In Part Two of APMdigest's exclusive interview, Shane Pearson, Vice President, Product Marketing for HP Software, shares guidance on APM challenges including mobile performance, security and event management.
APM: What are the main challenges to monitoring mobile performance?
SP: Not all mobile applications are the same. There are two basic types of mobile applications, native mobile applications and browser-based applications. Native applications reside on user devices and communication over HTTP(s). Browser-based applications use modified browsers to access applications online. When monitoring these applications you should consider how the user experiences the service from a native application and from the browser. If access from a browser, does the entire page render? How long does it take? Does it perform differently from one device to another? Customers may have a very different experience using a mobile browser than using the native application. When monitoring these new services it is important to be able to gauge how your customers experience the mobile application and how they experience it from various devices.
Feature-greedy users generate change and complexity. Let's face it -- everybody loves the latest gadgets with all the latest bells and whistles. This is great for the consumer markets but this can introduce complexity when trying to manage mobile applications. As in the example above, the user's experience may be different from device to device. So when looking at monitoring mobile applications, not only do you have to consider browser and native applications but also the various devices. Some management vendors offer a service where you can rent cradles of phones to test and to monitor mobile applications. This can be a costly option. Another way is to emulate the application for multiple devices. This is a more cost-effective way to understand how your applications will perform for the various mobile devices.
Visibility into chaos can help you troubleshoot issues. Not only do you need to understand how end users experience these new mobile applications, but when something does fail what was the cause of the failure? How do I know if it's an issue with the application, the device, and the carrier? Also, with many mobile applications built to leverage the already underlying business services, applications and supporting infrastructure, this can complicate and lengthen the time it takes to find the root cause of an issue. When monitoring the mobile application you should also be monitoring all dependencies and be able to visualize the entire end-to-end service. Having an end-to-end service view is key to understanding the complexity of IT environments.
APM: How do security issues impact application performance management?
SP: Security information is rarely integrated with IT operations or application data. Often, the Security Operations Center (SOC) and the Network Operations Center (NOC) are silo groups, working independently, without any integration or even communication. And without any type of integration between these two groups, you don’t have the complete visibility you need in order to troubleshoot and find the root cause of a problem.
Here’s a typical example. If operations is seeing a key application slowing down, where the end users are being impacted, they don’t know if it is related to some usage spike related to an unusual load, if it is a piece of failing hardware, or some sort of security attack. Customers don't have the insight or context they need to react quickly, and drill down to the root problem, so they can protect their business. In this type of scenario, the operator may just throw more resources at the host to meet the demand spike. But, if there is some type of security breach, that approach is just wasting money, and won't solve anything.
As you can see, a new approach is needed.
APM: What is the solution?
SP: The solution for this type of dilemma is by having better communication with, and tool sets for, the NOC and the SOC. HP’s integration of ArcSight and BSM is helping bridge these two groups to give better insight to the root cause of a problem.
With BSM 9.1, the operations team has the capability to now bring security events from ArcSight Enterprise Security Manager (ESM) and Logger products into one central Operations Bridge, which we call Operations Manager i (OMi).
The ArcSight integrations with BSM leverage HP's unique strengths in both IT Operations and Security and provide a great differentiator for HP.
The three main benefits of this integration include:
1. Logs for Ops: Archive historical data center behavior by collecting and storing raw logs and correlated event data from varied data sources (300+ sources) OOB
2. Event Search and Analytics: Search, analyze and report on IT events from a single console
3. NOC and SOC collaboration: visibility into the health of the entire IT infrastructure including security aspects
APM: Explain how HP event management integrates with third-party monitoring technologies?
SP: HP brought to market Operations Manager i (Omi) which has become the Managers of Managers within IT operations as it brings events from various different parts of the data center into one single console. This includes events from each of the BSM monitoring tools for systems, network, and applications, but also 3rd party vendors such as Nagios and SCOM.
Additionally, OMi now shows security events coming in from ArcSight. And because OMi is built upon the Run-Time Service Model, it not only pulls in all events across the data center, but it can grab topology and CI information as well. This is called Topology-based Event Correlation, which is built on patented technology from HP labs. Having topology information with the events gives you the ability to determine the root cause of the problem and prioritize the remediation of those events based upon the business impact of the issue. Our customers are now using Omi as their single pane of glass or presentation layer for events consolidation and correlation.
APM: How does Topology-based Event Correlation work?
SP: HP's Topology-based Event Correlation (TBEC) utilizes detailed, comprehensive, and automatically updated discovery and relationship information to analyze alerts and events, and ultimately determine the event that is most likely the cause of an incident.
Using TBEC, operators are presented with a clear representation of which event they need to investigate and what symptoms can be ignored, which then helps them determine the team best suited to resolve an incident. With TBEC, there is less need to guess at the cause of an incident or spend time chasing symptoms -- so operations staff can fix issues faster, handle more incidents, escalate fewer issues to expert staff, and collaborate more effectively to resolve problems -- all of which ultimately help make incident management more efficient.
Application performance monitoring (APM) has become one of the key strategies adopted by IT teams and application owners in today’s era of digital business services. Application downtime has always been considered adverse to business productivity. But in today’s digital economy, what is becoming equally dreadful is application slowdown. When an application is slow, the end user’s experience accessing the application is negatively affected leaving a dent on the business in terms of commercial loss and brand damage ...
Useful digital transformation means altering or designing new business processes, and implementing them via the people and technology changes needed to support these new business processes ...
xMatters recently released the results of its Incident Management in the Age of Customer-Centricity research study to better understand the range of various incident management practices and how the increased focus on customer experience has caused roles across an organization to evolve. Findings highlight the ongoing challenges organizations face as they continue to introduce and rapidly evolve digital services ...
The new App Attention Index Report from AppDynamics finds that consumers are using an average 32 digital services every day — more than four times as many as they realize. What's more, their use of digital services has evolved from a conscious decision to carry around a device and use it for a specific task, to an unconscious and automated behavior — a digital reflex. So what does all this mean for the IT teams driving application performance on the backend? Bottom line: delivering seamless and world-class digital experiences is critical if businesses want to stay relevant and ensure long-term customer loyalty. Here are some key considerations for IT leaders and developers to consider ...
Through the adoption of agile technologies, financial firms can begin to use software to both operate more effectively and be faster to market with improvements for customer experiences. Making sure there is the necessary software in place to give customers frictionless everyday activities, like remote deposits, business overdraft services and wealth management, is key for a positive customer experience ...
For the past two years, Couchbase has been digging into enterprises' digital strategies. Can they deliver the experiences and services their end-users need? What pressure are they under to innovate and succeed? And what is driving investments in new technologies? ...
Adapting to new business requirements and technological shifts requires that IT Ops teams adopt a different viewpoint, and along with that, skills and culture. A survey by OpsRamp uncovered some common thinking among IT Operations leaders on how to address talent, budget, and data management pains amid digital disruption ...
Unexpected and unintentional drops in network quality, so-called network brownouts, cause serious financial damage and frustrate employees. A recent survey sponsored by Netrounds reveals that more than 60% of network brownouts are first discovered by IT’s internal and external customers, or never even reported, instead of being proactively detected by IT organizations ...
Digital transformation reaches into every aspect of our work and personal lives, to the point that there is an automatic expectation of 24/7, anywhere availability regarding any organization with an online presence. This environment is ripe for artificial intelligence, so it's no surprise that IT Operations has been an early adopter of AI ...