Gartner's recently published Magic Quadrant for Application Performance Monitoring defines “five distinct dimensions of, or perspectives on, end-to-end application performance” which are essential to APM, listed below.
Gartner points out that although each of these five technologies are distinct, and often deployed by different stakeholders, there is “a high-level, circular workflow that weaves the five dimensions together.”
1. End-user experience monitoring
End-user experience monitoring is the first step, which captures data on how end-to-end performance impacts the user, and identifies the problem.
2. Runtime application architecture discovery, modeling and display
The second step, the software and hardware components involved in application execution, and their communication paths, are studied to establish the potential scope of the problem.
3. User-defined transaction profiling
The third step involves examining user-defined transactions, as they move across the paths defined in step two, to identify the source of the problem.
4. Component deep-dive monitoring in application context
The fourth step is conducting deep-dive monitoring of the resources consumed by, and events occurring within, the components discovered in step two.
5. Analytics
The final step is the use of analytics – including technologies such as behavior learning engines – to crunch the data generated in the first four steps, discover meaningful and actionable patterns, pinpoint the root cause of the problem, and ultimately anticipate future issues that may impact the end user.
Applying the 5 dimensions to your APM purchase
“These five functionalities represent more or less the conceptual model that enterprise buyers have in their heads – what constitutes the application performance monitoring space, ” explains Will Cappelli, Gartner Research VP in Enterprise Management and co-author of the Magic Quadrant for Application Performance Monitoring.
“If you go back and look at the various head-to-head competitions and marketing arguments that took place even as recently as two years ago, you see vendors pushing one of the five functional areas as: what you need in order to do APM,” Cappelli recalls. “I think it's only because of the persistent demand on the part of enterprise buyers, that they needed all five capabilities, that drove the vendors to populate their portfolios in a way that would adequately reflect those five functionalities.”
The question is: should one vendor be supplying all five capabilities?
“You will see enterprises typically selecting one vendor as their strategic supplier for APM,” Cappelli continues, “but if that vendor does not have all the pieces of the puzzle, the enterprise will supplement with capabilities from some other vendor. This can make a lot of sense.”
“When you look at some of the big suites, and even the vendors that offer all five functionalities, in most cases those vendors have assembled those functionalities out of technologies they have picked up when they acquired many diverse vendors. Even when you go out to buy a suite from one of the larger vendors that offers everything across the board, at the end of the day you are left with very distinct products even if they all share a common name.”
For this reason, Cappelli says there is usually very little technology advantage associated with selecting a single APM vendor over going with multiple vendors providing best-of-breed products for each of the five dimensions. However, he notes that there can be a significant advantage to minimizing the number of vendors you have to deal with.
“Because APM suites, whether assembled by yourself or by a vendor, are complex entities, it is important to have the vendor support that can span across the suite,” Cappelli says. “So in general it makes sense to go with a vendor that can support you at least across the majority of the functionalities that you want.”
“But you do need to be aware that the advantage derived from going down that path – choosing a single vendor rather than multiple vendors – has more to do with that vendor's ability to support you in solving a complex problem rather than any kind of inherent technological advantage derived from some kind of pre-existing integration.”
Related Links:
The Latest
Gartner has highlighted the top trends that will impact technology providers in 2024: Generative AI (GenAI) is dominating the technical and product agenda of nearly every tech provider ...
In MEAN TIME TO INSIGHT Episode 4 - Part 1, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses artificial intelligence and network management ...
The integration and maintenance of AI-enabled Software as a Service (SaaS) applications have emerged as pivotal points in enterprise AI implementation strategies, offering both significant challenges and promising benefits. Despite the enthusiasm surrounding AI's potential impact, the reality of its implementation presents hurdles. Currently, over 90% of enterprises are grappling with limitations in integrating AI into their tech stack ...
In the intricate landscape of IT infrastructure, one critical component often relegated to the back burner is Active Directory (AD) forest recovery — an oversight with costly consequences ...
eBPF is a technology that allows users to run custom programs inside the Linux kernel, which changes the behavior of the kernel and makes execution up to 10x faster(link is external) and more efficient for key parts of what makes our computing lives work. That includes observability, networking and security ...
Data mesh, an increasingly important decentralized approach to data architecture and organizational design, focuses on treating data as a product, emphasizing domain-oriented data ownership, self-service tools and federated governance. The 2024 State of the Data Lakehouse report from Dremio presents evidence of the growing adoption of data mesh architectures in enterprises ... The report highlights that the drive towards data mesh is increasingly becoming a business strategy to enhance agility and speed in problem-solving and innovation ...
Too much traffic can crash a website ... That stampede of traffic is even more horrifying when it's part of a malicious denial of service attack ... These attacks are becoming more common, more sophisticated and increasingly tied to ransomware-style demands. So it's no wonder that the threat of DDoS remains one of the many things that keep IT and marketing leaders up at night ...
Today, applications serve as the backbone of businesses, and therefore, ensuring optimal performance has never been more critical. This is where application performance monitoring (APM) emerges as an indispensable tool, empowering organizations to safeguard their applications proactively, match user expectations, and drive growth. But APM is not without its challenges. Choosing to implement APM is a path that's not easily realized, even if it offers great benefits. This blog deals with the potential hurdles that may manifest when you actualize your APM strategy in your IT application environment ...
This year's Super Bowl drew in viewership of nearly 124 million viewers and made history as the most-watched live broadcast event since the 1969 moon landing. To support this spike in viewership, streaming companies like YouTube TV, Hulu and Paramount+ began preparing their IT infrastructure months in advance to ensure an exceptional viewer experience without outages or major interruptions. New Relic conducted a survey to understand the importance of a seamless viewing experience and the impact of outages during major streaming events such as the Super Bowl ...