Latest Research


This content is currently locked.

Your current Info-Tech Research Group subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us:
1-888-670-8889 (US/CAN) or
+1-519-432-3550 (International)

Comprehensive software reviews to make better IT decisions

Pioneering Network Automation and Infrastructure Integrity: A Technical Overview of BackBox

I had a great experience meeting with the BackBox team learning about their roadmap and approach to ensuring infrastructure integrity. BackBox represents the next generation in network automation, establishing itself as a network infrastructure integrity platform. Its robust IntelliChecks capabilities and event-driven architecture set it apart in my opinion, offering a comprehensive solution for automated network management that ranges from backup and recovery to vulnerability management and compliance checks.

Source: BackBox demo (September 2024)

Market Success and Reach

BackBox has carved out a significant presence in the market, particularly among large enterprises, telecommunications, and MSPs. "We've solved really large-scale problems for them, and we are very much loved by them," remarked the BackBox team, highlighting the platform's success and customer satisfaction as evidenced by glowing reviews on several software review platforms.

Core Platform Capabilities

BackBox automates backups, patching, and configuration updates with enterprise-ready reliability. It supports over 180 types of device, allowing for extensive customization of automation scripts. I was impressed with IntelliChecks; it is certainly a differentiating feature, facilitating automation by orchestrating remediation or executing predefined actions, enhancing network operations efficiency.

Source: BackBox demo (September 2024)


BackBox’s Vulnerability Management engine appeared robust, tying into systems like ServiceNow for ticketing, ensuring that vulnerabilities are not only identified but can also be addressed with one-click or customized automations. Security and compliance objectives are supported by detailed auditing, configuration drift measurement, and compliance reporting. Full file diff for device history ensures every change is tracked.