Darktrace Unveils Automated Forensics Capabilities in its ActiveAI Security Platform™ to Advance Hybrid and Multi-Cloud Security 

Posted in Commentary with tags on September 26, 2025 by itnerd

 Darktrace, today announced the launch of Darktrace / Forensic Acquisition & Investigation™, the industry’s first truly automated cloud forensics solution. The solution provides security teams immediate access to forensic-level data, equipping them with critical context to investigate threats quickly and thoroughly across hybrid, multi-cloud and on-premises environments. When paired with the newly enhanced Darktrace / CLOUD™, organizations gain a complete cloud security solution that combines posture management with real-time detection, response and forensic investigation – potentially reducing investigation times from days to mere minutes.  

Cloud adoption has outpaced security operations, creating blind spots that adversaries are quick to exploit. Nearly 90% of organizations report suffering damage before they can contain cloud incidents, and 65% say investigations take three to five days longer in the cloud compared to on-premises environments, according to a survey of 300 cloud security decision makers. Traditional log-based alerts miss behaviors such as lateral movement or privilege escalation, while evidence from ephemeral assets like containers and serverless functions often disappears before it can be collected — leaving security teams struggling to respond effectively. 

At the same time, attacks against cloud workloads are increasingly aggressive. New analysis of Darktrace’s Cloudypot honeypots reveals that attacks on tools like Jupyter Notebooks often arrive in sudden bursts, generating high volumes of attacks in a short period of time from a small group of persistent attackers. These findings highlight that when adversaries target the cloud, they strike quickly and at scale, leaving defenders little time to investigate before critical evidence disappears. 

Introducing Darktrace / Forensic Acquisition & Investigation 

Darktrace / Forensic Acquisition & Investigation is an automated forensic investigation solution designed for the speed and complexity of modern cloud environments. It captures and analyzes host-level evidence — including disk, memory, and logs — at the exact moment a threat is detected, even from short-lived assets such as containers or serverless workloads. These investigations can be triggered by Darktrace or by detections from existing cloud security tools.  

Unlike point solutions that depend on manual snapshots or agents, Darktrace collects evidence directly through cloud APIs, ensuring investigations begin instantly, and critical data from ephemeral workloads is never lost. By preserving volatile data and reconstructing attacker behavior in real time, the solution adds critical context to everyday investigations, enabling security teams to understand root causes quickly and shorten investigation times from days to mere minutes — a critical advantage as over 40% of organizations report suffering significant damage from cloud alerts that were never investigated at all.  

This solution represents the evolution of capabilities gained through Darktrace’s acquisition of Cado Security earlier this year, alongside continued research and development investment to expand and advance Darktrace’s cloud security portfolio. 

Key capabilities of the Darktrace / Forensic Acquisition & Investigation solution include: 

  • Automated hybrid forensic capture: Collects host-level data, including disks, memory, logs, and artifacts the moment an alert is raised across on-premises, AWS, Azure, GCP and SaaS environments.  
  • Ephemeral data capture: Preserves evidence from short-lived workloads including AWS ECS, Kubernetes, and distro-less or no-shell containers, retaining critical data so that it can be investigated. 
  • Automated investigation with complete timelines: Automatically reconstructs attacker behavior into unified timelines, distilling massive volumes of events into the most significant insights providing rapid clarity and root cause in minutes without manual correlation. 
  • Scalable response and reporting: Supports parallel investigations across multiple systems and automatically generates exportable reports to help reduce analyst workload and assist with compliance burdens. 
  • Rapid deployment and seamless integration: Offers flexible SaaS or on-premises deployment, and integrates with existing SIEM, XDR, CNAPP, EDR, NDR, and cloud-native tools so that any alert can trigger immediate forensic capture and investigation. 

Darktrace / Forensic Acquisition & Investigation can be deployed as a standalone product, giving new customers immediate access to automated cloud forensics to support SOC and incident response teams in their day-to-day management of cloud security threats, or integrated across the Darktrace ActiveAI Security Platform for end-to-end investigations and response across an organization’s entire digital estate. It is particularly powerful when paired with Darktrace / CLOUD, where the two solutions bring real-time cloud detection and response and forensic-level investigation together in a single workflow. 

Unifying Cloud Detection, Response, and Forensic Investigation with Darktrace / CLOUD 

Customers can now add Darktrace / Forensic Acquisition & Investigation capabilities to Darktrace’s leading cloud detection and response (CDR) product. With Darktrace / CLOUD, security teams benefit from:  

  • Autonomous detection and response: Self-Learning AI continuously monitors cloud environments to spot both known and novel threats and automatically contain them at machine speed. 
  • Dynamic cloud visibility: Live mapping of assets, services, and architectures to reveal blind spots, track attacker movement, and provide real-time context. 
  • Proactive risk management: Automated posture checks and attack path modeling that surface misconfigurations and exposures before attackers can exploit them. 

When adding Darktrace / Forensic Acquisition & Investigation to Darktrace / CLOUD, the solutions work together seamlessly to detect threats as they emerge and preserve the forensic evidence needed to investigate them. As Darktrace / CLOUD detects and blocks suspicious cloud activity, Darktrace / Forensic Acquisition & Investigation will capture disk, memory, and log data from the affected asset, allowing teams to immediately contain threats while preserving the critical evidence needed to investigate and remediate the incident.  

Alongside this integration, Darktrace has strengthened its core cloud capabilities to make investigations even faster and more intuitive. Enhancements include more intuitive cloud architecture diagrams that make complex environments easier to interpret, along with expanded detection of advanced attacker techniques such as lateral movement, command-and-control, and privilege escalation. 

When uniting threat detection, response, and automated forensics in one platform, security teams can shift cloud investigations from reactive and fragmented to fast, automated, and context-rich — enabling organizations to harness the benefits of the cloud while effectively mitigating risks. 

Availability  

Darktrace / Forensic Acquisition & Investigation, the integrations across the Darktrace ActiveAI Security Platform and new features in Darktrace / CLOUD are available now.  

Guest Post: Why Voice AI Could Be the Career Move That Puts You on the Executive Shortlist

Posted in Commentary with tags on September 26, 2025 by itnerd

By Praveen Rangnath, CMO, Deepgram

If you’re in IT leadership, you’ve seen tech trends come and go. Some flare up in the headlines, get hyped at conferences, and then quietly fade away. Others — the rare ones — change the way entire industries operate.

Voice AI is one of the rare ones.

The problem is, a lot of people think they already understand it. They’ll nod along and say, “Oh yeah, like Siri or Alexa, right?” And if you leave it at that, you’ll miss the fact that Voice AI in the enterprise has almost nothing to do with consumer gadgets.

What we’re talking about is the ability to capture, understand, and act on every conversation your business has — with customers, employees, suppliers, regulators — in real time. It’s a shift from voice being something that “just happens” to voice becoming one of your most valuable data assets.

And here’s the kicker: if you’re the IT leader who drives that transformation, it won’t just make your company more competitive — it’ll make you more promotable.

Why This Is Bigger Than a Tech Upgrade

Think about all the conversations that happen in your organization in a single day:

  • A frustrated customer explaining a problem to support.
  • A nurse speaking with a patient about symptoms.
  • A technician describing a fault to a field supervisor.
  • A sales rep negotiating terms with a client.
  • Two department heads debating how to allocate budget.

Historically, those conversations disappear the second they end. Maybe you get a line or two typed into a CRM. Maybe a call recording sits on a server somewhere, unlistened to. But you’re losing context, insights, and opportunities every single time.

Voice AI changes the game. It can:

  • Transcribe those conversations in real time — accurately, even with accents, jargon, or background noise.
  • Understand the meaning, not just the words.
  • Detect urgency, emotion, and intent.
  • Feed that intelligence into your existing systems so it’s searchable, reportable, and actionable.

This isn’t about making calls “sound nicer.” It’s about turning the most human part of business — conversation — into something you can measure, learn from, and improve at scale.

Why IT Management Should Own This

If you’re thinking, “This sounds like a customer service project,” you’re not wrong — but you’re not right, either.

Customer service, sales, compliance, operations — they all want the benefits. But none of them can roll this out enterprise-wide without IT leadership guiding the architecture, governance, and integrations.

That means you have a rare opportunity:

  • Lead a high-impact initiative that crosses silos.
  • Control the data governance and compliance from day one (critical if you’re in finance, healthcare, or government).
  • Choose technology that scales, so this doesn’t become another point-solution mess.

When IT drives Voice AI adoption, it’s not just “supporting the business.” It’s reshaping how the business works. That’s the kind of strategic leadership that the C-suite and boards notice.

The Career Capital Play

Here’s the part some IT leaders miss: delivering a Voice AI initiative isn’t just good for the company — it’s good for your career.

  1. You’ll be seen as an innovator — not just the person who keeps the lights on. You’ll have a real-world example of bringing in a new capability that directly ties to revenue, customer satisfaction, and operational efficiency.
  2. You’ll get visibility with the C-suite — because every major function will be affected, and you’ll be the one making sure it all works.
  3. You’ll have hard metrics to show — cost savings, reduced call times, faster onboarding, higher CSAT, better compliance records. These are the kind of results that get repeated in performance reviews.
  4. You’ll build executive allies across departments — sales, marketing, operations, and compliance will all have wins they can point to because of your project. That makes you easier to promote.

If You Think You Already Understand It — This Could Be the Gap

A lot of tech leaders think Voice AI means “speech-to-text” plus maybe a chatbot. That’s like saying the internet is just “email plus websites.”

The real power is when Voice AI is:

  • Real-time — not hours later.
  • Context-aware — understanding your specific business language and workflows.
  • Integrated — feeding into CRM, ERP, analytics, and compliance systems automatically.
  • Scalable — able to handle every department, every language, every channel without breaking.

That’s when it stops being a tool and becomes infrastructure, and infrastructure projects with measurable business wins are the ones that get you invited to the big table.

Your Next Moves

If you want this to be a career-making initiative, here’s where you can start:

  1. Map Your Conversation Ecosystem — Where in your organization do high-value voice interactions happen daily?
  2. Identify High-Impact Use Cases — Pick two or three where you can prove ROI quickly (e.g., customer support, compliance-heavy calls, field service updates).
  3. Get Cross-Functional Buy-In Early — Loop in operations, CX, compliance, and sales from day one.
  4. Test for Accuracy First — Before you get dazzled by AI features, nail transcription quality. Everything else depends on it.
  5. Plan for Scale — Choose solutions that can grow beyond your pilot without creating security or integration headaches.

Bottom line: Voice AI is more than a technology trend — it’s a platform for delivering visible, measurable business wins. If you own it, you don’t just modernize the company. You modernize your own career path.

The leaders who make this move now won’t just be part of the conversation. They’ll be running it.

Tech failures are slowing down nearly half of Canada’s frontline workforce, new survey shows

Posted in Commentary with tags on September 26, 2025 by itnerd

A new national survey conducted by Samsung Canada and Leger, surveyed 510 Canadian workers across construction, healthcare, energy, mining, retail, and public safety, found that: 

  • Roughly 2 in 5 (44%) workers face delays in completing tasks when devices break. This is even higher among healthcare and public safety workers.  
  • 34% report communication breakdowns due to device issues 

From missed reports to disrupted deliveries, these moments of downtime are quietly dragging productivity across sectors. Only 1 in 3 workers are still using consumer-grade smartphones and tablets; devices not designed for harsh job site conditions or long shifts. 

That’s prompting a shift in what business decision makers are looking for when it comes to company tech. Designed for frontline conditions, Samsung’s Galaxy Tab Active5 Pro and Galaxy XCover7 Pro offer more resilient solutions built for durability in rugged workforces. These devices feature excellent weather durability, swappable batteries for all-day power, and glove-friendly touchscreens, a clear fit for jobs where reliability can’t be optional.  

Here are a couple of links that dive deeper into some of the statistics I mentioned above:

Samsung survey reveals deep need for rugged tech in construction industry: https://news.samsung.com/ca/samsung-survey-reveals-deep-need-for-rugged-tech-in-construction-industry

How rugged devices power real-time decision making in remote oilfields: https://news.samsung.com/ca/how-rugged-devices-power-real-time-decision-making-in-remote-oilfields

Stealthy BRICKSTORM Backdoor Enables Espionage into Tech and Legal Sector

Posted in Commentary with tags on September 25, 2025 by itnerd

Researchers have tracked a stealthy “next-level” Chinese hacking campaign dubbed “BRICKSTONE” that targets and maintains persistent access to legal services and technology companies by stealing intellectual property, mining intelligence on national security and trade while developing other cyberattacks for the future.

More details are available here: https://cloud.google.com/blog/topics/threat-intelligence/brickstorm-espionage-campaign

Ensar Seker, CISO at SOCRadar, commented:

“This Brickstorm campaign marks a striking evolution in adversary tradecraft. What makes it “next level” is not simply the long dwell times or precision targeting, though both are alarming, but rather the strategic layering of access, reconnaissance, and supply-chain influence. By infiltrating tech security and legal services firms, the attackers don’t just get to access those environments, they gain pathways into their clients and partners, giving them a multiplier effect on reach. Some of those downstream systems may not even realize they’ve been compromised yet.

“The motivation here is long-term, not opportunistic. Brickstorm’s operators are methodically exfiltrating intellectual property and internal designs, which gives them a unique insight into how to bypass defenses and identify zero-day opportunities. In effect, they’re embedding themselves into the ecosystem, harvesting the same tools and knowledge base they hope to exploit later. That kind of foresight suggests a campaign designed not just for espionage, but for building capabilities that can support multiple future attacks.

“From a defensive posture, this raises the bar. Security firms, the very guardians of trust, must now treat themselves as high-priority targets in their own right. That means rethinking how we design isolation, telemetry, and insider-monitoring within security operations. It means segmenting access zones not just for customers, but even among internal service components. It demands relentless threat hunting, especially in trust relationships and client integrations. In practical terms, organizations should assume that any vendor they trust may be compromised, not eventually, but right now. That means requiring stricter attestation, enforcing zero-trust architectures around vendor connections, validating every cross-tenant data flow, and adopting reciprocal visibility with those vendors. The fact that Brickstorm is already leveraging downstream infiltration highlights just how fragile the boundary between ‘client’ and ‘supplier’ has become.

“In a nutshell, Brickstorm is a wake-up call: adversaries are no longer treating high-value firms as endpoints to exploit, but as nodes in a broader intelligence and access network. Defending against that requires that we think in ecosystems and assume compromise, not just for ourselves, but for every connected party.”

I am actually quite disturbed by this as this sounds like the cold war all over again. This highlights the fact that the bad guys come in all shapes and sizes as well as agendas.

UPDATE: Cybercrime expert and VP of Cyber Risk for HITRUST, Tom Kellermann had this to say

“Since the Titan Rain campaign, China has pursued an insurgency strategy in American cyberspace, maintaining persistent access through sophisticated backdoors, like BRICKSTORM that serve as the cornerstone of their economic espionage operations. These initial compromises enable secondary infections and lateral movement across networks, creating a cascading security threat that must be systematically eradicated to protect both national and economic security.”

PyPI Warns of Phishing Attacks – Urges Users to Reset Credentials

Posted in Commentary with tags on September 25, 2025 by itnerd

In the wake of a new phishing campaign, PyPl, the default source for Python’s package management tools, is asking its users to reset their credentials. The fake email asks users to “verify their email address” for “account maintenance and security procedures” with a note that their account may be suspended. If clicked on, the link goes to pypi-mirror.org which is a domain not owned by PyPI or the PSF/

More details are available here: https://blog.pypi.org/posts/2025-09-23-plenty-of-phish-in-the-sea/

Jim Routh, Chief Trust Officer at Saviynt, commented:

“Threat actors are finding different ways to steal credentials for cloud accounts essential for enterprises to assemble and develop software for their respective customers. The tactics used enable threat actors identify many more target enterprises (customers) and monetize the compromise in several ways. 

“Enterprises have an opportunity to more effectively manage the risk of this type of credential compromise through advanced authentication methods, cloud account access management methods and privileged user management using continuous validation techniques.”

This is a huge issue and it will only increase if action is not taken quickly. Enterprises should make that a today problem.

Nearly 150,000 Patient Records Exposed in Healthcare Data Breach

Posted in Commentary with tags on September 25, 2025 by itnerd

A data breach affecting a home healthcare provider Archer Health Inc, was discovered and reported to Website Planet by cybersecurity researcher Jeremiah Fowler.

What happened:
A non-password-protected database containing 145,000 files and totaling 23 GB was left exposed. The leaked files included assessments, home health certifications, plan of care documents, patient ID numbers, SSNs, physical addresses, phone numbers, and more

Why it matters:
The exposure of personal and medical data poses serious risks, including identity theft, fraud, and possible financial exploitation, misuse of sensitive identifiers like SSNs, patient IDs, or contact information. Significant medical privacy and compliance risks, as the public exposure of medical conditions, treatments, and Medicare or VA records could lead to potential HIPAA violations.

Read the detailed report here: https://www.websiteplanet.com/news/archer-health-breach-report/

Rhysida takes credit for breach against Maryland Transit Administration

Posted in Commentary with tags on September 25, 2025 by itnerd

Comparitech has reported that ransomware gang Rhysida today took credit for a late-August data breach at the Maryland Transit Administration.

Commenting on this news is Rebecca Moody, Head of Data Research at Comparitech

“While Maryland DoT has confirmed a data breach, we don’t yet know the extent of this breach or the type of data involved. However, Rhysida’s demand of $3.4 million is the second-largest ransom demand we’ve seen from this group, meaning it’s likely they’ve accessed some highly sensitive data. The last time we saw a ransom demand of this value was when Rhysida targeted Lurie Children’s Hospital. In this case, 792,000 people were impacted.”

“The largest-ever ransom demand ($5.8 million) from Rhysida also came when it had targeted the Port of Seattle. This led to the breach of 90,000 records. Rhysida’s proof pack for Maryland DoT also includes screenshots of a passport, driver’s license, Social Security number, a live scan application form, and financial documents.”

“While we await further information from Maryland DoT, we highly recommend that citizens and employees of the state remain on high alert for potential phishing attacks and monitor their accounts for any unauthorized activity.”

“This is the 59th confirmed attack on a US government organization this year so far and we have noted an uptick in the number of attacks with August seeing the highest monthly figure (12).”

This is one of these times where I can’t decide who is the most likely to be pwned. Government or healthcare. I guess that illustrates we all need to do more to protect ourselves from being a victim.

Corintis raises $24M to target the next AI bottleneck, and collaborates with Microsoft for chip cooling breakthrough

Posted in Commentary with tags on September 25, 2025 by itnerd

The growth of AI is hampered by computational power. Increasing demands for AI to become ever more powerful and ever more accessible have placed a requirement for there to be ever more powerful computer chips. However, increasingly powerful chips produce more heat, making cooling a key bottleneck.

The early versions of OpenAI’s ChatGPT were trained on NVIDIA chips, which used 400W of power. However, only 4 years later, new GPUs and AI accelerators are already looking to increase the power requirements by 10x, which requires liquid cooling. NVIDIA’s recent adoption of liquid cooling for its latest generations of data centre GPUs has highlighted this key demand. 

Coming out of stealth mode, semiconductor cooling startup Corintis has today announced that it has raised a $24M Series A to address this problem. The round was led by BlueYard Capital with participation from Founderful, Acequia Capital, Celsius Industries, XTX Ventures, among others. Corintis also announces that it will be opening multiple US offices to better serve its American customers in addition to an Engineering office in Munich, Germany. 

To date, the company has raised $33.4M in total. Instead of facing AI off against computational requirements, their technology embraces AI to help cool computer chips more effectively. As part of this funding, Chairman of Walden International and Intel CEO Lip-Bu Tan has joined as a board director and investor prior to becoming Intel CEO, in addition to Geoff Lyon (former CEO & Founder of CoolIT), also joining the board. With this addition to the board, Corintis doubles down on building a bridge between the worlds of semiconductor design, manufacturing, and chip-cooling.   

Corintis’s technology focuses on microfluidic cooling: Optimised micro-scale liquid cooling for computer chips in data centres, which are used for advanced computation, including for generative AI. In addition to having several major American tech giants as customers, the company already enjoys a partnership with Microsoft to help bring this cutting-edge technology to the real world. Earlier this week, Microsoft announced that in collaboration with Corintis, it has successfully achieved a breakthrough by developing an in-chip microfluidic cooling system that can effectively cool a server running core services. Tests showed that microfluidic cooling embedded inside the chip removed heat a staggering three times better than the most advanced technology commonly used today.

Based on research conducted at the Federal Institute of Technology in Lausanne (EPFL) in Switzerland, Corintis was co-founded by Dr Remco van Erp (CEO), Sam Harrison (COO) & Prof Elison Matioli (Scientific Adviser).

Corintis’ solution relies on two main elements to achieve its mission of 10x better cooling: Firstly, “co-designed microfluidic cooling”. Corintis develops best-in-class simulation and optimization software and new manufacturing methods to design micro-scale optimized liquid cooling, or Microfluidic cooling, that is adapted to the chip to bring the right liquid to the right location. This can be supplied as either a drop-in replacement to any liquid cooling system today, or integrated together with the chip, as “co-packaged cooling”, to reach up to an order of magnitude increase in cooling performance. Their technology also enables data centers to reduce their water consumption, a key ecological concern of AI technologies.

Corintis’ platform builds a bridge between chip and cooling design, enabling chip designers to build the next generation of AI chips with superior thermal performance. The technology platforms the company has already developed include Glacierware, to help automate the design of cooling systems, a copper microfluidic manufacturing facility to manufacture cold plates with features as small as a human hair in high volume, and its Therminator platform, allowing chip companies to physically emulate next-gen chips with millimetre accuracy on silicon test chips before production to validate their cooling solution ahead of time. 

The company has already manufactured over ten thousand cooling systems, with deployments running in data centers on leading-edge AI chips. It has already achieved 8-digit cumulative revenue since its incorporation. It is on track to more than 10x this with its early deployments.  With new funding, the company looks to scale its already sizable team of 55 employees today to over 70 by the end of the year, and ramp up its manufacturing footprint even further, aiming to achieve a capacity exceeding a million microfluidic cold plates annually during 2026. With this scale, Corintis is ready to play a decisive role in the advancement of computational and AI power. 

TELUS and League will partner to support Canadian healthcare innovation with sovereign AI

Posted in Commentary with tags on September 25, 2025 by itnerd

TELUS and League today announced a groundbreaking collaboration to revolutionize healthcare delivery for millions of Canadians. League will power its comprehensive AI-driven healthcare platform on TELUS’ infrastructure – Canada’s first fully sovereign AI Factory. Supported by this sovereign AI infrastructure, advanced AI can deliver more personalized and efficient care, improving patient outcomes.

Operating on TELUS’ high-performance, highly-secure, Canadian-controlled infrastructure in Rimouski, Quebec, League’s AI-powered healthcare solutions will leverage the power of NVIDIA’s latest Graphic Processing Unit (GPU) technology to process health data and deliver AI-powered recommendations to help Canadians navigate their healthcare journey more effectively. League’s platform, which has already delivered over 100 million personalized health recommendations including millions to Canadian patients, will be able to leverage the sovereign infrastructure to physically store sensitive healthcare data within Canada’s borders – supporting a key priority for the deployment of secure, privacy-compliant and sovereign AI, while enabling advanced research and development of unique Canadian-centric models.

TELUS’ sovereign infrastructure enables Canadian healthcare organizations to develop AI solutions tailored specifically to Canadian healthcare needs and regulations, rather than adapting generic offerings. The partnership will enable more effective care coordination, personalized health recommendations and improved patient engagement.

The AI Factory will empower organizations with total, end-to-end development capabilities to build new AI models (model training), customize existing ones for specific needs (fine-tuning) and deploy them in business operations (inferencing). Powered by 99 per cent renewable energy sources, the factory is built in one of the most sustainable AI-ready data centres in the world. Supported by TELUS’ high-speed, ultra-low-latency, PureFibre network, the facility is designed to use significantly less electricity to power AI computing workloads and is three times more energy efficient than the industry average – demonstrating that cutting-edge AI capabilities and environmental stewardship are essential for Canada’s technological future.

Centreon awarded five high-profileG2 Badges in Fall 202

Posted in Commentary with tags on September 25, 2025 by itnerd

Centreon, a leader in digital performance monitoring, is awarded five new High-Profile Badges by G2, the world’s largest and most trusted software marketplace. These badges reflect Centreon’s continued success in driving customer satisfaction and adoption across geographies and industry segments.

Among the recognitions received this Fall 2025:

  • Highest User Adoption, Fall 2025, Server Monitoring category – awarded for the highest User Adoption rating in the Implementation Index.
  • High Performer, Fall 2025, DevOps category, geo India, Asia, and Asia Pacific – highlighting Centreon’s strong customer satisfaction scores compared to market peers.
  • Users Love Us, Fall 2025 – a key milestone badge, earned after surpassing 20 verified reviews with an average rating of 4.0 stars or higher. This “Users Love Us” Badge demonstrates Centreon customer-centricity

Centreon’s current rating of 4.7 out of 5 underscores its commitment to ease of use, quality support, and simple installation—key drivers of customer satisfaction.

These recognitions from G2 underscore Centreon’s mission to empower IT teams worldwide with a unified, open, and user-centric monitoring platform—helping organizations achieve always-on performance across their digital infrastructure.

G2 is a leading international B2B software marketplace. Each year, more than 80 million professionals use the G2 platform to make their software purchasing decisions, based on peer reviews. To learn more, visit the Centreon page on G2.