Features Overview.

Slides:



Advertisements
Similar presentations
Windows IT Pro magazine Datacenter solution with lower infrastructure costs and OPEX savings from increased operational efficiencies. Datacenter.
Advertisements

ServiceDesk Plus MSP Product Overview. Why ServiceDesk Plus - MSP? Capability of Managing Multiple Client’s in one Help Desk Stop Juggling with multiple.
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
Infoblox Network Automation Matt Gowarty, Sr. Product Marketing Manager Dynamically Controlling Your Network.
Lower costs and improve predictability Automation Enable service owners to focus on work that adds business value Reduce error-prone manual activities.
Integrate into existing systems with PowerShell integration modules Extend by building PS modules to enable integrating into other systems Optimize.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Designed By: Technical Training Department
Patch Management Module 13. Module You Are Here VMware vSphere 4.1: Install, Configure, Manage – Revision A Operations vSphere Environment Introduction.
VMware vCenter Server Module 4.
Virtual Machine Management
Automate Microsoft Azure Ross Sponholtz Mark Ghazai.
Automated Backup, Recovery, Inventory and Management for Security and Networking Devices.
Module 10 Configuring and Managing Storage Technologies.
Using Group Policy to Manage User Environments. Overview Introduction to Managing User Environments Introduction to Administrative Templates Assigning.
Hands-On Microsoft Windows Server 2008

© 2010 VMware Inc. All rights reserved Patch Management Module 13.
Hands-On Microsoft Windows Server 2008
Deploying Chromebooks RICK NICHOLAS A.
An Introduction to IBM Systems Director
HTML+JavaScript M2M Applications Viewbiquity Public hybrid cloud platform for automating and visualizing everything.
Module 14: Configuring Server Security Compliance
Module 7: Fundamentals of Administering Windows Server 2008.
1 Thomas Lippert Senior Product Manager - Mobile What’s new in SMC 5.0.
A powerful network monitoring system
System Center Lesson 4: Overview of System Center 2012 Components System Center 2012 Private Cloud Components VMM Overview App Controller Overview.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Enterprise Messaging & Collaboration. e-Interact Modules.
© 2014 VMware Inc. All rights reserved. Cloud Archive for vCloud ® Air™ High-level Overview August, 2015 Date.
Copyright © New Signature Who we are: Focused on consistently delivering great customer experiences. What we do: We help you transform your business.
Windows 2012R2 Hyper-V and System Center 2012
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Doron Orbach UCMDB Product Manager
Overview – TI Services September-2016.
Cloud Faxing for Law Firms
Univa Grid Engine Makes Work Management Automatic and Efficient, Accelerates Deployment of Cloud Services with Power of Microsoft Azure MICROSOFT AZURE.
Overview – TI Services November-2015.
Redcell™ Management Essentials, Juniper Networks Enterprise Edition
Shared Services with Spotfire
Amazon Storage- S3 and Glacier
1Z0-477 VCE Questions
Complete Management of your Entire Backflow Program
Infrastructure, Data Center & Managed Services
AWS DevOps Engineer - Professional dumps.html Exam Code Exam Name.
Get Amazon AWS-DevOps-Engineer-Professional Exam Real Questions - Amazon AWS-DevOps-Engineer-Professional Dumps Realexamdumps.com
Replace with Application Image
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
Management Solution for Cisco NG Advanced Security Services
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Data Security for Microsoft Azure
Unitrends Enterprise Backup Solution Offers Backup and Recovery of Data in the Microsoft Azure Cloud for Better Protection of Virtual and Physical Systems.
Introducing Qwory, a Business-to-Business Search Engine That’s Powered by Microsoft Azure and Detects Vital Contact Information for Businesses MICROSOFT.
Partner Logo Azure Provides a Secure, Scalable Platform for ScheduleMe, an App That Enables Easy Meeting Scheduling with People Outside of Your Company.
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
atEvent + HubSpot Integtration Instructions
Training Module Introduction to the TB9100/P25 CG/P25 TAG Customer Service Software (CSS) Describes Release 3.95 for Trunked TB9100 and P25 TAG Release.
Single Cell’s Progenitor Powered by Microsoft Azure Improves Organisational Efficiency with Strategic Procurement, Contract Management, and Analytics MICROSOFT.
AWS S3 Cloud Backup Licensing per system Starting at $79 per year.
Administrator’s Manual
[Internal Use] for Check Point employees​
COMPLETE BUSINESS TEXTING SOLUTION
COMPANY PROFILE: REELWAY
Contract Management Software 100% Cloud-Based ContraxAware provides you with a deep set of easy to use contract management features.
Network Monitoring System
IT Management, Simplified
OSL150 – Get Hands on with Ivanti Endpoint Security
Presentation transcript:

Features Overview

Core features Network Configuration Backup & Recovery Change Detection & Compliance Auditing Change Automation Over 100 Vendors Supported

Configuration Backup & Recovery Centralise Network Configuration backup and recovery operations for over 100 Vendors: Easy to use web interface No Device knowledge required Backup all of your network devices Without Scripting! Recover from bad changes or hardware failures in seconds Secure by design: AES Encryption Role based access control

Adding Devices Quickly add devices using any of these methods: Import Add all of your devices at once, by importing them from a Spreadsheet. Discovery Schedule network scans to Discover your devices. Use Auto-Import rules to automatically add them to your device list Add Manually Add a new device by setting: Device Name Device Type IP Address Device Credentials

Schedule Backups Configuration backups can be scheduled: When adding a device Just select when you want backups to be scheduled Set a Retention Policy, to store the number of unique versions you need Configure multiple schedules if you need to store configurations for other periods, i.e. every month From the Device List Select a group of devices, and let Restorepoint automatically schedule your backups

Configuration BACKUP Restorepoint automates configuration backup for all devices, and supports complex devices such as Check Point, F5 and Blue Coat Checks are performed to ensure backups are complete and secure in transfer All data and configurations are stored securely using AES encryption Restorepoint automatically detects changes in configuration, storing Unique Versions. Versioning is a more intelligent method of backup retention than using a time based system i.e. keep backups for 30/60/90 days. Also lowers storage requirements, crucial for environments with complex and large backup files You can lock configurations, or set them as Baseline versions, so that configurations are always kept and changes can easily be tracked

Configuration Recovery Restorepoint provides two recovery methods: Automatic - Just select the configuration version you wish to rollback to Manual - Select the configuration version, then via to another server, via your web browser, email etc. Configuration versions can also be viewed and compared to display changes

Global Search Restorepoint enables you to search your device configurations instantly. Easy to discover things such as: Stale IP addresses Old User Accounts Non Compliant protocols Works across both text and binary configuration types

Compliance Management Save hours of manual auditing time using the built in compliance engine. Restorepoint automatically detects Changes and can analyse your device status at the point of backup using: Configuration Policies which can detect compliance violations using: Phrases Regex LUA Scripts - to evaluate multiple conditions using IF, THEN logic Configuration Templates – use approved device configuration as a baseline for other devices of the same type Firmware Checks - To ensure devices are using approved versions Commands - Send commands to devices and analyse the output, ideal for performing device health checks or to test system properties not stored in a configuration file.

Reports Reporting Options include: Backup Configurations Changes Asset / Inventory Reports Compliance Password Compliance - to ensure device credentials are secure / not default User Activity Reports Monitoring Report formats: Run reports on the fly, or schedule to be sent via email Formats: HTML, PDF, CSV, XML New Reporting Engine Ability to create Combined /Multi Reports Store reusable report filters

API & Alerting Change Management Monitoring Ticketing Powerful JSON API interface enables you to integrate Restorepoint with other platforms. Alerts can also enrich other platforms via SNMP, Syslog or Email Monitoring Ticketing Analytics /Dashboards Network Management Backup Platforms Security Event Management Logging

Change Automation Accelerate Change Management: Send or Schedule bulk commands to devices to perform routine tasks including: Updating devices Changing Passwords Use LUA Scripts to perform more complex operations Push Configuration Templates to multiple devices to ensure device standardisation. Define Variables for settings that will be different on each device Enter Variables for target devices or import from CSV Push Firmware- To Cisco, Juniper, Check Point, Palo Alto, Fortinet and HP devices Click to Terminal - Launch a Web browser based terminal session to devices. Includes recording for complete session playback.

Access Control and Multi-Tenancy Powerful User Management features to restrict access to groups of devices and Restorepoint functions: Users can be added using: LDAP RADIUS Local Accounts Standard User Roles include Administrator, Backup only and Read Only Custom Roles can be created to limit access to Restorepoint Functionality Multi-Tenancy / MSP features: Group devices into Domains Restrict access to Domains for different users Ideal for segregating different departments or customers

Deployment Options: Appliance Options Virtual Appliance - VMware ESX, Hyper-V, VM can also be converted to run on other platforms such as KVM. Cloud versions also available to run on AWS or Azure Dedicated Restorepoint Appliances High Availability Options for Appliance and Agents Appliance Management Security hardened linux based appliance All application and OS updates delivered automatically HTML 5 Web GUI (No Java)

Appliance Options Model No. of Devices Storage Redundancy RSP-Virtual (VMware, Hyper-V, AWS) Scalable Hypervisor RSP-530 500* 2x 500GB RAID-1 RSP-1020 1000* 2x 1TB RSP-2020 10,000* 4x 1TB RAID-5, Dual Power RSP-2024 10,000+* 4x 2TB

Our Customers Include:

Any questions?