Business Software for Centreon

  • 1
    Rudder Reviews

    Rudder

    Normation

    €50 per node per year
    Efficiently managing your IT infrastructure, particularly if it is critical or hybrid, can be quite challenging when done manually. To achieve optimal control of your systems, leveraging automation alongside configuration compliance is the most effective strategy. Rudder is designed with a robust, compliance-driven automation engine that offers a straightforward, declarative framework for managing system configurations. With Rudder, you can eliminate service disruptions as it ensures your systems remain properly configured by monitoring and managing drift from a centralized platform. You can establish global parameters throughout your infrastructure while also handling exceptions using hierarchical variables. Additionally, you can utilize infrastructure-as-code through the Rudder language, which integrates seamlessly with the web interface, fostering collaboration among all teams involved in the management process. By adopting these practices, organizations can enhance their operational efficiency and reduce the risk of configuration-related issues.
  • 2
    Prometheus Reviews
    Enhance your metrics and alerting capabilities using a top-tier open-source monitoring tool. Prometheus inherently organizes all data as time series, which consist of sequences of timestamped values associated with the same metric and a specific set of labeled dimensions. In addition to the stored time series, Prometheus has the capability to create temporary derived time series based on query outcomes. The tool features a powerful query language known as PromQL (Prometheus Query Language), allowing users to select and aggregate time series data in real time. The output from an expression can be displayed as a graph, viewed in tabular format through Prometheus’s expression browser, or accessed by external systems through the HTTP API. Configuration of Prometheus is achieved through a combination of command-line flags and a configuration file, where the flags are used to set immutable system parameters like storage locations and retention limits for both disk and memory. This dual method of configuration ensures a flexible and tailored monitoring setup that can adapt to various user needs. For those interested in exploring this robust tool, further details can be found at: https://sourceforge.net/projects/prometheus.mirror/
  • 3
    Amazon API Gateway Reviews
    Amazon API Gateway is an entirely managed service designed to simplify the process for developers to create, publish, maintain, monitor, and secure APIs, regardless of scale. Serving as the "entrance" for applications, APIs facilitate access to data, business logic, or services from the backend. Through API Gateway, developers can build both RESTful and WebSocket APIs, which are essential for enabling real-time two-way communication in applications. This service supports both containerized and serverless environments as well as web applications. It efficiently manages the complexities of processing hundreds of thousands of simultaneous API requests, handling traffic management, CORS, authorization and access control, throttling, monitoring, and versioning. Moreover, there are no upfront fees or minimum charges associated with API Gateway; instead, you only pay for the API calls and data transfer you utilize. With a tiered pricing structure, as your API usage grows, you can benefit from reduced costs, making it a cost-effective solution for businesses of all sizes. Additionally, the simplicity and scalability of API Gateway allow developers to focus more on building features rather than managing infrastructure.
  • 4
    IP Fabric Reviews
    Automatic discovery, modeling and verification of your network's state provide actionable insights into the state of the network. They also provide evidence that the network is providing the service your business needs. Automatic discovery, modelling, verification, validation of your current network state gives you actionable insights into the state of your system. Plan changes before they happen and verify that the network behaves as you expected after the change. Verify that the actual network state aligns with your intentions, as contained in your source-of-truth. A single, accurate, and consistent view of your network across on-prem instances and cloud instances allows continuity between the network and cloud teams. IP Fabric data can be accessed anywhere using our open API. The snapshots at a specific time are the best way to compare your network day-to-day. Eliminate tedious, time-consuming and error-prone workflows.
  • 5
    SMSEagle Reviews

    SMSEagle

    Proximus Sp. z o.o.

    €989
    SMSEagle, a hardware SMS gateway, allows SMS messages to be sent to a telecommunication carrier directly without using 3rd-party services or the Internet. This is done by using a SIM Card, built-in modules with an external antenna to communicate with a telecommunications operator directly (works like mobile phones). Hardware SMS gateways, also called SMS servers, integrate hardware and software to manage communication. The device provides various methods of integration with external systems such as API, Email to SMS, etc.
  • 6
    Firebird Reviews

    Firebird

    Firebird Foundation

    Firebird is a relational database that incorporates numerous features compliant with ANSI SQL standards and is compatible with Linux, Windows, and multiple Unix systems. It boasts remarkable concurrency, impressive performance, and robust support for stored procedures and triggers, making it a popular choice for various applications. Since its inception in 1981, Firebird has been utilized in production environments under different names. The Firebird Project operates independently, consisting of C and C++ developers, technical advisors, and supporters who contribute to the ongoing development of this multi-platform relational database management system, which is based on the source code released by Inprise Corp (now Borland Software Corp) on July 25, 2000. Moreover, the Firebird Project provides a wealth of documentation for users, developers, and administrators, ranging from beginner Quick Start guides to in-depth expert articles that explore numerous aspects of the Firebird system. This extensive resource ensures that anyone working with Firebird can find the information they need to optimize their experience.
  • 7
    NGINX Reviews
    NGINX Open Source is the web server that supports over 400 million websites globally. Built upon this foundation, NGINX Plus serves as a comprehensive software load balancer, web server, and content caching solution. By opting for NGINX Plus instead of traditional hardware load balancers, organizations can unlock innovative possibilities without being limited by their infrastructure, achieving cost savings of over 80% while maintaining high performance and functionality. It can be deployed in a variety of environments, including public and private clouds, bare metal, virtual machines, and container setups. Additionally, the integrated NGINX Plus API simplifies the execution of routine tasks, enhancing operational efficiency. For today's NetOps and DevOps teams, there is a pressing need for a self-service, API-driven platform that seamlessly integrates with CI/CD workflows, facilitating faster app deployments regardless of whether the application utilizes a hybrid or microservices architecture, which ultimately streamlines the management of the application lifecycle. In a rapidly evolving technological landscape, NGINX Plus stands out as a vital tool for maximizing agility and optimizing resource utilization.
  • 8
    HAProxy Enterprise Reviews
    HAProxy Enterprise, the industry's most trusted software load balancer, is HAProxy Enterprise. It powers modern application delivery at all scales and in any environment. It provides the highest performance, observability, and security. Load balance can be determined by round robin or least connections, URI, IP addresses, and other hashing methods. Advanced decisions can be made based on any TCP/IP information, or HTTP attribute. Full logical operator support is available. Send requests to specific application groups based on URL, file extension, client IP, client address, health status of backends and number of active connections. Lua scripts can be used to extend and customize HAProxy. TCP/IP information and any property of the HTTP request (cookies headers, URIs, etc.) can be used to maintain users' sessions.
  • 9
    Varnish Reviews

    Varnish

    Varnish Software

    Varnish Software's powerful caching technology allows the largest content providers in the world to deliver lightning-fast streaming and web experiences for large audiences without any downtime or loss of performance. Our solution combines open source flexibility with enterprise robustness to speed media streaming services, accelerate websites, APIs, and allow global businesses to create custom CDNs. This will unlock unbeatable content delivery performance, resilience, and customization. Varnish Enterprise is the core technology available: - on-premise - Cloud - Hybrid environments Hulu, Emirates, and Tesla are among our customers. Our technology is powered with a caching layer that's trusted worldwide by more than 10,000,000 websites.
  • 10
    Active Directory Reviews

    Active Directory

    Microsoft

    $1 per user per month
    Active Directory serves as a centralized repository for information regarding various objects within a network, facilitating easy access and management for both administrators and users. It employs a structured data storage approach, which underpins a logical and hierarchical arrangement of directory information. This repository, referred to as the directory, holds details about various Active Directory entities, which commonly include shared resources like servers, volumes, printers, as well as user and computer accounts on the network. For a deeper understanding of the Active Directory data repository, one can refer to the section on Directory data store. Security measures are seamlessly integrated with Active Directory, encompassing logon authentication and the control of access to directory objects. Through a single network logon, administrators are empowered to oversee directory information and organizational structures across the entire network, while authorized users can readily access resources from any location within the network. Additionally, policy-based administration simplifies the management process, making it more efficient even for the most intricate network configurations. This framework not only enhances security but also streamlines resource management, making network operations more effective.
  • 11
    IBM Informix Reviews
    IBM Informix® is a highly adaptable and efficient database that can effortlessly combine SQL, NoSQL/JSON, as well as time series and spatial data. Its flexibility and user-friendly design position Informix as a top choice for diverse settings, ranging from large-scale enterprise data warehouses to smaller individual application development projects. Moreover, due to its compact footprint and self-managing features, Informix is particularly advantageous for embedded data management applications. The rising demand for IoT data processing necessitates strong integration and processing capabilities, which Informix fulfills with its hybrid database architecture that requires minimal administrative effort and has a small memory footprint while delivering robust functionality. Notably, Informix is well-equipped for multi-tiered architectures that necessitate processing at various levels, including devices, gateway layers, and cloud environments. Furthermore, it incorporates native encryption to safeguard data both at rest and in transit. Additionally, Informix supports a flexible schema alongside multiple APIs and configurations, making it a versatile choice for modern data management challenges.
  • 12
    Azure Firewall Reviews
    Azure Firewall serves as a cloud-managed network security solution designed to safeguard your Azure Virtual Network assets. This service operates as a fully stateful firewall, ensuring both high availability and scalable performance in the cloud environment. It is a comprehensive network security tool that not only protects your resources but also allows for the creation, enforcement, and logging of connectivity policies across various subscriptions and virtual networks. With its robust features, you can streamline the deployment and management of network security, taking advantage of the firewall's scalability and availability. Additionally, it enables centralized management of security settings across multiple virtual networks, employing a unified set of application and network rules for enhanced protection. This makes it easier for organizations to maintain consistent security postures as they expand their cloud infrastructure.
  • 13
    IBM MQ Reviews
    Massive amounts data can be moved as messages between services, applications and systems at any one time. If an application isn’t available or a service interruption occurs, messages and transactions may be lost or duplicated. This can cost businesses time and money. IBM has refined IBM MQ over the past 25 years. MQ allows you to hold a message in a queue until it is delivered. MQ moves data once, even file data, to avoid competitors delivering messages twice or not at the right time. MQ will never lose a message. IBM MQ can be run on your mainframe, in containers, in public or private clouds or in containers. IBM offers an IBM-managed cloud service (IBM MQ Cloud), hosted on Amazon Web Services or IBM Cloud, as well as a purpose-built Appliance (IBM MQ Appliance), to simplify deployment and maintenance.
  • 14
    Amazon Simple Queue Service (SQS) Reviews
    Amazon Simple Queue Service (SQS) is a fully managed message queuing platform designed to help you decouple and scale microservices, distributed systems, and serverless applications. By removing the complexity and overhead typically associated with message-oriented middleware, SQS allows developers to concentrate on more impactful tasks. With SQS, you can effortlessly send, store, and receive messages between various software components at any scale, ensuring message integrity and independence from other services. You can quickly begin using SQS in just minutes through the AWS console, Command Line Interface, or your preferred SDK, executing three straightforward commands. This service enables the transmission of any data volume at any throughput level while maintaining message reliability and service independence. Additionally, SQS facilitates the decoupling of application components, which allows them to operate and fail independently, ultimately enhancing the fault tolerance of the overall system. By leveraging SQS, organizations can achieve greater resilience and adaptability in their application architecture.
  • 15
    Amazon Simple Notification Service (SNS) Reviews
    Amazon Simple Notification Service (SNS) is a comprehensive messaging platform designed for both system-to-system and app-to-person (A2P) communications. It facilitates interaction between systems through a publish/subscribe (pub/sub) model, allowing messages to flow seamlessly between independent microservice applications or directly to users via SMS, mobile push notifications, and email. The pub/sub capabilities for system-to-system interactions support topics that enable high-throughput, push-based, many-to-many messaging. By leveraging Amazon SNS topics, your publishing systems can efficiently distribute messages to a wide array of subscriber systems or customer endpoints, including Amazon SQS queues, AWS Lambda functions, and HTTP/S, thus allowing for concurrent processing. Additionally, the A2P messaging feature empowers you to send messages to users on a large scale, utilizing either a pub/sub model or direct-publish messages through a unified API. This flexibility enhances communication strategies for businesses aiming to engage their users effectively.
  • 16
    Azure Key Vault Reviews
    Strengthen your data security and compliance through the use of Key Vault. Effective key management is crucial for safeguarding cloud data. Implement Azure Key Vault to encrypt keys and manage small secrets such as passwords that utilize keys stored in hardware security modules (HSMs). For enhanced security, you have the option to either import or generate keys within HSMs, while Microsoft ensures that your keys are processed in FIPS validated HSMs, adhering to standards like FIPS 140-2 Level 2 for vaults and FIPS 140-2 Level 3 for HSM pools. Importantly, with Key Vault, Microsoft does not have access to or extract your keys. Additionally, you can monitor and audit your key usage through Azure logging, allowing you to channel logs into Azure HDInsight or integrate with your security information and event management (SIEM) solution for deeper analysis and improved threat detection capabilities. This comprehensive approach not only enhances security but also ensures that your data remains compliant with industry standards.
  • 17
    Azure Load Balancer Reviews
    Efficiently distribute both internet and private network traffic to achieve optimal performance with minimal latency. Instantly enhance the scalability of your applications while ensuring consistent high availability. The Load Balancer operates seamlessly across virtual machines, virtual machine scale sets, and various IP addresses. It is specifically designed to manage network layer traffic, catering to situations where exceptional performance and ultra-low latency are essential. The Standard Load Balancer directs traffic not only within regions but also across them, including availability zones, ensuring robust resiliency. You can develop highly available and scalable applications in just minutes thanks to the integrated application load balancing feature for cloud services and virtual machines. Furthermore, the Load Balancer supports a variety of protocols, including TCP/UDP-based ones like HTTP, HTTPS, and SMTP, as well as those utilized in real-time voice and video communication applications. It also allows for effective traffic management between virtual machines within your private virtual networks or can be leveraged to build complex multi-tier hybrid applications, providing flexibility and control over your network architecture.
  • 18
    Amazon ElastiCache Reviews
    Amazon ElastiCache enables users to effortlessly establish, operate, and expand widely-used open-source compatible in-memory data stores in the cloud environment. It empowers the development of data-driven applications or enhances the efficiency of existing databases by allowing quick access to data through high throughput and minimal latency in-memory stores. This service is particularly favored for various real-time applications such as caching, session management, gaming, geospatial services, real-time analytics, and queuing. With fully managed options for Redis and Memcached, Amazon ElastiCache caters to demanding applications that necessitate response times in the sub-millisecond range. Functioning as both an in-memory data store and a cache, it is designed to meet the needs of applications that require rapid data retrieval. Furthermore, by utilizing a fully optimized architecture that operates on dedicated nodes for each customer, Amazon ElastiCache guarantees incredibly fast and secure performance for its users' critical workloads. This makes it an essential tool for businesses looking to enhance their application's responsiveness and scalability.
  • 19
    AWS Elastic Load Balancing Reviews

    AWS Elastic Load Balancing

    Amazon

    $0.027 USD per Load Balancer per hour
    Elastic Load Balancing efficiently directs incoming application traffic to various destinations, including Amazon EC2 instances, containers, IP addresses, Lambda functions, and virtual appliances. It allows you to manage the fluctuating load of your application traffic across a single zone or multiple Availability Zones. With four distinct types of load balancers, Elastic Load Balancing ensures that your applications maintain high availability, automatic scalability, and robust security, making them resilient to faults. As an integral part of the AWS ecosystem, it is designed with an understanding of fault limits, such as Availability Zones, which ensures your applications remain operational within a single region without the need for Global Server Load Balancing (GSLB). Additionally, ELB is a fully managed service, enabling you to concentrate on application delivery rather than the complexities of deploying numerous load balancers. Furthermore, capacity is dynamically adjusted based on the demand for the underlying application servers, optimizing resource utilization effectively. This intelligent scaling capability allows businesses to better respond to varying traffic levels and enhances overall application performance.
  • 20
    Ekara Reviews
    Ekara is a unique all-in-one application monitoring solution. Ekara is fully hybrid and can monitor all applications (web, mobile business, thick-clients, Citrix voice, etc.). Ekara can monitor any and all applications (web, mobile, business, thick-clients and Citrix), to improve their availability and performance in your environment (intranet or internet). Its unifying interface and compatibility to all types of technology make it a valuable tool for your business and digital team. Ekara is disruptive technology. It's a single product that combines all the features of real-user monitoring with synthetic monitoring. It covers all intranet and internet environments. All this in one product! Ekara is a powerful tool which can monitor all your applications from desktops or laptops, as well as from real smartphones (Android or iOS). It can monitor all existing applications, including web, business apps and Citrix.
  • 21
    Alyvix Reviews

    Alyvix

    Würth Phoenix

    Create end-user bots that visually engage with any Windows application, including ERPs or your preferred browser. Execute and evaluate crucial business workflows in a manner akin to a human, but on a continuous basis. Assess user experiences with Alyvix, which tracks the responsiveness of each transaction from click to appearance. Provide reports on IT service quality to facilitate both technical and business decision-making. With Alyvix Editor, you can visually construct end-user workflows, designing test cases step by step. Execute these visual test cases, interacting with the system as a real user would, as Alyvix mimics human mouse and keyboard actions. Furthermore, Alyvix meticulously tracks the time it takes for each transaction to be completed after the last user interaction, allowing for in-depth performance analysis. By continuously monitoring these elements, businesses can ensure optimal user engagement and operational efficiency.
  • 22
    SAP HANA Reviews
    SAP HANA is an in-memory database designed to handle both transactional and analytical workloads using a single copy of data, regardless of type. It effectively dissolves the barriers between transactional and analytical processes within organizations, facilitating rapid decision-making whether deployed on-premises or in the cloud. This innovative database management system empowers users to create intelligent, real-time solutions, enabling swift decision-making from a unified data source. By incorporating advanced analytics, it enhances the capabilities of next-generation transaction processing. Organizations can build data solutions that capitalize on cloud-native attributes such as scalability, speed, and performance. With SAP HANA Cloud, businesses can access reliable, actionable information from one cohesive platform while ensuring robust security, privacy, and data anonymization, reflecting proven enterprise standards. In today's fast-paced environment, an intelligent enterprise relies on timely insights derived from data, emphasizing the need for real-time delivery of such valuable information. As the demand for immediate access to insights grows, leveraging an efficient database like SAP HANA becomes increasingly critical for organizations aiming to stay competitive.
  • 23
    IBM Tivoli Monitoring Reviews
    IBM Tivoli Monitoring solutions are designed to oversee the performance and accessibility of distributed operating systems and applications. These solutions utilize a suite of common service components known as Tivoli Management Services. The components of Tivoli Management Services deliver essential functions such as security, data transfer and storage, notification systems, user interface presentation, and communication capabilities within an agent-server-client architecture. A variety of other products, including IBM Tivoli XE mainframe monitoring solutions and IBM Tivoli Composite Application Manager, also leverage these services. Additionally, Tivoli Management Services support a range of monitoring products like Tivoli Monitoring for Applications, Tivoli Monitoring for Cluster Managers, Tivoli Monitoring for Databases, Tivoli Monitoring for Energy Management, Tivoli Monitoring for Messaging and Collaboration, and Tivoli Monitoring for Virtual Environments, providing a comprehensive toolkit for managing diverse IT environments effectively. This integration ensures that users benefit from a cohesive monitoring experience across different platforms and applications.
  • 24
    Rapid Recovery Reviews
    Experience swift backups and immediate recovery tailored for stringent RTOs and RPOs with Rapid Recovery. This powerful solution enables you to back up and swiftly restore various elements—systems, applications, and data—across physical, virtual, or cloud environments. It empowers your operations to continue without restoration interruptions, ensuring that users experience no noticeable effects from outages or data losses. Effortlessly connect to cloud services while automatically safeguarding expanding virtual settings. You can oversee and control your backup and recovery setup across multiple locations using a single cloud-centric management console. With this top-tier backup solution, you can quickly recover compromised systems and lost data, achieving near-zero downtime and ensuring user activities remain unaffected. Rapid Recovery's sophisticated backup software offers a comprehensive, user-friendly package that encompasses all necessary functionalities. Utilizing image-based snapshots taken as frequently as every five minutes, it effectively meets demanding recovery point objectives while simplifying the overall management process. This innovative approach not only streamlines operations but also increases overall efficiency and reliability in data protection strategies.
  • 25
    Commvault Cloud Reviews
    Commvault Cloud serves as an all-encompassing cyber resilience solution aimed at safeguarding, managing, and restoring data across various IT settings, which include on-premises systems, cloud infrastructures, and SaaS platforms. Utilizing the power of Metallic AI, it boasts cutting-edge functionalities such as AI-enhanced threat detection, automated compliance mechanisms, and accelerated recovery options like Cleanroom Recovery and Cloudburst Recovery. The platform guarantees ongoing data protection through proactive risk assessments, threat identification, and cyber deception tactics, all while enabling smooth recovery and business continuity through infrastructure-as-code automation. By providing a streamlined management interface, Commvault Cloud allows organizations to protect their vital data assets, ensure regulatory compliance, and quickly address cyber threats, which ultimately helps in reducing downtime and minimizing operational interruptions. Additionally, the platform's robust features make it an essential tool for businesses aiming to enhance their overall data security posture in an ever-evolving digital landscape.
MongoDB Logo MongoDB