Configuration ManagementEncrypted Storage of Device Configuration & Centralized Control
Device Configurations are sensitive data and if a malicious user gets hold of a device password, he could wreak havoc to the entire network. DeviceExpert stores device configurations in encrypted form in the MySQL database bundled with the product making the process very secure. Besides, there is also provision for SSH communication between DeviceExpert and devices.
DeviceExpert serves as a secure, centralized repository for device configurations. Administrators get access to configurations based on their roles and access restrictions. DeviceExpert retrieves configurations from devices whenever there occurs a configuration change. Configurations are versioned and stored in the database making configuration management easier.
"Ability to create and push network device configurations
Kevin Spies, LightYear Network Solutions, LLC