
New Relic and JFrog announced an integration that gives engineering teams a single point of access to monitor and keep software development operations running efficiently.
Using New Relic alongside JFrog provides real-time visibility into CI/CD pipelines, APIs, and web application development workflows, empowering DevOps and security leaders to quickly address software supply chain performance and security issues. The integration is available via New Relic Instant Observability, an open ecosystem of integrations with 500+ cloud services, tools, and pre-built resources designed to help every engineer embrace observability as a daily practice.
The new integration allows site reliability engineers (SREs), security, and operations teams to consistently monitor the health, security, and usage trends at every stage of the software development life cycle (SDLC). Engineering teams can track key metrics and generate alerts in New Relic to quickly identify any performance degradation, enabling administrators to proactively manage performance, mitigate risks, and remediate issues to ensure optimal uptime in one unified view.
"Today’s developers need a 360-degree view of applications to monitor and remediate both performance and security, no matter if they’re running on-premises, in the cloud, or at the edge,” said Omer Cohen, Executive Vice President of Strategy at JFrog. “Our integration with New Relic gives DevOps, security, and operations teams the real-time insights needed to optimize their software supply chain environment and accelerate time to market."
"Millions of engineers rely on JFrog to improve their software performance and security at every stage of development," said New Relic Vice President of Cloud and Product Partnerships Gal Tunik. "Together with JFrog, New Relic is making it possible for engineering teams to view observability data in tandem with their release pipelines to boost release velocity and quality. New Relic is uniquely committed to an open ecosystem approach to observability and we look forward to deepening our partnership with JFrog over the coming months."
Key benefits include:
- Unified visibility and actionable insights: Preconfigured New Relic dashboards provide a comprehensive view of their performance data, artifact usage, and security metrics from JFrog Artifactory and JFrog Xray environments alongside their telemetry data.
- Uncover and mitigate vulnerabilities: Identify urgent vulnerabilities, identify malicious users, and allow your teams to deploy fixes faster to deliver more secure software with less risk.
- Improved software supply chain performance: Proactively manage performance and remediate issues with actionable log insights, custom queries, and alerting to allow your teams to boost release velocity and quality.
The JFrog log analytics integration with New Relic is available at no additional cost to all New Relic full platform users, and the integration is free for all tiers of self-hosted JFrog customers.
The Latest
Regardless of OpenShift being a scalable and flexible software, it can be a pain to monitor since complete visibility into the underlying operations is not guaranteed ... To effectively monitor an OpenShift environment, IT administrators should focus on these five key elements and their associated metrics ...
An overwhelming majority of IT leaders (95%) believe the upcoming wave of AI-powered digital transformation is set to be the most impactful and intensive seen thus far, according to The Science of Productivity: AI, Adoption, And Employee Experience, a new report from Nexthink ...
Overall outage frequency and the general level of reported severity continue to decline, according to the Outage Analysis 2025 from Uptime Institute. However, cyber security incidents are on the rise and often have severe, lasting impacts ...
In March, New Relic published the State of Observability for Media and Entertainment Report to share insights, data, and analysis into the adoption and business value of observability across the media and entertainment industry. Here are six key takeaways from the report ...
Regardless of their scale, business decisions often take time, effort, and a lot of back-and-forth discussion to reach any sort of actionable conclusion ... Any means of streamlining this process and getting from complex problems to optimal solutions more efficiently and reliably is key. How can organizations optimize their decision-making to save time and reduce excess effort from those involved? ...
As enterprises accelerate their cloud adoption strategies, CIOs are routinely exceeding their cloud budgets — a concern that's about to face additional pressure from an unexpected direction: uncertainty over semiconductor tariffs. The CIO Cloud Trends Survey & Report from Azul reveals the extent continued cloud investment despite cost overruns, and how organizations are attempting to bring spending under control ...

According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...
Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...
IT spending is expected to jump nearly 10% in 2025, and organizations are now facing pressure to manage costs without slowing down critical functions like observability. To meet the challenge, leaders are turning to smarter, more cost effective business strategies. Enter stage right: OpenTelemetry, the missing piece of the puzzle that is no longer just an option but rather a strategic advantage ...
Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...
