Explore the latest product updates and best practices at our hybrid Checkmk Conference #12 from June 16-18, 2026 – Register here

Checkmk Cloud

Full‑stack monitoring and observability for hybrid and cloud-native infrastructures. Ideal for organizations that demand unified visibility, advanced automation and best‑in‑class security compliance in a SaaS platform.

Full-stack observability dashboard in Checkmk Cloud

Unified visibility

Consolidate your entire stack into a single platform that unifies application and infrastructure telemetry and offers deep actionable insights.

Advanced automation

Rapid time-to-value with guided onboarding, AI-powered root cause analysis, and automated mass rollouts.

Secure by design

Zero-inbound, fully encrypted framework that meets the world’s strictest compliance and data residency standards.

illustration for automation

Unified visibility across applications and infrastructure

One view for all your telemetry. See how your infrastructure health and application performance impact each other in real time.

  • Deploy industry standard application observability with native support for OpenTelemetry.
  • Pull metrics from diverse sources into a single dashboard to explore trends, analyze performance, and visualize system operations in detail.
  • Add new collectors and ingest log data as needed. Connect data from different sources to identify the cause of a performance dip faster.
  • Move fast from incident to root cause by cross-analyzing infrastructure metrics with application telemetry in one view.

What you can monitor

Monitor your entire hybrid stack in one place. From on-prem infrastructure to cloud-native applications, Checkmk Cloud gives you full visibility and actionable insights – no matter where your assets live.

  • Comprehensive monitoring for servers, virtual machines, containers, network switches and routers (via SNMP or REST‑API with Checkmk Relay). 
  • Native OpenTelemetry integration enriches your monitoring data for fine-grained insight.
  • Seamlessly triage on‑prem and cloud workloads in one view.
Illustration of assets in a data center
illustration showing different dashboards

Effortless monitoring, immediate results

Checkmk Cloud uses AI and deep automation to handle your monitoring workflows, so you can focus on the fix.

  • Decipher complex alerts with AI powered troubleshooting for accelerated incident resolution.
  • Fast and secure monitoring with Relay, a lightweight data collector built for monitoring with zero-inbound traffic.
  • Reduce deployment time from days to minutes with automated mass roll-outs and central management of agents.
  • Automatically onboard and decommission cloud assets, without writing a single line of script.
  • Built-in integrations to common ITSM, chat, and ticketing tools for seamless remediation.

Best-in-class security compliance

Your data stays protected by design, with end‑to‑end encryption and regional hosting of your choice.

  • Agents use TLS connections only, for completely encrypted communications between agents and cloud.
  • Lightweight Relay and push agents that run with minimal privileges, initiating only outbound connections.
  • Choose between US and EU hosting, supporting GDPR, CCPA and other local regulations.
  • Vulnerability patches are applied automatically, keeping the monitoring pipeline hardened at all times.
  • Built‑in audit logs and dashboards to support compliance evidence and audits, e.g. ISO 27001, SOC 2 and industry‑specific standards.
illustration showing a rocket and arrows going to the sky
illustration showing Checkmk monitoring Google Cloud, AWS and Azure

Why Checkmk Cloud?

Managing your own monitoring infrastructure means constant patching and capacity planning. Checkmk Cloud eliminates that operational headache with a fully managed service that’s always up-to-date.

  • No patches, upgrades or hardware refreshes; we handle everything for you.
  • New features, security fixes and AI enhancements are rolled out automatically.
  • Hosted in either US or EU regions, you’re live the moment you subscribe.
  • Guided onboarding gets you monitoring in minutes, not days.
  • Flat‑rate plans with clear limits, no hidden costs nor sudden price jumps.

Professional support

Support is bundled with your Checkmk Cloud subscription. We offer tiered response times, 10h x 5 days per week:

  • Critical (L1) ≤ 4 h
  • Significant (L2) ≤ 8 h
  • Limited (L3) next business day
  • Minimal (L4) ≤ 2 days

For more information, please visit our support page.

FAQ

No, this is not possible at the moment.

No, Checkmk Cloud performs automatic backups twice a day. You can also manually trigger backups in the user admin panel.

We offer a 99.5% uptime SLA and have a team across multiple time zones to ensure round the clock operations. 

Checkmk Cloud comes with daily security updates. These are installed during scheduled maintenance windows, please check our Knowledge Base for details.

You can use Checkmk Cloud to monitor up to 50k services at the moment. 

Tenants are separated at multiple levels. We ensure that tenants cannot communicate with each other by using network policies that explicitly forbid such traffic. Furthermore, tenant data is stored on separate volumes that are dedicated to the tenant and bound only to their site.

Network traffic between any two points is encrypted with TLS certificates, both externally and internally within our network. We require TLS 1.2 and recommend TLS 1.3 at all times. Data at rest is encrypted using the industry standard AES-256 encryption algorithm.

We are using the principle of least privilege for all our internal access needs, with a focus on limiting any access to the production environment. Access to all our systems is automatically logged within their respective environment and the log data is also shipped to a designated account that only Auditors and Security Engineers can access. Client logs are kept separate from our application logs, within the region, where they can only be accessed with consent from the client during an investigation.

Yes, we perform regular pentests of our infrastructure and our management application. 

We use AWS Cognito to manage identities centrally. Password data is stored encrypted. We are not able to read it in any way. The authentication process has been reviewed by security engineers and does not log any sensitive information. 

Currently, 12-chars length with at least one instance of upper case letter, lower case letter, number, special symbol, each. For special characters we allow any valid UTF-8 character, even emoji.

We use AWS to host Checkmk Cloud. We offer to host your Checkmk site in Frankfurt (DE) and N. Virginia (US).

Ready to experience full-stack monitoring and observability?