
Catchpoint announced major platform enhancements, including Application Performance Management (APM) deep linking and expanded integrations providing enterprises complete user experience visibility, from symptom to cause.
In addition, Catchpoint surpasses 1,000 Border Gateway Protocol (BGP) peers for extending reachability and releases node-to-node testing within its global observability network. To enable the delivery of today’s distributed digital experiences, Catchpoint’s platform is powered by the world’s largest network of active performance observers, driving innovation as part of its user-centric mindset.
“Today, many Enterprises struggle to deliver their business outcomes with traditional monitoring technology as the majority of legacy tools are incapable of providing holistic business-level observability of a hybrid IT world” says Mehdi Daoudi, CEO of Catchpoint. “These new capabilities are another important milestone towards empowering IT teams so they can manage the visibility challenges associated with everything hybrid!”
Organizational silos and disjointed monitoring tools hinder the effectiveness of IT operations. If the monitoring strategy uses certain APM providers, then IT teams can trace a specific external monitoring transaction all the way to their individual APM line of code thanks to Catchpoint’s insight ability. With expansive REST API and data webhooks, teams can develop normalized capabilities for internal and external users to consume data in the platforms of their choice.
Examples include:
- Deep link with AppDynamics, SignalFX, and Instana
- Integrate data to Datadog, Splunk Cloud, or Servicetrace
Lack of unified visibility across the full digital service delivery stack is a real challenge for today’s IT deployments. The stack extends from the cloud, through the internet, and all the way to users’ browsers, apps, and devices. With Catchpoint’s node-to-node testing ability, customers can now perform mesh monitoring to diagnose or fault isolate network-related issues between multiple locations, including locations within an enterprise premise. The ability to augment an expansive array of existing visuals with “bring your own visuals” further allows IT teams to gain much-needed visibility across the full stack.
IT team’s monitoring needs to be as distributed as the digital service they deliver and the end users who consume them. Since traditional APM tools focus on only application monitoring, extending digital service reach eliminates blind spots into end-to-end user experience. With over 1,000 BGP peers, including the monitoring of IPv6 routes, IT teams can configure monitoring, search, and set up alerting for IPv4 and IPv6 prefixes. The ability to run on-demand tests directly from MAC and PC extends troubleshooting abilities to where IT teams have traditionally had no reach – active testing from the user’s devices.
The Latest
64% of enterprise networking teams use internally developed software or scripts for network automation, but 61% of those teams spend six or more hours per week debugging and maintaining them, according to From Scripts to Platforms: Why Homegrown Tools Dominate Network Automation and How Vendors Can Help, my latest EMA report ...
Cloud computing has transformed how we build and scale software, but it has also quietly introduced one of the most persistent challenges in modern IT: cost visibility and control ... So why, after more than a decade of cloud adoption, are cloud costs still spiraling out of control? The answer lies not in tooling but in culture ...
CEOs are committed to advancing AI solutions across their organization even as they face challenges from accelerating technology adoption, according to the IBM CEO Study. The survey revealed that executive respondents expect the growth rate of AI investments to more than double in the next two years, and 61% confirm they are actively adopting AI agents today and preparing to implement them at scale ...

A major architectural shift is underway across enterprise networks, according to a new global study from Cisco. As AI assistants, agents, and data-driven workloads reshape how work gets done, they're creating faster, more dynamic, more latency-sensitive, and more complex network traffic. Combined with the ubiquity of connected devices, 24/7 uptime demands, and intensifying security threats, these shifts are driving infrastructure to adapt and evolve ...

The development of banking apps was supposed to provide users with convenience, control and piece of mind. However, for thousands of Halifax customers recently, a major mobile outage caused the exact opposite, leaving customers unable to check balances, or pay bills, sparking widespread frustration. This wasn't an isolated incident ... So why are these failures still happening? ...
Cyber threats are growing more sophisticated every day, and at their forefront are zero-day vulnerabilities. These elusive security gaps are exploited before a fix becomes available, making them among the most dangerous threats in today's digital landscape ... This guide will explore what these vulnerabilities are, how they work, why they pose such a significant threat, and how modern organizations can stay protected ...
The prevention of data center outages continues to be a strategic priority for data center owners and operators. Infrastructure equipment has improved, but the complexity of modern architectures and evolving external threats presents new risks that operators must actively manage, according to the Data Center Outage Analysis 2025 from Uptime Institute ...
As observability engineers, we navigate a sea of telemetry daily. We instrument our applications, configure collectors, and build dashboards, all in pursuit of understanding our complex distributed systems. Yet, amidst this flood of data, a critical question often remains unspoken, or at best, answered by gut feeling: "Is our telemetry actually good?" ... We're inviting you to participate in shaping a foundational element for better observability: the Instrumentation Score ...
We're inching ever closer toward a long-held goal: technology infrastructure that is so automated that it can protect itself. But as IT leaders aggressively employ automation across our enterprises, we need to continuously reassess what AI is ready to manage autonomously and what can not yet be trusted to algorithms ...
Much like a traditional factory turns raw materials into finished products, the AI factory turns vast datasets into actionable business outcomes through advanced models, inferences, and automation. From the earliest data inputs to the final token output, this process must be reliable, repeatable, and scalable. That requires industrializing the way AI is developed, deployed, and managed ...