1 / 17

Automated Backup, Recovery, Inventory and Management for Security and Networking Devices

Automated Backup, Recovery, Inventory and Management for Security and Networking Devices. Company Overview. BackBox, International presence and support 24x7 Worldwide. BackBox is the leader for Backup, Restore & Inventory of any Security and Networking Devices. 40+ Employees

Download Presentation

Automated Backup, Recovery, Inventory and Management for Security and Networking Devices

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Automated Backup, Recovery, Inventory and Management for Security and Networking Devices

  2. Company Overview BackBox, International presence and support 24x7 Worldwide BackBox is the leader for Backup, Restore & Inventory of any Security and Networking Devices • 40+ Employees • Over 200 Customers World Wide • Over 50 Partners (Resellers and Distributors) • International Presence • Profitable after 1st Year • Privately Held Company • Subsidiary of Largest Telco in Israel • R&D and HQ Based in Israel • Local Presence • Israel HQ • France – Paris • Germany – Frankfurt • Italy – Milan • US – New York • UK - London ThroughPartner BackBox Presence

  3. Market Challenge • Complex Networks and Complex Configurations • Multi-Vendor Environments • Lack of Unified Management System • Long Recovery Time

  4. Our Goal • Automation of Configuration Backup • Minimize Downtime • Complete Disaster Recovery Planning and Execution • Single Management System • Enable Business Continuity

  5. Reasons for Recovery • Hardware failure/RMA • Application bug • Operating System Crash • Misconfiguration • Version Upgrades • Configuration Replication

  6. - Features • Unified Web Console

  7. Multi-Vendor Support

  8. - Features • Full Automation • Non Intrusive • Agentless • No Configuration Changes • No Scripting • ScheduledBackups • Single-Click Recovery

  9. - Features • Multi-Tenant/Role-Based • Virtual Sites • Role Based Administration • LDAP, RADIUS and SSH Key Support • Authentication Templates Americas EMEA APAC

  10. - Features • Device Management • CLI Access to the Device • HTTP/s Popup based on IP and Port • Pre-Configured Commands • Full Audit Log • Authentication Required • Fully Customizable HTTPS SSH Console

  11. - Features • Backup Verification • MD5 Checksum • File Size • File Content • File Corruption

  12. - Features • Disaster Recovery Procedures How to Recover Configuration for Juniper Secure Access/MAG 1. Perform initial configuration according to the vendor documentation. 2. Open an internet browser and login to the address: https://< Address>/admin 3. Supply credentials to login to the management console. 4. From the left pane, click on Maintenance -> Import/Export -> Import/Export configuration. 5. Click on Browse locate the backup configuration file (JuniperConf*). 6. Specify the password for the backup configuration file. 7. Click on "Import Config". • Step by Step procedures for Recovery • Custom Procedures • Central location for downloading network related information

  13. - Features • Dynamic Inventory • Refresh data with every backup • Customizable Fields • Full infrastructure Report by type of Device

  14. - Features • PCI Compliance Payment Card Industry (PCI) Card Production Logical Security Requirements, Version 1.0 - May 2013 • Section 5.3.i - "The vendor must implement network device backups prior to any change and securely store and manage all media". • Section 5.4.1.a - "The vendor must ensure all documents relating to firewall configurations are stored securely". • Section 6.3.i- "The vendor must make a backup of the system being changed before applying any patches". • Sections 6.5.1.d - "The vendor must protect any software backup copies from accidental destruction".

  15. - Features • Notifications • eMail Summary • Syslog • SNMP • System Alerts • (license and disk space)

  16. - Features • Additional Features • Virtual Appliance • 64bit Linux Based OS • Distributed Architecture • Built-in Dynamic Firewall • Credential and Configuration File Encryption • Self-Backup and Automatic Remote Storage • Full Auditing • IP Based Access Control • Secure Access to Devices • NAT Support • Fully Customizable

  17. Customers

More Related