Dell Software released Foglight APM 5.9, which allows IT to see every step of a transaction for a complete picture of the end user’s experience with an application, combined with the exact execution path and other details through the entire application stack from the code and middleware, all the way down through the operating system and hypervisor.
While many businesses routinely gauge application availability, few have comprehensive visibility into the customer’s experience as they transact with an application. Foglight APM now links all application layer traces back to the end user, creating a single customer-centric transaction model that provides IT with actionable information to help them better understand and manage the technology that impacts business goals and customer satisfaction.
Foglight APM enables both IT and business stakeholders to speak the same language ─ with a common focus on customer experience ─ and gives IT the capability to isolate problems, and identify opportunities to proactively improve application performance.
With its Transaction DNA technology, the new release of Foglight APM can also facilitate improved collaboration between IT operations and developers. This unique technology unifies disparate data sources under a common business-oriented framework, enabling the two groups to work on the same problem as a team to resolve it quickly and help alleviate blamestorms. Improved collaboration is key to reducing Mean Time to Resolution, and is a business priority today because of its impact on critical business process transactions and users conducting commerce with web applications.
Foglight APM 5.9 includes the following new capabilities:
- Enhanced support for monitoring of AJAX applications: Combines data collected from both the network and within the browser, to continuously report on 100 percent of user session activity, including performance breakdown and errors, navigation timing, and keyboard/mouse events.
- Unique Transaction DNA technology: Delivers a data model that uses transactions as the framework for unifying disparate sources of IT data for dashboards, visualizations and analysis. All application layer traces are linked back to the end user and their associated session activity.
- Interactive pre-defined page content analysis: Breakdown by location, browser and content type makes it easy for IT and business analysts alike to pivot user activity data to understand common attributes of application performance slowdowns and errors.
- Powerful “funnel” analysis of multi-step transactions: Links directly back to data, to uniquely provide technical evidence for the impact on business transaction completion rates from factors such as web design, performance and more.
- Transaction Trace Repository for storage and analysis of high volume, high granularity data: Specially designed to address the Big Data problem in APM by capturing all performance and content details for every click by every web user. A turnkey appliance (either physical or virtual) provides a single point of management, that is fast to install, easy to maintain, and scales to support the largest user volumes, with comprehensive security and compliance adherence.
John Newsom, executive director, Application Performance Monitoring, Dell Software, said: “Foglight APM 5.9 represents a significant breakthrough in collaborative customer-centric APM, with user behavior monitoring, end-to-end transaction analysis and contextual forensics that provide critical insight for both IT and the business. The best measure of application delivery is the end-user experience, and Foglight APM offers a more dynamic, real-time, transaction-centric view of the entire application, including every aspect of every end user interaction."
"With Foglight, application support teams can see the exact end user experience, and isolate problems to application code within the browser or on the application server, external third party service calls, the application infrastructure, or anywhere else in the execution path. When both IT and business analysts are equipped with answers, rather than data, MTTR is drastically reduced and end-user experience is optimized.”
Related Links:
The Latest
Regardless of their scale, business decisions often take time, effort, and a lot of back-and-forth discussion to reach any sort of actionable conclusion ... Any means of streamlining this process and getting from complex problems to optimal solutions more efficiently and reliably is key. How can organizations optimize their decision-making to save time and reduce excess effort from those involved? ...
As enterprises accelerate their cloud adoption strategies, CIOs are routinely exceeding their cloud budgets — a concern that's about to face additional pressure from an unexpected direction: uncertainty over semiconductor tariffs. The CIO Cloud Trends Survey & Report from Azul reveals the extent continued cloud investment despite cost overruns, and how organizations are attempting to bring spending under control ...

According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...
Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...
IT spending is expected to jump nearly 10% in 2025, and organizations are now facing pressure to manage costs without slowing down critical functions like observability. To meet the challenge, leaders are turning to smarter, more cost effective business strategies. Enter stage right: OpenTelemetry, the missing piece of the puzzle that is no longer just an option but rather a strategic advantage ...
Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...

In MEAN TIME TO INSIGHT Episode 13, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud networking strategy ...
In high-traffic environments, the sheer volume and unpredictable nature of network incidents can quickly overwhelm even the most skilled teams, hindering their ability to react swiftly and effectively, potentially impacting service availability and overall business performance. This is where closed-loop remediation comes into the picture: an IT management concept designed to address the escalating complexity of modern networks ...
In 2025, enterprise workflows are undergoing a seismic shift. Propelled by breakthroughs in generative AI (GenAI), large language models (LLMs), and natural language processing (NLP), a new paradigm is emerging — agentic AI. This technology is not just automating tasks; it's reimagining how organizations make decisions, engage customers, and operate at scale ...
In the early days of the cloud revolution, business leaders perceived cloud services as a means of sidelining IT organizations. IT was too slow, too expensive, or incapable of supporting new technologies. With a team of developers, line of business managers could deploy new applications and services in the cloud. IT has been fighting to retake control ever since. Today, IT is back in the driver's seat, according to new research by Enterprise Management Associates (EMA) ...