Skip to main content

20 Technologies to Support APM - Part 4

APMdigest rounds out the list with some final thoughts on the many valuable tools available – beyond what is technically categorized as Application Performance Management (APM) – to support the goals of improving application performance and business service.

Start with Part 1

Start with Part 2

Start with Part 3

16. Database Query Management

Integrated database query management is quickly becoming a required capability to ensure application performance. While performance problems can come from a lot of sources, the database is often at the top of the list of suspects. Being able to stay ahead of application performance issues caused by query issues is one of the best ways to get a quick boost to overall application uptime and performance.
Michael Thompson
Principal, Product Marketing, SolarWinds

17. Application Delivery Controllers

Applications are no longer contained in data center environments on stable, over-provisioned infrastructures. As the number of lightweight mobile applications increases, the task of ensuring superior application performance has become very complex. By using application delivery controllers, companies can optimize, secure and control the delivery of every enterprise and cloud service in use, while understanding the actual end-user experience delivered by those applications.
S. “Sundi” Sundaresh
CEO, Xangati

18. Agent Management

Whether it's a traditional on-premises deployment or a vendor-managed SaaS, APM solutions often rely on application-aware monitoring agents to collect key performance indicators on the health and availability of various application components, or to track and time transactions. However, in today's world of rapid application lifecycles, pattern-based application provisioning and dynamic workloads that appear and disappear frequently, keeping those agents pointed at these oft-changing application components can be a challenge. An intelligent endpoint management system that can deploy, patch and refresh agents automatically, in the background, and as part of automated batch jobs, is essential to the goal of having a low-touch, high-value APM solution.
Marvin Goodman
Market Manager, APM, IBM

19. DevOps

The most powerful augmentation of modern APM comes not from a specific technology, but from the adoption of a DevOps approach to software development. DevOps stresses communication, collaboration and integration between software developers, QA and operations professionals – and APM is the platform that empowers this approach. DevOps enables IT to deliver better business results faster, while reducing costs, and reducing the amount of time it takes to fix problems and launch new features and services to end users. Nothing is more effective at unlocking and maximizing value of your APM investments.
Andreas Grabner
Lead of Center of Excellence, Compuware APM

20. Business Intelligence

The gathering of data regarding the performance of applications and the infrastructure is of course key to effective APM. However, recent Quocirca research shows that the same data is also an important feed for operational intelligence tools which provide guidance not just for IT staff but for those managing business process.
Bob Tarzey
Analyst and Director, Quocirca

Hot Topics

The Latest

A major architectural shift is underway across enterprise networks, according to a new global study from Cisco. As AI assistants, agents, and data-driven workloads reshape how work gets done, they're creating faster, more dynamic, more latency-sensitive, and more complex network traffic. Combined with the ubiquity of connected devices, 24/7 uptime demands, and intensifying security threats, these shifts are driving infrastructure to adapt and evolve ...

Image
Cisco

The development of banking apps was supposed to provide users with convenience, control and piece of mind. However, for thousands of Halifax customers recently, a major mobile outage caused the exact opposite, leaving customers unable to check balances, or pay bills, sparking widespread frustration. This wasn't an isolated incident ... So why are these failures still happening? ...

Cyber threats are growing more sophisticated every day, and at their forefront are zero-day vulnerabilities. These elusive security gaps are exploited before a fix becomes available, making them among the most dangerous threats in today's digital landscape ... This guide will explore what these vulnerabilities are, how they work, why they pose such a significant threat, and how modern organizations can stay protected ...

The prevention of data center outages continues to be a strategic priority for data center owners and operators. Infrastructure equipment has improved, but the complexity of modern architectures and evolving external threats presents new risks that operators must actively manage, according to the Data Center Outage Analysis 2025 from Uptime Institute ...

As observability engineers, we navigate a sea of telemetry daily. We instrument our applications, configure collectors, and build dashboards, all in pursuit of understanding our complex distributed systems. Yet, amidst this flood of data, a critical question often remains unspoken, or at best, answered by gut feeling: "Is our telemetry actually good?" ... We're inviting you to participate in shaping a foundational element for better observability: the Instrumentation Score ...

We're inching ever closer toward a long-held goal: technology infrastructure that is so automated that it can protect itself. But as IT leaders aggressively employ automation across our enterprises, we need to continuously reassess what AI is ready to manage autonomously and what can not yet be trusted to algorithms ...

Much like a traditional factory turns raw materials into finished products, the AI factory turns vast datasets into actionable business outcomes through advanced models, inferences, and automation. From the earliest data inputs to the final token output, this process must be reliable, repeatable, and scalable. That requires industrializing the way AI is developed, deployed, and managed ...

Almost half (48%) of employees admit they resent their jobs but stay anyway, according to research from Ivanti ... This has obvious consequences across the business, but we're overlooking the massive impact of resenteeism and presenteeism on IT. For IT professionals tasked with managing the backbone of modern business operations, these numbers spell big trouble ...

For many B2B and B2C enterprise brands, technology isn't a core strength. Relying on overly complex architectures (like those that follow a pure MACH doctrine) has been flagged by industry leaders as a source of operational slowdown, creating bottlenecks that limit agility in volatile market conditions ...

FinOps champions crucial cross-departmental collaboration, uniting business, finance, technology and engineering leaders to demystify cloud expenses. Yet, too often, critical cost issues are softened into mere "recommendations" or "insights" — easy to ignore. But what if we adopted security's battle-tested strategy and reframed these as the urgent risks they truly are, demanding immediate action? ...

20 Technologies to Support APM - Part 4

APMdigest rounds out the list with some final thoughts on the many valuable tools available – beyond what is technically categorized as Application Performance Management (APM) – to support the goals of improving application performance and business service.

Start with Part 1

Start with Part 2

Start with Part 3

16. Database Query Management

Integrated database query management is quickly becoming a required capability to ensure application performance. While performance problems can come from a lot of sources, the database is often at the top of the list of suspects. Being able to stay ahead of application performance issues caused by query issues is one of the best ways to get a quick boost to overall application uptime and performance.
Michael Thompson
Principal, Product Marketing, SolarWinds

17. Application Delivery Controllers

Applications are no longer contained in data center environments on stable, over-provisioned infrastructures. As the number of lightweight mobile applications increases, the task of ensuring superior application performance has become very complex. By using application delivery controllers, companies can optimize, secure and control the delivery of every enterprise and cloud service in use, while understanding the actual end-user experience delivered by those applications.
S. “Sundi” Sundaresh
CEO, Xangati

18. Agent Management

Whether it's a traditional on-premises deployment or a vendor-managed SaaS, APM solutions often rely on application-aware monitoring agents to collect key performance indicators on the health and availability of various application components, or to track and time transactions. However, in today's world of rapid application lifecycles, pattern-based application provisioning and dynamic workloads that appear and disappear frequently, keeping those agents pointed at these oft-changing application components can be a challenge. An intelligent endpoint management system that can deploy, patch and refresh agents automatically, in the background, and as part of automated batch jobs, is essential to the goal of having a low-touch, high-value APM solution.
Marvin Goodman
Market Manager, APM, IBM

19. DevOps

The most powerful augmentation of modern APM comes not from a specific technology, but from the adoption of a DevOps approach to software development. DevOps stresses communication, collaboration and integration between software developers, QA and operations professionals – and APM is the platform that empowers this approach. DevOps enables IT to deliver better business results faster, while reducing costs, and reducing the amount of time it takes to fix problems and launch new features and services to end users. Nothing is more effective at unlocking and maximizing value of your APM investments.
Andreas Grabner
Lead of Center of Excellence, Compuware APM

20. Business Intelligence

The gathering of data regarding the performance of applications and the infrastructure is of course key to effective APM. However, recent Quocirca research shows that the same data is also an important feed for operational intelligence tools which provide guidance not just for IT staff but for those managing business process.
Bob Tarzey
Analyst and Director, Quocirca

Hot Topics

The Latest

A major architectural shift is underway across enterprise networks, according to a new global study from Cisco. As AI assistants, agents, and data-driven workloads reshape how work gets done, they're creating faster, more dynamic, more latency-sensitive, and more complex network traffic. Combined with the ubiquity of connected devices, 24/7 uptime demands, and intensifying security threats, these shifts are driving infrastructure to adapt and evolve ...

Image
Cisco

The development of banking apps was supposed to provide users with convenience, control and piece of mind. However, for thousands of Halifax customers recently, a major mobile outage caused the exact opposite, leaving customers unable to check balances, or pay bills, sparking widespread frustration. This wasn't an isolated incident ... So why are these failures still happening? ...

Cyber threats are growing more sophisticated every day, and at their forefront are zero-day vulnerabilities. These elusive security gaps are exploited before a fix becomes available, making them among the most dangerous threats in today's digital landscape ... This guide will explore what these vulnerabilities are, how they work, why they pose such a significant threat, and how modern organizations can stay protected ...

The prevention of data center outages continues to be a strategic priority for data center owners and operators. Infrastructure equipment has improved, but the complexity of modern architectures and evolving external threats presents new risks that operators must actively manage, according to the Data Center Outage Analysis 2025 from Uptime Institute ...

As observability engineers, we navigate a sea of telemetry daily. We instrument our applications, configure collectors, and build dashboards, all in pursuit of understanding our complex distributed systems. Yet, amidst this flood of data, a critical question often remains unspoken, or at best, answered by gut feeling: "Is our telemetry actually good?" ... We're inviting you to participate in shaping a foundational element for better observability: the Instrumentation Score ...

We're inching ever closer toward a long-held goal: technology infrastructure that is so automated that it can protect itself. But as IT leaders aggressively employ automation across our enterprises, we need to continuously reassess what AI is ready to manage autonomously and what can not yet be trusted to algorithms ...

Much like a traditional factory turns raw materials into finished products, the AI factory turns vast datasets into actionable business outcomes through advanced models, inferences, and automation. From the earliest data inputs to the final token output, this process must be reliable, repeatable, and scalable. That requires industrializing the way AI is developed, deployed, and managed ...

Almost half (48%) of employees admit they resent their jobs but stay anyway, according to research from Ivanti ... This has obvious consequences across the business, but we're overlooking the massive impact of resenteeism and presenteeism on IT. For IT professionals tasked with managing the backbone of modern business operations, these numbers spell big trouble ...

For many B2B and B2C enterprise brands, technology isn't a core strength. Relying on overly complex architectures (like those that follow a pure MACH doctrine) has been flagged by industry leaders as a source of operational slowdown, creating bottlenecks that limit agility in volatile market conditions ...

FinOps champions crucial cross-departmental collaboration, uniting business, finance, technology and engineering leaders to demystify cloud expenses. Yet, too often, critical cost issues are softened into mere "recommendations" or "insights" — easy to ignore. But what if we adopted security's battle-tested strategy and reframed these as the urgent risks they truly are, demanding immediate action? ...