Skip to main content

Progress Announces Fiddler Jam

Progress announced the general availability of Progress® Telerik® Fiddler™ Jam, a troubleshooting solution for support and development teams to solve customer issues remotely in a fast, easy and secure manner.

The product offers new features, including an option for video recording, capturing events during a session recording and masking sensitive data, that help support and development teams to quickly gather the information they need to troubleshoot end-user issues—saving time and increasing customer satisfaction.

Support teams spend a lot of time collecting information from customers about the issues they are experiencing. Even with a well-documented story, it can still be difficult for engineers to properly replicate the issues at hand in a secure way.

Fiddler Jam provides support teams with a streamlined and secure process to solve customer issues remotely without requesting extra information and without relying on additional tooling.​ The product enables non-technical end users to isolate issues by capturing HTTP(S) network logs, network activity, console logs and screenshots in the customer's own environment and sharing them with support and development teams.

“Fiddler Jam is the one-stop solution for support and development teams to gather context and collaborate in solving customers’ issues—something that traditional troubleshooting approaches can’t offer,” said Loren Jarett, GM, Developer Tools, Progress. “The latest release brings new powerful features for capturing events, with built-in security features, aimed at boosting teams’ productivity and ensuring customer satisfaction.”

What’s new in Fiddler Jam:

- Record video of the end user’s browser tab while capturing a session – stored in a secure way and easily accessible at any time through the Fiddler Jam portals, the recordings help support teams and engineers look through the eyes of the customer and understand better the steps they need to reproduce the issue.

- Capture several types of events performed by the end user during a session recording – these can include Click, Double-Click, Navigated to and more. Fiddler Jam can also capture local and session storage details which provide support engineers with powerful insights relevant to analyzing the submitted log and help them to identify the issue quickly.

- Mask sensitive data – with its advanced recognition capabilities, the new Mask Sensitive Data feature differentiates between sensitive and non-sensitive information and masks only the sensitive data, while preventing the removal of non-sensitive data that is relevant to the reported bug.

Fiddler Jam complements Fiddler Everywhere, the web debugging proxy that helps organizations capture all HTTP(S) traffic between a computer and the internet from any browser and on any device. Fiddler Everywhere web debugging proxy enables developers to build, debug and maintain APIs of mission-critical applications in Windows, macOS and Linux environments.

The Latest

The prevention of data center outages continues to be a strategic priority for data center owners and operators. Infrastructure equipment has improved, but the complexity of modern architectures and evolving external threats presents new risks that operators must actively manage, according to the Data Center Outage Analysis 2025 from Uptime Institute ...

As observability engineers, we navigate a sea of telemetry daily. We instrument our applications, configure collectors, and build dashboards, all in pursuit of understanding our complex distributed systems. Yet, amidst this flood of data, a critical question often remains unspoken, or at best, answered by gut feeling: "Is our telemetry actually good?" ... We're inviting you to participate in shaping a foundational element for better observability: the Instrumentation Score ...

We're inching ever closer toward a long-held goal: technology infrastructure that is so automated that it can protect itself. But as IT leaders aggressively employ automation across our enterprises, we need to continuously reassess what AI is ready to manage autonomously and what can not yet be trusted to algorithms ...

Much like a traditional factory turns raw materials into finished products, the AI factory turns vast datasets into actionable business outcomes through advanced models, inferences, and automation. From the earliest data inputs to the final token output, this process must be reliable, repeatable, and scalable. That requires industrializing the way AI is developed, deployed, and managed ...

Almost half (48%) of employees admit they resent their jobs but stay anyway, according to research from Ivanti ... This has obvious consequences across the business, but we're overlooking the massive impact of resenteeism and presenteeism on IT. For IT professionals tasked with managing the backbone of modern business operations, these numbers spell big trouble ...

For many B2B and B2C enterprise brands, technology isn't a core strength. Relying on overly complex architectures (like those that follow a pure MACH doctrine) has been flagged by industry leaders as a source of operational slowdown, creating bottlenecks that limit agility in volatile market conditions ...

FinOps champions crucial cross-departmental collaboration, uniting business, finance, technology and engineering leaders to demystify cloud expenses. Yet, too often, critical cost issues are softened into mere "recommendations" or "insights" — easy to ignore. But what if we adopted security's battle-tested strategy and reframed these as the urgent risks they truly are, demanding immediate action? ...

Two in three IT professionals now cite growing complexity as their top challenge — an urgent signal that the modernization curve may be getting too steep, according to the Rising to the Challenge survey from Checkmk ...

While IT leaders are becoming more comfortable and adept at balancing workloads across on-premises, colocation data centers and the public cloud, there's a key component missing: connectivity, according to the 2025 State of the Data Center Report from CoreSite ...

A perfect storm is brewing in cybersecurity — certificate lifespans shrinking to just 47 days while quantum computing threatens today's encryption. Organizations must embrace ephemeral trust and crypto-agility to survive this dual challenge ...

Progress Announces Fiddler Jam

Progress announced the general availability of Progress® Telerik® Fiddler™ Jam, a troubleshooting solution for support and development teams to solve customer issues remotely in a fast, easy and secure manner.

The product offers new features, including an option for video recording, capturing events during a session recording and masking sensitive data, that help support and development teams to quickly gather the information they need to troubleshoot end-user issues—saving time and increasing customer satisfaction.

Support teams spend a lot of time collecting information from customers about the issues they are experiencing. Even with a well-documented story, it can still be difficult for engineers to properly replicate the issues at hand in a secure way.

Fiddler Jam provides support teams with a streamlined and secure process to solve customer issues remotely without requesting extra information and without relying on additional tooling.​ The product enables non-technical end users to isolate issues by capturing HTTP(S) network logs, network activity, console logs and screenshots in the customer's own environment and sharing them with support and development teams.

“Fiddler Jam is the one-stop solution for support and development teams to gather context and collaborate in solving customers’ issues—something that traditional troubleshooting approaches can’t offer,” said Loren Jarett, GM, Developer Tools, Progress. “The latest release brings new powerful features for capturing events, with built-in security features, aimed at boosting teams’ productivity and ensuring customer satisfaction.”

What’s new in Fiddler Jam:

- Record video of the end user’s browser tab while capturing a session – stored in a secure way and easily accessible at any time through the Fiddler Jam portals, the recordings help support teams and engineers look through the eyes of the customer and understand better the steps they need to reproduce the issue.

- Capture several types of events performed by the end user during a session recording – these can include Click, Double-Click, Navigated to and more. Fiddler Jam can also capture local and session storage details which provide support engineers with powerful insights relevant to analyzing the submitted log and help them to identify the issue quickly.

- Mask sensitive data – with its advanced recognition capabilities, the new Mask Sensitive Data feature differentiates between sensitive and non-sensitive information and masks only the sensitive data, while preventing the removal of non-sensitive data that is relevant to the reported bug.

Fiddler Jam complements Fiddler Everywhere, the web debugging proxy that helps organizations capture all HTTP(S) traffic between a computer and the internet from any browser and on any device. Fiddler Everywhere web debugging proxy enables developers to build, debug and maintain APIs of mission-critical applications in Windows, macOS and Linux environments.

The Latest

The prevention of data center outages continues to be a strategic priority for data center owners and operators. Infrastructure equipment has improved, but the complexity of modern architectures and evolving external threats presents new risks that operators must actively manage, according to the Data Center Outage Analysis 2025 from Uptime Institute ...

As observability engineers, we navigate a sea of telemetry daily. We instrument our applications, configure collectors, and build dashboards, all in pursuit of understanding our complex distributed systems. Yet, amidst this flood of data, a critical question often remains unspoken, or at best, answered by gut feeling: "Is our telemetry actually good?" ... We're inviting you to participate in shaping a foundational element for better observability: the Instrumentation Score ...

We're inching ever closer toward a long-held goal: technology infrastructure that is so automated that it can protect itself. But as IT leaders aggressively employ automation across our enterprises, we need to continuously reassess what AI is ready to manage autonomously and what can not yet be trusted to algorithms ...

Much like a traditional factory turns raw materials into finished products, the AI factory turns vast datasets into actionable business outcomes through advanced models, inferences, and automation. From the earliest data inputs to the final token output, this process must be reliable, repeatable, and scalable. That requires industrializing the way AI is developed, deployed, and managed ...

Almost half (48%) of employees admit they resent their jobs but stay anyway, according to research from Ivanti ... This has obvious consequences across the business, but we're overlooking the massive impact of resenteeism and presenteeism on IT. For IT professionals tasked with managing the backbone of modern business operations, these numbers spell big trouble ...

For many B2B and B2C enterprise brands, technology isn't a core strength. Relying on overly complex architectures (like those that follow a pure MACH doctrine) has been flagged by industry leaders as a source of operational slowdown, creating bottlenecks that limit agility in volatile market conditions ...

FinOps champions crucial cross-departmental collaboration, uniting business, finance, technology and engineering leaders to demystify cloud expenses. Yet, too often, critical cost issues are softened into mere "recommendations" or "insights" — easy to ignore. But what if we adopted security's battle-tested strategy and reframed these as the urgent risks they truly are, demanding immediate action? ...

Two in three IT professionals now cite growing complexity as their top challenge — an urgent signal that the modernization curve may be getting too steep, according to the Rising to the Challenge survey from Checkmk ...

While IT leaders are becoming more comfortable and adept at balancing workloads across on-premises, colocation data centers and the public cloud, there's a key component missing: connectivity, according to the 2025 State of the Data Center Report from CoreSite ...

A perfect storm is brewing in cybersecurity — certificate lifespans shrinking to just 47 days while quantum computing threatens today's encryption. Organizations must embrace ephemeral trust and crypto-agility to survive this dual challenge ...