introduction.
Monitor Linux OS health & performance Monitor log files Monitor JEE app servers Monitor line-of-business applications Monitor databases and web.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
November 2009 Network Disaster Recovery October 2014.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
PRESIDIO.COM MARCH  Presidio Overview  What’s New in VDP and VDPA  VDPA Features  Backup and Restore Job Creation  Q&A.
© 2010 VMware Inc. All rights reserved Patch Management Module 13.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
© 2008 Cisco Systems, Inc. All rights reserved.CIPT1 v6.0—2-1 Administering Cisco Unified Communications Manager Understanding Cisco Unified Communications.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 6 Switch Configuration.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public TSHOOT v6 Chapter 1 1 Chapter 1: Planning Maintenance for Complex Networks CCNP TSHOOT:
Chapter Fourteen Windows XP Professional Fault Tolerance.
An Introduction to IBM Systems Director
StoneGate SSL VPN 1.2 Technical Overview
Troubleshooting Windows Vista Security Chapter 4.
What is Driving the Virtual Desktop? VMware View 4: Built for Desktops VMware View 4: Deployment References…Q&A Agenda.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 1 – Chapter 9 Ethernet Switch Configuration 1.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
Cisco ASA 5505 Joseph Cicero Northeast Wisconsin Technical College.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Microsoft Management Seminar Series SMS 2003 Change Management.
1 Panda Perimetral Management Console. 2 Panda Perimetral Management Console Centralized management from the cloud The Perimetral Console, short for Panda.
MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007,
PCI Training for PointOS Resellers PointOS Updated September 28, 2010.
How to Deploy and Configure the Smart Net Total Care CSPC Collector
© 2008 Cisco Systems, Inc. All rights reserved.CIPT1 v6.0—1-1 Getting Started with Cisco Unified Communications Manager Installing and Upgrading Cisco.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
System Center Lesson 4: Overview of System Center 2012 Components System Center 2012 Private Cloud Components VMM Overview App Controller Overview.
verifone HQtm Estate Management Solution
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
KeepItSafe Solution Suite Securely control and manage all of your data backups with ease, from a single location. KeepItSafe Online Backup KeepItSafe.
Copyright © PatchLink ® 2003 All Rights Reserved Server Installation.
Step-by-Step Guide to Asynchronous Data (File) Replication (File Based) over a WAN Supported by Open-E ® DSS™ Software Version: DSS ver up85 Presentation.
Calgary Oracle User Group
Working at a Small-to-Medium Business or ISP – Chapter 8
Maintaining Windows Server 2008 File Services
CCNA Routing and Switching Routing and Switching Essentials v6.0
Chapter 10: Device Discovery, Management, and Maintenance
CCNA Routing and Switching Routing and Switching Essentials v6.0
Chapter 10: Device Discovery, Management, and Maintenance
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
HC Hyper-V Module GUI Portal VPS Templates Web Console
Administering Your Network
PLANNING A SECURE BASELINE INSTALLATION
Designing IIS Security (IIS – Internet Information Service)
Features Overview.
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

Automated Backup, Recovery, Inventory and Management for Security and Networking Devices

BackBox is the leader for Backup, Restore & Inventory of any Security and Networking Devices BackBox, International presence and support 24x7 Worldwide  40+ Employees  Over 200 Customers World Wide  Over 50 Partners (Resellers and Distributors)  International Presence  Profitable after 1 st Year  Privately Held Company  Subsidiary of Largest Telco in Israel  R&D and HQ Based in Israel Local Presence  Israel HQ  France – Paris  Germany – Frankfurt  Italy – Milan  US – New York  UK - London Through Partner BackBox Presence

 Complex Networks and Complex Configurations  Multi-Vendor Environments  Lack of Unified Management System  Long Recovery Time

 Automation of Configuration Backup  Minimize Downtime  Complete Disaster Recovery Planning and Execution  Single Management System  Enable Business Continuity

 Hardware failure/RMA  Application bug  Operating System Crash  Misconfiguration  Version Upgrades  Configuration Replication

UNIFIED WEB CONSOLE - FEATURES

MULTI-VENDOR SUPPORT

FULL AUTOMATION - FEATURES  Non Intrusive  Agentless  No Configuration Changes  No Scripting  Scheduled Backups  Single-Click Recovery

MULTI-TENANT/ROLE-BASED - FEATURES Americas EMEAAPAC  Virtual Sites  Role Based Administration  LDAP, RADIUS and SSH Key Support  Authentication Templates

DEVICE MANAGEMENT - FEATURES  CLI Access to the Device  HTTP/s Popup based on IP and Port  Pre-Configured Commands  Full Audit Log  Authentication Required  Fully Customizable HTTPS SSH Console

BACKUP VERIFICATION - FEATURES  MD5 Checksum  File Size  File Content  File Corruption

DISASTER RECOVERY PROCEDURES - FEATURES  Step by Step procedures for Recovery  Custom Procedures  Central location for downloading network related information How to Recover Configuration for Juniper Secure Access/MAG 1. Perform initial configuration according to the vendor documentation. 2. Open an internet browser and login to the address: /admin 3. Supply credentials to login to the management console. 4. From the left pane, click on Maintenance -> Import/Export -> Import/Export configuration. 5. Click on Browse locate the backup configuration file (JuniperConf*). 6. Specify the password for the backup configuration file. 7. Click on "Import Config".

DYNAMIC INVENTORY - FEATURES  Refresh data with every backup  Customizable Fields  Full infrastructure Report by type of Device Disk %RAMCPU TypeHardware Model VersionIPName / - 85% /var – 45% 2048MBQuad Core 5520Smart-1 25R CheckPoint Management Server 128MBCatalyst 3760IOS Cisco_3760 / - 67%4096MBDual XEONHP DL380 G6CentOS DNS Server

PCI COMPLIANCE - FEATURES Payment Card Industry (PCI) Card Production Logical Security Requirements, Version May 2013  Section 5.3.i - "The vendor must implement network device backups prior to any change and securely store and manage all media".  Section a - "The vendor must ensure all documents relating to firewall configurations are stored securely".  Section 6.3.i - "The vendor must make a backup of the system being changed before applying any patches".  Sections d - "The vendor must protect any software backup copies from accidental destruction".

NOTIFICATIONS - FEATURES  Summary  Syslog  SNMP  System Alerts (license and disk space)

ADDITIONAL FEATURES - FEATURES  Virtual Appliance  64bit Linux Based OS  Distributed Architecture  Built-in Dynamic Firewall  Credential and Configuration File Encryption  Self-Backup and Automatic Remote Storage  Full Auditing  IP Based Access Control  Secure Access to Devices  NAT Support  Fully Customizable

CUSTOMERS