openITCOCKPIT creates transparency by providing comprehensive monitoring of your entire IT landscape. Its modular design includes features such as reporting, event correlation and clustering capabilities – all in an intuitive web interface. And by using its supplied host and service templates, experienced administrators can save time and effort better placed in other areas. The supplied REST API makes it easy to connect to external systems.
With openITCOCKPIT, the classical division between monitoring and configuration is removed. After exporting the configuration to Naemon/Nagios, users can immediately see the status of the monitored hosts and services in the front end and then edit them directly.
Visualisation - Intelligent interface An absolutely unique and compelling feature of openITCOCKPIT is its combination of status and performance information from Nagios/Naemon with business functionalities such as reporting and event correlation. This allows openITCOCKPIT to monitor not only individual status activities, it can also monitor, evaluate and graphically represent IT services as well.
Via the graphical management console, users can intuitively access all data and evaluations. Graphs, maps, dashboards, and much more functions help users and admins to detect problems. And through the integration of Check_MK and NMAP, openITCOCKPIT provides an interface for the simple and automated recording of new services.
No features have been listed yet.
No openITCOCKPIT videos yet. You could help us improve this page by suggesting one.
Based on our record, Wazuh should be more popular than openITCOCKPIT. It has been mentiond 49 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
The tricky part is to fit all the puzzle pieces together. To good news is, somebody already did this with projects like omdistro or openITCOCKPIT (I'm related to this one) where you get an out of the box experience with all the different open source tools bundle together. Source: 12 months ago
Have a look at openitcockpit.io and check out our brand new 4.6.3 release. Source: about 1 year ago
Maybe you have a look on openitcockpit.io website. Source: about 1 year ago
I was a nagios with nconf (long time not supported) die hard, however, I have recently switched to https://openitcockpit.io/ which has a great configuration web interface, it supports nagios plugins. I use pushover for mobile notifications. Monitoring windows, linux and network kit. Source: about 1 year ago
Maybe you should considering to use a much more modern approach like: https://openitcockpit.io/. Source: over 1 year ago
I use Wazuh instead. Greenbone CE is severely limited and requires payment for anything beyond the very basic. Super simple installation more features. Source: 5 months ago
Monitoring & Active Measures - Exporting firewall events to an external time-series database like I describe above is good to see who is touching your firewall or accessing your web site. Using an Intrusion Detection System / Intrusion Prevention System (IDS/IPS) such as open-source Suricata, which is a free package on pfSense, and deploying file system integrity monitoring, such as the open-source Wazuh on the... Source: 6 months ago
Wazuh: An open source security monitoring platform that integrates with popular tools like Elasticsearch and Kibana to provide comprehensive security event analysis and response capabilities. - Source: dev.to / 12 months ago
On another note, as mentioned in my response to the question of this post, we are working on a complete rework of the Vulnerability Detection engine. This rework will provide a sanitized CVEs feed from wazuh.com and a completely new scanner engine. It will also include a new UI for global queries. Source: 12 months ago
Nessus essentials (https://www.tenable.com/products/nessus/nessus-essentials) might do the trick. It can help to check what kind of services you are running are vulnerable to exploits. Also, the general recommendation here would be not to use default ports for all the services you are exposing. Also, you can check something like Wazuh - https://wazuh.com/. Source: about 1 year ago
Zabbix - Track, record, alert and visualize performance and availability of IT resources
Checkmk - Checkmk - the software for effective IT monitoring
Fortinet FortiAnalyzer - Fortinet FortiAnalyzer is a powerful product for Security Fabric Analytics and Automation.
Icinga - Icinga is a fork of Nagios and is backward compatible.
Beats - Beats is the platform for single-purpose data shippers that is installed as lightweight agents and send data to machines to Logstash or Elasticsearch.
Nagios - Complete monitoring and alerting for servers, switches, applications, and services