Boundary announces major upgrades to its cloud-based consolidated IT operations monitoring software.
Boundary’s latest capabilities include a vastly improved user experience, customized event dashboards, and faster deployments of Boundary meters. Boundary also has extended meter coverage and capabilities to better handle denial of service attacks and support three new operating systems: Fedora 14, OS-X and openSUSE.
Boundary’s newly released capabilities for consolidated IT operations monitoring and event management include:
New UI & Contextual Navigation: Based on customer feedback, user experience analysis and streamlined workflow research, Boundary has developed a new UI that vastly reduces the time needed to identify and resolve performance problems. A redesigned vertical navigation bar improves screen space utilization and contextual filters help users quickly navigate from problem notification (event view) to impact analysis (topology view) to detailed diagnostics (streams view) in a matter of seconds — a 75% efficiency improvement from the previous version of Boundary and a massive advantage compared to the time similar activities take using legacy on-premise tools.
Customized Event Dashboards: Boundary now lets end-users easily create customized event dashboards that provide a “single pane of glass” showing which systems are generating the most events. For example, you can see how many events are coming from New Relic, Chef, Nagios and other monitoring tools in one view. Event dashboards can include detailed information such as how many AWS events are being generated by specific AWS API calls.
Faster Deployments: Boundary has significantly accelerated deployments of meters. By eliminating the need for user input on initial installation, companies can more easily use automated change management tools such as Chef and Puppet to deploy and manage the Boundary meter on Windows machines. Boundary also introduced the capability to deploy the same meter using install parameters referencing appropriate tags as well as the ability to install the meter in multiple locations at once such as Test, Staging and Production. These enhancements reduce IT deployment time while adding increased automation. Finally, on servers with many thousands of simultaneous connections running on Linux systems, the meter now starts many times faster on heavily loaded servers.
Resiliency Support: Boundary has improved local filtering which prioritizes application traffic in the meter. For example, if a meter cannot connect to the Boundary service the customer now has the option of storing the flows locally at the client and then streaming them once connectivity is back. This is especially useful when guarantees and SLA’s are relevant.
Decreased Memory Usage and Improved Buffering: Boundary has improved free memory cache efficiency, resulting in memory now being yielded to the OS more aggressively resulting in a 50% reduction in average memory usage. Improved IPFIX data buffering prevents a large build-up of data to be transmitted, reducing memory utilization in high-traffic scenarios. This also improves the meter’s handling of Denial of Service (DoS) scenarios by 60% as Boundary has reduced the meter’s memory utilization to avoid contributing to the traffic load and risk of server crashes.
“This is our most significant product announcement to date, and is in direct response to the complex needs of our customers who are hosting applications across the cloud and on-premise. They need to maintain high reliability and uptime while keeping infrastructure costs as low as possible,” says Gary Read, CEO of Boundary. “They also need their applications and services to perform amid security threats and network unpredictability. The latest version of Boundary is well-equipped to help IT organizations to more easily navigate these issues and help them find problems faster than ever before.”
Coming Soon: Boundary is also announcing limited availability for enhanced event collaboration features. Unlike traditional event consoles, the Boundary collaboration view allows IT operations staff to share information directly from within the event console, so that they don’t lose the context of the issue. All information is automatically captured and stored for future reference. Boundary will also soon release the capability to set up advanced notification rules specifying whom should be notified when specific conditions occur. Employees will be able to receive notifications via email, voice, or SMS. Customers can also use their own proprietary notification systems such as PagerDuty.
The Latest
Overall outage frequency and the general level of reported severity continue to decline, according to the Outage Analysis 2025 from Uptime Institute. However, cyber security incidents are on the rise and often have severe, lasting impacts ...
In March, New Relic published the State of Observability for Media and Entertainment Report to share insights, data, and analysis into the adoption and business value of observability across the media and entertainment industry. Here are six key takeaways from the report ...
Regardless of their scale, business decisions often take time, effort, and a lot of back-and-forth discussion to reach any sort of actionable conclusion ... Any means of streamlining this process and getting from complex problems to optimal solutions more efficiently and reliably is key. How can organizations optimize their decision-making to save time and reduce excess effort from those involved? ...
As enterprises accelerate their cloud adoption strategies, CIOs are routinely exceeding their cloud budgets — a concern that's about to face additional pressure from an unexpected direction: uncertainty over semiconductor tariffs. The CIO Cloud Trends Survey & Report from Azul reveals the extent continued cloud investment despite cost overruns, and how organizations are attempting to bring spending under control ...

According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...
Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...
IT spending is expected to jump nearly 10% in 2025, and organizations are now facing pressure to manage costs without slowing down critical functions like observability. To meet the challenge, leaders are turning to smarter, more cost effective business strategies. Enter stage right: OpenTelemetry, the missing piece of the puzzle that is no longer just an option but rather a strategic advantage ...
Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...

In MEAN TIME TO INSIGHT Episode 13, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud networking strategy ...
In high-traffic environments, the sheer volume and unpredictable nature of network incidents can quickly overwhelm even the most skilled teams, hindering their ability to react swiftly and effectively, potentially impacting service availability and overall business performance. This is where closed-loop remediation comes into the picture: an IT management concept designed to address the escalating complexity of modern networks ...