Gartner's 5 Dimensions of APM
December 02, 2011
Pete Goldin
Share this

Gartner's recently published Magic Quadrant for Application Performance Monitoring defines “five distinct dimensions of, or perspectives on, end-to-end application performance” which are essential to APM, listed below.

Gartner points out that although each of these five technologies are distinct, and often deployed by different stakeholders, there is “a high-level, circular workflow that weaves the five dimensions together.”

1. End-user experience monitoring

End-user experience monitoring is the first step, which captures data on how end-to-end performance impacts the user, and identifies the problem.

2. Runtime application architecture discovery, modeling and display

The second step, the software and hardware components involved in application execution, and their communication paths, are studied to establish the potential scope of the problem.

3. User-defined transaction profiling

The third step involves examining user-defined transactions, as they move across the paths defined in step two, to identify the source of the problem.

4. Component deep-dive monitoring in application context

The fourth step is conducting deep-dive monitoring of the resources consumed by, and events occurring within, the components discovered in step two.

5. Analytics

The final step is the use of analytics – including technologies such as behavior learning engines – to crunch the data generated in the first four steps, discover meaningful and actionable patterns, pinpoint the root cause of the problem, and ultimately anticipate future issues that may impact the end user.

Applying the 5 dimensions to your APM purchase

“These five functionalities represent more or less the conceptual model that enterprise buyers have in their heads – what constitutes the application performance monitoring space, ” explains Will Cappelli, Gartner Research VP in Enterprise Management and co-author of the Magic Quadrant for Application Performance Monitoring.

“If you go back and look at the various head-to-head competitions and marketing arguments that took place even as recently as two years ago, you see vendors pushing one of the five functional areas as: what you need in order to do APM,” Cappelli recalls. “I think it's only because of the persistent demand on the part of enterprise buyers, that they needed all five capabilities, that drove the vendors to populate their portfolios in a way that would adequately reflect those five functionalities.”

The question is: should one vendor be supplying all five capabilities?

“You will see enterprises typically selecting one vendor as their strategic supplier for APM,” Cappelli continues, “but if that vendor does not have all the pieces of the puzzle, the enterprise will supplement with capabilities from some other vendor. This can make a lot of sense.”

“When you look at some of the big suites, and even the vendors that offer all five functionalities, in most cases those vendors have assembled those functionalities out of technologies they have picked up when they acquired many diverse vendors. Even when you go out to buy a suite from one of the larger vendors that offers everything across the board, at the end of the day you are left with very distinct products even if they all share a common name.”

For this reason, Cappelli says there is usually very little technology advantage associated with selecting a single APM vendor over going with multiple vendors providing best-of-breed products for each of the five dimensions. However, he notes that there can be a significant advantage to minimizing the number of vendors you have to deal with.

“Because APM suites, whether assembled by yourself or by a vendor, are complex entities, it is important to have the vendor support that can span across the suite,” Cappelli says. “So in general it makes sense to go with a vendor that can support you at least across the majority of the functionalities that you want.”

“But you do need to be aware that the advantage derived from going down that path – choosing a single vendor rather than multiple vendors – has more to do with that vendor's ability to support you in solving a complex problem rather than any kind of inherent technological advantage derived from some kind of pre-existing integration.”

Related Links:

Another Look At Gartner's 5 Dimensions of APM

Click here to read Part One of the APMdigest interview with Will Cappelli, Gartner Research VP in Enterprise Management.

Click here to read Part Two of the APMdigest interview with Will Cappelli, Gartner Research VP in Enterprise Management.

Share this

The Latest

June 22, 2021

Your employees aren't coming back to the office, at least not in the traditional sense. The pandemic shifted almost all industries into remote work. And according to the results of Ivanti's Everywhere Workplace survey, they're not interested in going back to the way things once were ...

June 21, 2021

Respondents to an OpsRamp survey are moving forward with digital transformation, but many are re-evaluating the number and type of tools they're using. There are three main takeaways from the survey ...

June 17, 2021

More and more mainframe decision makers are becoming aware that the traditional way of handling mainframe operations will soon fall by the wayside. The ever-growing demand for newer, faster digital services has placed increased pressure on data centers to keep up as new applications come online, the volume of data handled continually increases, and workloads become increasingly unpredictable. In a recent Forrester Consulting AIOps survey, commissioned by BMC, the majority of respondents cited that they spend too much time reacting to incidents and not enough time finding ways to prevent them ...

June 16, 2021

In the age of digital transformation, enterprises are migrating to open source software (OSS) in droves to streamline operations and improve customer and employee experiences. However, to unlock the deluge of OSS benefits, it's not enough for organizations to simply implement the software. They must take the necessary steps to build an intentional OSS strategy rooted in ongoing third-party support and training ...

June 15, 2021

In Part 1 of this series, we explored the top pain points associated with managing Internet-based WANs today. This second installment will focus on today's most prevalent SD-WAN deployment challenges specifically and what you can do to better manage modern WANs overall ...

June 14, 2021

Enterprise wide-area networks (WANs) have undergone an incredible transformation over the past several years. More often than not, they're hybrid, offering multiple connection paths between WANs. This provides many benefits but also makes them more challenging to manage than ever before. In Part 1 of this series, we'll explore the top pain points associated with Internet-based WANs ...

June 10, 2021

As we have seen during this digital transformation boom during the pandemic, technologists are managing more applications and data than ever before, which has led three quarters of technologists to be concerned with increased IT complexity. Even more significant, 89% admitted to feeling under immense pressure to keep up with the churn, according to the recent AppDynamics Agents of Transformation report. It's clear that the pandemic has pushed many technologists to their breaking point. To help tackle IT burnout, tech professionals need a "canary" to help them streamline and catch the anomalies before they cause any major performance issues ...

June 09, 2021

An hour-long outage this Tuesday ground the Internet to a halt after popular Content Delivery Network (CDN) provider, Fastly, experienced a glitch that downed Reddit, Spotify, HBO Max, Shopify, Stripe and the BBC, to name just a few of properties affected ...

June 08, 2021

Digital experience has existed for a while now. We have now begun to scratch the surface to measure it. So that calls for Digital Experience Monitoring (DEM). DEM extends Application Performance Monitoring (APM) and Network Performance Management (NPM) to view and optimize application performance issues from the end-user perspective ...

June 07, 2021

The rising adoption of cloud-native architectures, DevOps, and agile methodologies has broken traditional approaches to application security, according to Precise, automatic risk and impact assessment is key for DevSecOps, a new report from Dynatrace, based on an independent global survey of 700 CISOs ...