What You Should Be Monitoring to Ensure Digital Performance - Part 5
November 05, 2018
Share this

APMdigest asked experts from across the IT industry for their opinions on what IT departments should be monitoring to ensure digital performance. Part 5, the final installment, offers some recommendations you may not have thought about.

Start with What You Should Be Monitoring to Ensure Digital Performance - Part 1

Start with What You Should Be Monitoring to Ensure Digital Performance - Part 2

Start with What You Should Be Monitoring to Ensure Digital Performance - Part 3

Start with What You Should Be Monitoring to Ensure Digital Performance - Part 4

SECURITY

The current software application scenario is predominantly threatened by security issues and cybersecurity risks. Security is probably one of the most critical aspects to consider while ensuring digital performance. In today's world of cyber threats, Security monitoring has become critical to safeguard apps against any unwanted and unwarranted cyber-attacks. Organizations must have a system that helps them monitor and improve the security of their applications. Digital Transformation and a robust digital interface can be offered only after ensuring all the security aspects.
Sajid Khan
Senior Director, Global Delivery, Cigniti Technologies

When processing transactions or information of your clients you must be monitoring your risk assessments and the implementation of your security measures. Maintain yourself and your team subscribed to threat alerts that will allow you to stay on top of possible risks.
Otis Gospodnetić
Founder, Sematext

Security strategy: Ensure that there is a process in place to protect the company's systems and data especially when adding or integrating applications.
Colin Earl
CEO, Agiloft

SOCIAL MEDIA

There are many metrics necessary to ensure digital performance, but there is a key metric often overlooked by businesses: social media based metrics. Data from social media monitoring has too long been considered a vanity metric, but it can have real operational value if used correctly. Coupled with machine learning algorithms, analyst teams can be alerted in real time to track and correlate social media data with changes in product demand or revenue, identifying the root cause immediately, and providing forecasting for the future. What's the value in this? Let's say a celebrity promotes your brand via social media and the post starts gaining traction, you need to quickly identify the actual business impact. That way, you can leverage the momentum in-store and online by adjusting to inventory to meet expected demand, tactically bundling products to grow basket size, etc. Social media has a huge impact on digital performance, and it is essential businesses are able to predict and manage this metric in real time.
Ira Cohen
Co-Founder and Chief Data Scientist, Anodot

ITSM SUPPORT

For organizations in the throes of executing digital transformation, understanding how users interact with IT can help improve digital performance. Employees' optimum use of digital assets is tied to how well ITSM supports them when there are performance issues. Therefore, monitoring the efficiency of your ITSM processes can identify where less-than-adequate support is leading to weaker digital performance. In general, applying analytics to ITSM will give an organization actionable data points, to determine which combination of phone, email, automation, self-help options, social channels or integration to Twitter, Facebook, or Slack are the most effective means of receiving and resolving IT support issues. For example, measuring and monitoring the resolution of calls that come into a help desk, how long queue delays are, and whether the calls resulted in an improvement in user productivity can provide an indicator of how well ITSM is enabling digital performance, or being a block.
Alan Taylor
HDM, SMM, Principal Product Manager, Ivanti

PEOPLE

Rather than focusing on technological metrics like uptime or downtime, CPU, etc. companies should focus more on the human metrics. Talent is the number one operating priority, so measuring digital performance has more to do with the type of talent within an organization. This involves considering metrics like how many senior people they have, what their bench strength looks like, how long people have been in their roles, who the top performers are and whether they're being rewarded with opportunities or accolades. Once you have your focus on your people and the criteria for success aligned accordingly, you can do anything.
Craig Williams
VP and CIO, Ciena

Share this

The Latest

February 20, 2020

Over 70% of C-Suite decision makers believe business innovation and staff retention are driven by improved visibility into network and application performance, according to Rethink Possible: Visibility and Network Performance – The Pillars of Business Success, a survey
conducted by Riverbed ...

February 19, 2020

Modern enterprises rely upon their IT departments to deliver a seamless digital customer experience. Performance and availability are the foundational stepping stones to delivering that customer experience. Along those lines, this month we released a new research study titled the IT Downtime Detection and Mitigation Report that contains recommendations on how to best prevent, detect or mitigate brownouts and outages, given the context of today’s IT transformation trends ...

February 18, 2020

While Application Performance Management (APM) has become mainstream, with a majority of tech pros using APM tools regularly, there's work to be done to move beyond troubleshooting ...

February 13, 2020

Over the last few decades, IT departments have decreased budgets in part because of recession. As a result, they have are being asked to do more with less. The increase in work has amplified the need for automation ...

February 12, 2020

Many variables must align for optimum APM, and security is certainly among them. I offer the following APM predictions for 2020, which revolve around the reality that we will definitely begin to see much deeper integration of WAN technology on the security front. Look for this integration to take shape in the following ways ...

February 11, 2020

When it comes to growing a successful company, research shows it isn't about getting the most out of employees, but delivering an experience that empowers them to be and do their best. And according to Priming a New Era of Digital Wellness, a new study conducted by Quartz Insights in partnership with Citrix Systems, technology is the secret to doing so ...

February 10, 2020

Only 11% of website decision-makers feel that they have complete insight into the scripts that they use on their websites. However, industry estimates state that about 70% of the code on a website comes from a third-party library or service. Research highlights a clear need to raise awareness of the potential threats associated with the vulnerabilities inherent in third-party code ...

February 06, 2020

The ever-increasing access and speeds offered by today's modern networks offer many advantages to businesses and consumers, but also make the integrity of their performance and security more paramount than ever before. Organizations are struggling to manage the constant fluctuations in network conditions and security threats. This has prompted many to explore how automation can help to streamline network management and security processes ...

February 05, 2020

The demand to deliver a consistently positive and innovative customer experience is something that many companies — more specifically, their DevOps teams — are currently grappling with. While the ability to push out multiple features a week may appear as a great accomplishment for DevOps teams, our survey showed that 82% commonly discover bugs in production ...

February 04, 2020

Ensuring reliable data security is a critical part of Application Performance Management (APM) — or at least it should be. The fact is, as a result of our need for speed, increasingly development teams are confronted with the problem of releasing applications faster without compromising security ...