• +91 70220 03396
  • sales@agileintelli.com

NETWORK CONFIGURATIONS & CHANGE MANAGER

  • Inventory Tracking
  • Capture complete inventory details of multi-vendor Network Devices including Host name, Serial Number, Vendor, Model, OS, Firmware Version, End-Of-Life, End-Of-Support details etc.

  • Configuration Management
  • Offers comprehensive Network Configuration Backup & Recovery across all network devices. Instant detection and alerting on configuration changes with the option to automatically roll back to a previous configuration.

  • Vulnerability Detection
  • Instantaneous detection of vulnerabilities in newly-discovered target network devices. Multi-level security tagging of device vulnerabilities based on CVSS Scores along with vulnerability details.

  • Multi-Channel Notification & Reports
  • Immediate alerting of important events like detecting configuration changes, configuration download success, policy violations, job completions, firmware upgrade etc., using multiple channels like Email & SMS along with other detailed reports.

  • Routine Task Automation
  • Automate common & repetitive tasks with respect to Network Operations with pre-configured templates allowing execution of tasks at multiple locations at the same instant.

  • Policy Compliance
  • Flexible Rules & Policy Configuration Templates ensuring complete Security, Operational & Regulatory Policy Definition & Enforcement.

  • Network Discovery
  • Supports multi-modes of discovery using typically required SNMP and device credentials.

  • Audit Trails & Tracking
  • Complete audit trail of device configurations, tool operations, job executions for end-to-end tracking of network operations and tool activities.

  • Network Security Auditing
  • Gain complete network security auditing of target network devices with comprehensive details on impacts and events. Monitor via “Live Tracking” all authorized user actions on target network devices displaying CLI commands executed and their results with the option to store them audits as for historical analysis. Quickly initiate “kill sessions” in the event of any protocol variance or breach.