Skip to main content

Beyond the Perimeter: Why Application-Aware Network Monitoring Matters

Mark Troester
Progress

The modern world relies on applications: every business, regardless of industry, depends on them to varying degrees. Whether you operate a hospital, an e-commerce business, a farm or a factory, applications play a central role in day-to-day operations. Even a few minutes of application downtime can have disastrous consequences.

Consider this: according to a recent study, every minute of downtime costs businesses an average of $4,500, and outages typically last between 20 and 60 minutes. This means that at the very least, an outage can cost your company around $90,000 and potentially much more.

While most businesses focus on endpoint and perimeter protection to combat such incidents, there are many other factors that can disrupt an application beyond conventional perimeter breaches.

To effectively manage application experience (AX) and user experience (UX), businesses need greater visibility into the networks. This can be achieved through application-aware network performance monitoring (NPM) technologies.

How NPM Works

For many companies, application performance is a black box. They often become aware of issues only when complaints start pouring in, and even then, identifying the root cause can be time-consuming — a luxury most companies cannot afford.

NPM changes the game. It enables you to identify which applications are running below standard speed and measure response times for both the network and the application itself. This allows for quick differentiation between network delays and application delays when troubleshooting.

If the problem lies with the application, NPM provides IT teams with comprehensive information to resolve the issue. This includes response times for applications, transport times for the network, number of transactions, server response time, network transport time, responses in percentiles (maximum/minimum/average), number of concurrent users, and more.

Of course, not all applications require monitoring. NPM should be employed selectively, focusing on critical applications that are vital to daily business operations — such as customer-facing e-commerce applications. Additionally, it is crucial to integrate the information provided by NPM with the broader IT monitoring, management and surveillance ecosystem. In the realm of system security and operational efficiency, everything is interconnected.

NPM in Action

Let's consider a hypothetical scenario: you run a health insurance company. Thousands of users access your application daily to schedule doctor's appointments, make payments, and more. Suddenly seemingly out of nowhere, the application stops functioning. Complaints and calls flood in, and people are understandably frantic—after all, healthcare is of utmost importance.

At this point, many IT departments initiate the blame game or start grasping blindly for answers they know they may not find. However, with NPM in place, the next step is simple: consult the list.

What is the list? NPM solutions measure the response times and delays for every user-to-app transaction, aggregating them into a sortable list from slowest to fastest. This means that IT can swiftly identify the root cause of the problem and take immediate action to find a solution.

In 2023, seamlessness has become a basic consumer expectation. When a consumer places an online order, they expect to have the option of receiving it within a day or two. When they request a car, they expect it to arrive within minutes. And when they open an app, they expect it to launch within seconds — no more than one or two. Exceeding this threshold puts your company's reputation at stake. By implementing NPM, businesses can ensure that when application issues arise, they can promptly rectify them, keeping customers satisfied and preventing more severe consequences.

Mark Troester is VP of Strategy at Progress

Hot Topics

The Latest

A recent Rocket Software and Foundry study found that just 28% of organizations fully leverage their mainframe data, a concerning statistic given its critical role in powering AI models, predictive analytics, and informed decision-making ...

What kind of ROI is your organization seeing on its technology investments? If your answer is "it's complicated," you're not alone. According to a recent study conducted by Apptio ... there is a disconnect between enterprise technology spending and organizations' ability to measure the results ...

In today’s data and AI driven world, enterprises across industries are utilizing AI to invent new business models, reimagine business and achieve efficiency in operations. However, enterprises may face challenges like flawed or biased AI decisions, sensitive data breaches and rising regulatory risks ...

In MEAN TIME TO INSIGHT Episode 12, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses purchasing new network observability solutions.... 

There's an image problem with mobile app security. While it's critical for highly regulated industries like financial services, it is often overlooked in others. This usually comes down to development priorities, which typically fall into three categories: user experience, app performance, and app security. When dealing with finite resources such as time, shifting priorities, and team skill sets, engineering teams often have to prioritize one over the others. Usually, security is the odd man out ...

Image
Guardsquare

IT outages, caused by poor-quality software updates, are no longer rare incidents but rather frequent occurrences, directly impacting over half of US consumers. According to the 2024 Software Failure Sentiment Report from Harness, many now equate these failures to critical public health crises ...

In just a few months, Google will again head to Washington DC and meet with the government for a two-week remedy trial to cement the fate of what happens to Chrome and its search business in the face of ongoing antitrust court case(s). Or, Google may proactively decide to make changes, putting the power in its hands to outline a suitable remedy. Regardless of the outcome, one thing is sure: there will be far more implications for AI than just a shift in Google's Search business ... 

Image
Chrome

In today's fast-paced digital world, Application Performance Monitoring (APM) is crucial for maintaining the health of an organization's digital ecosystem. However, the complexities of modern IT environments, including distributed architectures, hybrid clouds, and dynamic workloads, present significant challenges ... This blog explores the challenges of implementing application performance monitoring (APM) and offers strategies for overcoming them ...

Service disruptions remain a critical concern for IT and business executives, with 88% of respondents saying they believe another major incident will occur in the next 12 months, according to a study from PagerDuty ...

IT infrastructure (on-premises, cloud, or hybrid) is becoming larger and more complex. IT management tools need data to drive better decision making and more process automation to complement manual intervention by IT staff. That is why smart organizations invest in the systems and strategies needed to make their IT infrastructure more resilient in the event of disruption, and why many are turning to application performance monitoring (APM) in conjunction with high availability (HA) clusters ...

Beyond the Perimeter: Why Application-Aware Network Monitoring Matters

Mark Troester
Progress

The modern world relies on applications: every business, regardless of industry, depends on them to varying degrees. Whether you operate a hospital, an e-commerce business, a farm or a factory, applications play a central role in day-to-day operations. Even a few minutes of application downtime can have disastrous consequences.

Consider this: according to a recent study, every minute of downtime costs businesses an average of $4,500, and outages typically last between 20 and 60 minutes. This means that at the very least, an outage can cost your company around $90,000 and potentially much more.

While most businesses focus on endpoint and perimeter protection to combat such incidents, there are many other factors that can disrupt an application beyond conventional perimeter breaches.

To effectively manage application experience (AX) and user experience (UX), businesses need greater visibility into the networks. This can be achieved through application-aware network performance monitoring (NPM) technologies.

How NPM Works

For many companies, application performance is a black box. They often become aware of issues only when complaints start pouring in, and even then, identifying the root cause can be time-consuming — a luxury most companies cannot afford.

NPM changes the game. It enables you to identify which applications are running below standard speed and measure response times for both the network and the application itself. This allows for quick differentiation between network delays and application delays when troubleshooting.

If the problem lies with the application, NPM provides IT teams with comprehensive information to resolve the issue. This includes response times for applications, transport times for the network, number of transactions, server response time, network transport time, responses in percentiles (maximum/minimum/average), number of concurrent users, and more.

Of course, not all applications require monitoring. NPM should be employed selectively, focusing on critical applications that are vital to daily business operations — such as customer-facing e-commerce applications. Additionally, it is crucial to integrate the information provided by NPM with the broader IT monitoring, management and surveillance ecosystem. In the realm of system security and operational efficiency, everything is interconnected.

NPM in Action

Let's consider a hypothetical scenario: you run a health insurance company. Thousands of users access your application daily to schedule doctor's appointments, make payments, and more. Suddenly seemingly out of nowhere, the application stops functioning. Complaints and calls flood in, and people are understandably frantic—after all, healthcare is of utmost importance.

At this point, many IT departments initiate the blame game or start grasping blindly for answers they know they may not find. However, with NPM in place, the next step is simple: consult the list.

What is the list? NPM solutions measure the response times and delays for every user-to-app transaction, aggregating them into a sortable list from slowest to fastest. This means that IT can swiftly identify the root cause of the problem and take immediate action to find a solution.

In 2023, seamlessness has become a basic consumer expectation. When a consumer places an online order, they expect to have the option of receiving it within a day or two. When they request a car, they expect it to arrive within minutes. And when they open an app, they expect it to launch within seconds — no more than one or two. Exceeding this threshold puts your company's reputation at stake. By implementing NPM, businesses can ensure that when application issues arise, they can promptly rectify them, keeping customers satisfied and preventing more severe consequences.

Mark Troester is VP of Strategy at Progress

Hot Topics

The Latest

A recent Rocket Software and Foundry study found that just 28% of organizations fully leverage their mainframe data, a concerning statistic given its critical role in powering AI models, predictive analytics, and informed decision-making ...

What kind of ROI is your organization seeing on its technology investments? If your answer is "it's complicated," you're not alone. According to a recent study conducted by Apptio ... there is a disconnect between enterprise technology spending and organizations' ability to measure the results ...

In today’s data and AI driven world, enterprises across industries are utilizing AI to invent new business models, reimagine business and achieve efficiency in operations. However, enterprises may face challenges like flawed or biased AI decisions, sensitive data breaches and rising regulatory risks ...

In MEAN TIME TO INSIGHT Episode 12, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses purchasing new network observability solutions.... 

There's an image problem with mobile app security. While it's critical for highly regulated industries like financial services, it is often overlooked in others. This usually comes down to development priorities, which typically fall into three categories: user experience, app performance, and app security. When dealing with finite resources such as time, shifting priorities, and team skill sets, engineering teams often have to prioritize one over the others. Usually, security is the odd man out ...

Image
Guardsquare

IT outages, caused by poor-quality software updates, are no longer rare incidents but rather frequent occurrences, directly impacting over half of US consumers. According to the 2024 Software Failure Sentiment Report from Harness, many now equate these failures to critical public health crises ...

In just a few months, Google will again head to Washington DC and meet with the government for a two-week remedy trial to cement the fate of what happens to Chrome and its search business in the face of ongoing antitrust court case(s). Or, Google may proactively decide to make changes, putting the power in its hands to outline a suitable remedy. Regardless of the outcome, one thing is sure: there will be far more implications for AI than just a shift in Google's Search business ... 

Image
Chrome

In today's fast-paced digital world, Application Performance Monitoring (APM) is crucial for maintaining the health of an organization's digital ecosystem. However, the complexities of modern IT environments, including distributed architectures, hybrid clouds, and dynamic workloads, present significant challenges ... This blog explores the challenges of implementing application performance monitoring (APM) and offers strategies for overcoming them ...

Service disruptions remain a critical concern for IT and business executives, with 88% of respondents saying they believe another major incident will occur in the next 12 months, according to a study from PagerDuty ...

IT infrastructure (on-premises, cloud, or hybrid) is becoming larger and more complex. IT management tools need data to drive better decision making and more process automation to complement manual intervention by IT staff. That is why smart organizations invest in the systems and strategies needed to make their IT infrastructure more resilient in the event of disruption, and why many are turning to application performance monitoring (APM) in conjunction with high availability (HA) clusters ...