Find out what your peers are saying about Zabbix, Datadog, Auvik and others in IT Infrastructure Monitoring.
Centreon is an all-in-one IT monitoring solution that is a network, system, applicative supervision, and monitoring tool. It is free and open source, and one of the most flexible and powerful monitoring softwares on the market.
Centreon Features
Centreon has many valuable key features. Some of the most useful ones include:
Centreon Benefits
There are several benefits to implementing Centreon. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Below are some reviews and helpful feedback written by Centreon users.
PeerSpot user Thor M., CEO at a tech services company, says, "The single-pane view provides us a view of all of our network infrastructure, and it is one of the most important tools that we use to see the status of our customers' networks. It provides a nice benefit when it comes to helping align IT operations with business objectives. The top-down views, dashboards, and business context reporting are things that are nice to have because you want to be able to show the customer that everything is working, that problems have been addressed, and that you're providing value.”
Thomas C., Managing Director, Canada at Eva, comments, “The most valuable feature of the solution is the flexibility, the ability to integrate all kinds of equipment. As long as something has an IP you can monitor it. What we try to achieve all the time is not only saying a company's system is available, but to give additional data on the performance of the equipment. So the flexibility is what matters the most to us, where we can script everything. Centreon has a lot of Plugin Packs, meaning they support, by design, a lot of devices. And on top of that, we have the ability to add our own scripts and do whatever we want and display the data as we want in the central dashboards.”
Marcilio L., President at ITS Solucoes, expresses, "The dashboards are valuable because they ease troubleshooting and viewing. It becomes easier to locate the source of a problem... The dashboards make it easier to communicate with our clients. They don't want to see the alert console, they want to see a beautiful dashboard representing their network and their business and to watch it in case something is wrong in their environment."
Florent Q., Network Engineer at a computer software company, mentions, "The most valuable feature is that we can manually configure everything we need. After it comes inside the interface of Centreon, you can display it. Because the interface is quite user-friendly, you can manually configure the configuration very deeply, which is very pleasant and useful because you can monitor and see everything on your service list, dashboard, or MAP. The most useful feature for me is that you can create your own plugin and monitoring query."
Splunk Enterprise Security is widely used for security operations, including threat detection, incident response, and log monitoring. It centralizes log management, offers security analytics, and ensures compliance, enhancing the overall security posture of organizations.
Companies leverage Splunk Enterprise Security to monitor endpoints, networks, and users, detecting anomalies, brute force attacks, and unauthorized access. They use it for fraud detection, machine learning, and real-time alerts within their SOCs. The platform enhances visibility and correlates data from multiple sources to identify security threats efficiently. Key features include comprehensive dashboards, excellent reporting capabilities, robust log aggregation, and flexible data ingestion. Users appreciate its SIEM capabilities, threat intelligence, risk-based alerting, and correlation searches. Highly scalable and stable, it suits multi-cloud environments, reducing alert volumes and speeding up investigations.
What are the key features?Splunk Enterprise Security is implemented across industries like finance, healthcare, and retail. Financial institutions use it for fraud detection and compliance, while healthcare organizations leverage its capabilities to safeguard patient data. Retailers deploy it to protect customer information and ensure secure transactions.
We monitor all IT Infrastructure Monitoring reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.