The Age of the Customer Requires a Shift in Monitoring Focus
April 02, 2014

J. Rakowski
Forrester

Share this

In my February 2014 report Left–Shift Technology Monitoring For Success In The Age Of The Customer, I explore what the near future will bring for technology monitoring approaches and solutions. Today, for the typical I&O organization, successful technology or service delivery monitoring focuses on two main areas. Firstly, availability, so ensuring the technology underpinning business services is up and available when needed. And secondly, performance, so making sure that technology utilized (applications and associated workloads) is fast enough for the business service it supports.

There is a major problem with this approach though. As the famous author Harper Lee stated “We know all men are not created equal” and the same can be said about your customers and employees – they are not all equal and the rapid pace of consumer technology innovation in areas such as mobile means that they will utilize technology in different ways to support productivity or to engage with your enterprise as a customer.

Our relationship with technology is changing rapidly. It is becoming more intimate and personal, meaning that datacenter centric monitoring approaches that focus on availability and performance alone, while still essential, are only the beginning of what is required for a holistic technology monitoring strategy.

In the age of the customer, it’s increasingly easy for your customers and even employees to switch to another technology provider. They will do this if they feel their experience needs are not being met from the technology based services provided.

Experience can be broken down into three simple facets:

1. Does the technology based service meet needs?

2. Is it easy to use?

3. Is it enjoyable?

The technology monitoring market in recent years has evolved from a focus on infrastructure monitoring, to application monitoring and the emergence of End User Experience Monitoring/Management (EUEM). EUEM looks to understand technology based business service performance from an employee or increasingly a customer perspective. However, many methods that I see in the market today are still application-centric in their monitoring approach e.g. the operator configures monitoring based on specified applications.

This means that many EUEM implementations fail to understand the full employee or customer journey. This includes how they use technology in in order to be productive within the enterprise or how they engage with enterprises, externally as customers. To understand the full technology interaction journey requires a more detailed form of end user monitoring which we define as End User Behavior Monitoring.

End User Behavior Monitoring has the capability of monitoring all interactions or activity between employees/customers and the technology they use, i.e consumer devices and applications. The aim here is not to alert, but to build up a detailed understanding of how the various types of business users or personas interact with business services so as to ensure that experience is tailored appropriately.

The following graphic summarizes this form of monitoring and its relation to other monitoring approaches on the market today:


Of course, end user behavior monitoring may ring alarm bells in regards to data privacy, but as our relationship with technology becomes increasingly more personal then I expect some of these concerns to fade away along with associated legislation.

If you are a Forrester client then my report highlights the concepts of End User Behavior Monitoring in detail. I also have an associated report coming out in Q2 2014 which looks at solutions on the market today which are capable of doing this form of monitoring within the enterprise.

John Rakowski is Analyst, Infrastructure and Operations, at Forrester.

Share this

The Latest

December 15, 2017

CIOs around the globe are more determined than ever to achieve digital transformation within their organizations despite setbacks, according to a survey by Logicalis ...

December 14, 2017

The Spiceworks 2018 IT Career Outlook found that 32 percent of IT professionals plan to search for or take an IT job with a new employer in the next 12 months ...

December 12, 2017

Downtime and security risks were present in each cloud environment tested, according to 2016 Private Cloud Resiliency Benchmarks, a report from Continuity Software ...

December 11, 2017

Companies that empower employees with the applications they want and need, and make them readily accessible — anytime, anywhere, on any device — can benefit from measurable gains at the individual and organizational level, according to a survey, The Impact of the Digital Workforce: A New Equilibrium of the Digitally Transformed Enterprise, conducted by VMware ...

December 08, 2017

Metrics-oriented thinking is key to continuous improvement – and a core tenant of any agile or DevOps philosophy. Metrics are factual and once agreed upon, these facts are used to drive discussions and methods. They also allow for a collaborative effort to execute decisions that contribute towards business outcomes ...

December 06, 2017

The recent outage of the University of Cambridge website hosting Stephen Hawking's doctoral thesis is a prime example of what happens when niche websites become exposed to mainstream levels of traffic ...

December 05, 2017

Even as many organizations continue to adopt multi-cloud technologies as part of their dramatic transformation, the mainframe remains a relevant and growing data center hub for many, according to BMC's 12th annual Mainframe Research Report ...

December 04, 2017

Banks are laying the foundation for the digitization of their businesses and anticipate emerging technologies -- from IoT to biometric authentications and blockchain -- to make a substantial imprint on the industry within five years, according to a recent survey of banking professionals commissioned by VMware ...

December 01, 2017

A recent blog on APMdigest — Protecting Network Performance is as Essential as Securing the Network — mentions that performance issues and outages are possible when security tools (like an IPS, WAF, etc.) are inserted inline. However, one easy way to mitigate this concern is to deploy a bypass switch before the inline tool ...

November 30, 2017

While self-service and self-help IT are in common practice, about half of organizations surveyed are still struggling with full deployment and realizing its value, according to a new report by Ivanti and the Service Desk Institute ...