Automated Backup Recovery Inventory and Management for Security
Automated Backup, Recovery, Inventory and Management for Security and Networking Devices
COMPANY OVERVIEW Back. Box is the leader for Backup, Restore & Inventory of any Security and Networking Devices Ø 40+ Employees Ø Over 200 Customers World Wide Ø Over 50 Partners (Resellers and Distributors) Ø International Presence Ø Profitable after 1 st Year Ø Privately Held Company Ø Subsidiary of Largest Telco in Israel Ø R&D and HQ Based in Israel Back. Box, International presence and support 24 x 7 Worldwide Local Presence Ø Ø Ø Israel HQ France – Paris Germany – Frankfurt Italy – Milan US – New York UK - London Through Partner Back. Box Presence
MARKET CHALLENGE Ø Ø Complex Networks and Complex Configurations Multi-Vendor Environments Lack of Unified Management System Long Recovery Time
OUR GOAL Ø Automation of Configuration Backup Ø Minimize Downtime Ø Complete Disaster Recovery Planning and Execution Ø Single Management System Ø Enable Business Continuity
REASONS FOR RECOVERY Ø Ø Ø Hardware failure/RMA Application bug Operating System Crash Misconfiguration Version Upgrades Configuration Replication
- FEATURES UNIFIED WEB CONSOLE
MULTI-VENDOR SUPPORT
- FEATURES FULL AUTOMATION Ø Non Intrusive Ø Agentless Ø No Configuration Changes Ø No Scripting Ø Scheduled Backups Ø Single-Click Recovery
- FEATURES MULTI-TENANT/ROLE-BASED Ø Ø Virtual Sites Role Based Administration LDAP, RADIUS and SSH Key Support Authentication Templates EMEA Americas APAC
- FEATURES DEVICE MANAGEMENT Ø Ø Ø CLI Access to the Device HTTP/s Popup based on IP and Port Pre-Configured Commands Full Audit Log Authentication Required Fully Customizable HTTPS SSH Console
- FEATURES BACKUP VERIFICATION Ø MD 5 Checksum Ø File Size Ø File Content Ø File Corruption
- FEATURES DISASTER RECOVERY PROCEDURES Ø Step by Step procedures for Recovery Ø Custom Procedures Ø Central location for downloading network related information How to Recover Configuration for Juniper Secure Access/MAG 1. Perform initial configuration according to the vendor documentation. 2. Open an internet browser and login to the address: https: //< Address>/admin 3. Supply credentials to login to the management console. 4. From the left pane, click on Maintenance -> Import/Export configuration. 5. Click on Browse locate the backup configuration file (Juniper. Conf*). 6. Specify the password for the backup configuration file. 7. Click on "Import Config".
- FEATURES DYNAMIC INVENTORY Ø Refresh data with every backup Ø Customizable Fields Ø Full infrastructure Report by type of Device Name IP Version Hardware Model CPU Type RAM Disk % Check. Point Management Server 192. 168. 10. 250 R 75. 40 Smart-1 25 Quad Core 5520 2048 MB / - 85% /var – 45% Cisco_3760 172. 25. 11. 26 IOS 12. 4 Catalyst 3760 DNS Server 172. 26. 14. 12 Cent. OS 5. 4 HP DL 380 G 6 128 MB Dual XEON 4096 MB / - 67%
- FEATURES PCI COMPLIANCE Payment Card Industry (PCI) Card Production Logical Security Requirements, Version 1. 0 - May 2013 Ø Section 5. 3. i - "The vendor must implement network device backups prior to any change and securely store and manage all media". Ø Section 5. 4. 1. a - "The vendor must ensure all documents relating to firewall configurations are stored securely". Ø Section 6. 3. i - "The vendor must make a backup of the system being changed before applying any patches". Ø Sections 6. 5. 1. d - "The vendor must protect any software backup copies from accidental destruction".
- FEATURES NOTIFICATIONS Ø e. Mail Summary Ø Syslog Ø SNMP Ø System Alerts (license and disk space)
- FEATURES ADDITIONAL FEATURES Ø Ø Ø Virtual Appliance 64 bit Linux Based OS Distributed Architecture Built-in Dynamic Firewall Credential and Configuration File Encryption Self-Backup and Automatic Remote Storage Full Auditing IP Based Access Control Secure Access to Devices NAT Support Fully Customizable
CUSTOMERS
- Slides: 17