BMC TrueSight Network Automation is used for entire network management, automation, backups, pushing configurations for multiple devices, compliance, and secure access of the network devices.
We use this product for general task automation, including things like updating our Cisco devices. For example, rolling out patches is something that is automated. The top three processes that we have automated are upgrading the operating system of physical devices, changing configurations, and security compliance analysis reporting.
Senior Solutions Systems Engineer at a tech services company with 501-1,000 employees
Real User
2019-06-11T11:10:00Z
Jun 11, 2019
I use it for configuration, backup, compliance, patching, and for control management. If a change has been made on a device, then it triggers notifications about who, what, and when has been changed on the network devices. I work in three different companies. One is for the financial company, then the other one is for the government that we are in. I do A/B testing before deployment, where the network devices should be upgraded first, then deployed via the standard configuration with compliance. There are a different number of devices in each company. I also work with a healthcare company on their network configurations and compliance.
What is configuration management? Configuration management is a type of systems engineering process that helps to achieve consistency of a product through its life cycle. The goal of configuration management processes and tools is to keep computer systems, servers, and software consistently in the desired state.
Managing IT system configurations requires defining what is the system’s desired state and then maintaining it. Since system changes happen frequently across servers, networks,...
We use the solution for patching, OS upgrades, and security vulnerability management.
We use the solution to provision the network devices and execute some commands.
BMC TrueSight Network Automation is used for entire network management, automation, backups, pushing configurations for multiple devices, compliance, and secure access of the network devices.
We use this product for general task automation, including things like updating our Cisco devices. For example, rolling out patches is something that is automated. The top three processes that we have automated are upgrading the operating system of physical devices, changing configurations, and security compliance analysis reporting.
Compliance and Security vulnerability management of network devices
We use it for monitoring our management infrastructure. We also use it for pinging some customer workstations, customer sites, and devices.
I use it for configuration, backup, compliance, patching, and for control management. If a change has been made on a device, then it triggers notifications about who, what, and when has been changed on the network devices. I work in three different companies. One is for the financial company, then the other one is for the government that we are in. I do A/B testing before deployment, where the network devices should be upgraded first, then deployed via the standard configuration with compliance. There are a different number of devices in each company. I also work with a healthcare company on their network configurations and compliance.
We use it to back up some things on our network devices and we use it to make sure that things comply with our standards.