• Active Directory
  • Application
  • Desktop & Mobile
  • Help Desk
  • Network
  • Server
  • IT Security
  • MSP
  • Cloud
  • Unified IT
 
 
Device Management, made easy
Manage control and secure your workstations, mobile
devices and tablets
 
 
Help Desk for Everyone
IT Help Desk Software and Customer Support Software
 
 
MSP
Manage services faster, with multi-tenanted, ITIL-ready, and unified RMM solutions
 
 
Cloud Solutions
IT Help Desk, and Operations Management from the Cloud
Manage IT as one
Unleash the power of Unified Monitoring
 

Configuration Management

Encrypted Storage of Device Configuration & Centralized Control

Device Configurations are sensitive data and if a malicious user gets hold of a device password, he could wreak havoc to the entire network. Network Configuration Manager stores device configurations in encrypted form in the MySQL database bundled with the product making the process very secure. Besides, there is also provision for SSH communication between Network Configuration Manager and devices.

Network Configuration Manager serves as a secure, centralized repository for device configurations. Administrators get access to configurations based on their roles and access restrictions. Network Configuration Manager retrieves configurations from devices whenever there occurs a configuration change. Configurations are versioned and stored in the database making configuration management easier.