Skip to main content

The Age of the Customer Requires a Shift in Monitoring Focus

J. Rakowski

In my February 2014 report Left–Shift Technology Monitoring For Success In The Age Of The Customer, I explore what the near future will bring for technology monitoring approaches and solutions. Today, for the typical I&O organization, successful technology or service delivery monitoring focuses on two main areas. Firstly, availability, so ensuring the technology underpinning business services is up and available when needed. And secondly, performance, so making sure that technology utilized (applications and associated workloads) is fast enough for the business service it supports.

There is a major problem with this approach though. As the famous author Harper Lee stated “We know all men are not created equal” and the same can be said about your customers and employees – they are not all equal and the rapid pace of consumer technology innovation in areas such as mobile means that they will utilize technology in different ways to support productivity or to engage with your enterprise as a customer.

Our relationship with technology is changing rapidly. It is becoming more intimate and personal, meaning that datacenter centric monitoring approaches that focus on availability and performance alone, while still essential, are only the beginning of what is required for a holistic technology monitoring strategy.

In the age of the customer, it’s increasingly easy for your customers and even employees to switch to another technology provider. They will do this if they feel their experience needs are not being met from the technology based services provided.

Experience can be broken down into three simple facets:

1. Does the technology based service meet needs?

2. Is it easy to use?

3. Is it enjoyable?

The technology monitoring market in recent years has evolved from a focus on infrastructure monitoring, to application monitoring and the emergence of End User Experience Monitoring/Management (EUEM). EUEM looks to understand technology based business service performance from an employee or increasingly a customer perspective. However, many methods that I see in the market today are still application-centric in their monitoring approach e.g. the operator configures monitoring based on specified applications.

This means that many EUEM implementations fail to understand the full employee or customer journey. This includes how they use technology in in order to be productive within the enterprise or how they engage with enterprises, externally as customers. To understand the full technology interaction journey requires a more detailed form of end user monitoring which we define as End User Behavior Monitoring.

End User Behavior Monitoring has the capability of monitoring all interactions or activity between employees/customers and the technology they use, i.e consumer devices and applications. The aim here is not to alert, but to build up a detailed understanding of how the various types of business users or personas interact with business services so as to ensure that experience is tailored appropriately.

The following graphic summarizes this form of monitoring and its relation to other monitoring approaches on the market today:

Image removed.

Of course, end user behavior monitoring may ring alarm bells in regards to data privacy, but as our relationship with technology becomes increasingly more personal then I expect some of these concerns to fade away along with associated legislation.

If you are a Forrester client then my report highlights the concepts of End User Behavior Monitoring in detail. I also have an associated report coming out in Q2 2014 which looks at solutions on the market today which are capable of doing this form of monitoring within the enterprise.

John Rakowski is Analyst, Infrastructure and Operations, at Forrester.

The Latest

For many B2B and B2C enterprise brands, technology isn't a core strength. Relying on overly complex architectures (like those that follow a pure MACH doctrine) has been flagged by industry leaders as a source of operational slowdown, creating bottlenecks that limit agility in volatile market conditions ...

FinOps champions crucial cross-departmental collaboration, uniting business, finance, technology and engineering leaders to demystify cloud expenses. Yet, too often, critical cost issues are softened into mere "recommendations" or "insights" — easy to ignore. But what if we adopted security's battle-tested strategy and reframed these as the urgent risks they truly are, demanding immediate action? ...

Two in three IT professionals now cite growing complexity as their top challenge — an urgent signal that the modernization curve may be getting too steep, according to the Rising to the Challenge survey from Checkmk ...

While IT leaders are becoming more comfortable and adept at balancing workloads across on-premises, colocation data centers and the public cloud, there's a key component missing: connectivity, according to the 2025 State of the Data Center Report from CoreSite ...

A perfect storm is brewing in cybersecurity — certificate lifespans shrinking to just 47 days while quantum computing threatens today's encryption. Organizations must embrace ephemeral trust and crypto-agility to survive this dual challenge ...

In MEAN TIME TO INSIGHT Episode 14, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud network observability... 

While companies adopt AI at a record pace, they also face the challenge of finding a smart and scalable way to manage its rapidly growing costs. This requires balancing the massive possibilities inherent in AI with the need to control cloud costs, aim for long-term profitability and optimize spending ...

Telecommunications is expanding at an unprecedented pace ... But progress brings complexity. As WanAware's 2025 Telecom Observability Benchmark Report reveals, many operators are discovering that modernization requires more than physical build outs and CapEx — it also demands the tools and insights to manage, secure, and optimize this fast-growing infrastructure in real time ...

As businesses increasingly rely on high-performance applications to deliver seamless user experiences, the demand for fast, reliable, and scalable data storage systems has never been greater. Redis — an open-source, in-memory data structure store — has emerged as a popular choice for use cases ranging from caching to real-time analytics. But with great performance comes the need for vigilant monitoring ...

Kubernetes was not initially designed with AI's vast resource variability in mind, and the rapid rise of AI has exposed Kubernetes limitations, particularly when it comes to cost and resource efficiency. Indeed, AI workloads differ from traditional applications in that they require a staggering amount and variety of compute resources, and their consumption is far less consistent than traditional workloads ... Considering the speed of AI innovation, teams cannot afford to be bogged down by these constant infrastructure concerns. A solution is needed ...

The Age of the Customer Requires a Shift in Monitoring Focus

J. Rakowski

In my February 2014 report Left–Shift Technology Monitoring For Success In The Age Of The Customer, I explore what the near future will bring for technology monitoring approaches and solutions. Today, for the typical I&O organization, successful technology or service delivery monitoring focuses on two main areas. Firstly, availability, so ensuring the technology underpinning business services is up and available when needed. And secondly, performance, so making sure that technology utilized (applications and associated workloads) is fast enough for the business service it supports.

There is a major problem with this approach though. As the famous author Harper Lee stated “We know all men are not created equal” and the same can be said about your customers and employees – they are not all equal and the rapid pace of consumer technology innovation in areas such as mobile means that they will utilize technology in different ways to support productivity or to engage with your enterprise as a customer.

Our relationship with technology is changing rapidly. It is becoming more intimate and personal, meaning that datacenter centric monitoring approaches that focus on availability and performance alone, while still essential, are only the beginning of what is required for a holistic technology monitoring strategy.

In the age of the customer, it’s increasingly easy for your customers and even employees to switch to another technology provider. They will do this if they feel their experience needs are not being met from the technology based services provided.

Experience can be broken down into three simple facets:

1. Does the technology based service meet needs?

2. Is it easy to use?

3. Is it enjoyable?

The technology monitoring market in recent years has evolved from a focus on infrastructure monitoring, to application monitoring and the emergence of End User Experience Monitoring/Management (EUEM). EUEM looks to understand technology based business service performance from an employee or increasingly a customer perspective. However, many methods that I see in the market today are still application-centric in their monitoring approach e.g. the operator configures monitoring based on specified applications.

This means that many EUEM implementations fail to understand the full employee or customer journey. This includes how they use technology in in order to be productive within the enterprise or how they engage with enterprises, externally as customers. To understand the full technology interaction journey requires a more detailed form of end user monitoring which we define as End User Behavior Monitoring.

End User Behavior Monitoring has the capability of monitoring all interactions or activity between employees/customers and the technology they use, i.e consumer devices and applications. The aim here is not to alert, but to build up a detailed understanding of how the various types of business users or personas interact with business services so as to ensure that experience is tailored appropriately.

The following graphic summarizes this form of monitoring and its relation to other monitoring approaches on the market today:

Image removed.

Of course, end user behavior monitoring may ring alarm bells in regards to data privacy, but as our relationship with technology becomes increasingly more personal then I expect some of these concerns to fade away along with associated legislation.

If you are a Forrester client then my report highlights the concepts of End User Behavior Monitoring in detail. I also have an associated report coming out in Q2 2014 which looks at solutions on the market today which are capable of doing this form of monitoring within the enterprise.

John Rakowski is Analyst, Infrastructure and Operations, at Forrester.

The Latest

For many B2B and B2C enterprise brands, technology isn't a core strength. Relying on overly complex architectures (like those that follow a pure MACH doctrine) has been flagged by industry leaders as a source of operational slowdown, creating bottlenecks that limit agility in volatile market conditions ...

FinOps champions crucial cross-departmental collaboration, uniting business, finance, technology and engineering leaders to demystify cloud expenses. Yet, too often, critical cost issues are softened into mere "recommendations" or "insights" — easy to ignore. But what if we adopted security's battle-tested strategy and reframed these as the urgent risks they truly are, demanding immediate action? ...

Two in three IT professionals now cite growing complexity as their top challenge — an urgent signal that the modernization curve may be getting too steep, according to the Rising to the Challenge survey from Checkmk ...

While IT leaders are becoming more comfortable and adept at balancing workloads across on-premises, colocation data centers and the public cloud, there's a key component missing: connectivity, according to the 2025 State of the Data Center Report from CoreSite ...

A perfect storm is brewing in cybersecurity — certificate lifespans shrinking to just 47 days while quantum computing threatens today's encryption. Organizations must embrace ephemeral trust and crypto-agility to survive this dual challenge ...

In MEAN TIME TO INSIGHT Episode 14, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud network observability... 

While companies adopt AI at a record pace, they also face the challenge of finding a smart and scalable way to manage its rapidly growing costs. This requires balancing the massive possibilities inherent in AI with the need to control cloud costs, aim for long-term profitability and optimize spending ...

Telecommunications is expanding at an unprecedented pace ... But progress brings complexity. As WanAware's 2025 Telecom Observability Benchmark Report reveals, many operators are discovering that modernization requires more than physical build outs and CapEx — it also demands the tools and insights to manage, secure, and optimize this fast-growing infrastructure in real time ...

As businesses increasingly rely on high-performance applications to deliver seamless user experiences, the demand for fast, reliable, and scalable data storage systems has never been greater. Redis — an open-source, in-memory data structure store — has emerged as a popular choice for use cases ranging from caching to real-time analytics. But with great performance comes the need for vigilant monitoring ...

Kubernetes was not initially designed with AI's vast resource variability in mind, and the rapid rise of AI has exposed Kubernetes limitations, particularly when it comes to cost and resource efficiency. Indeed, AI workloads differ from traditional applications in that they require a staggering amount and variety of compute resources, and their consumption is far less consistent than traditional workloads ... Considering the speed of AI innovation, teams cannot afford to be bogged down by these constant infrastructure concerns. A solution is needed ...