Vendor Forum

February 17, 2016
Kent Alstad
Radware

This year, 2016 is set to host the "battle of the bots" as bot-generated attacks targeting web application infrastructure are increasing in both volume and scope, according to a recent survey conducted by Radware, which profiled the various cybersecurity threats that are expected to increase in the coming year. While some bots exist to support the infrastructure, IT managers do need to be aware of the bad bots out there, as they are numerous and can pose a serious threat to web application performance ...

February 12, 2016
Aaron Kelly
Ipswitch

Valentine’s Day is an opportunity for technology users across the globe to express their love and appreciation for that special someone(s) … their IT team. With the constant evolution of new technologies and innovative tools, it is more important than ever to show a little love on this day to the heart of your organization who keeps it all running efficiently ...

February 12, 2016
Kong Yang
SolarWinds

On Valentine's Day it's important to show the love for the most important people – or networks – in our lives. In honor of the upcoming holiday, SolarWinds recently asked IT pros: "If you could say one thing to your network, what would it be?" ...

February 11, 2016
Sahil Khanna
Moogsoft

Moogsoft conducted an IT monitoring survey with attendees at AppDynamics AppSphere. A variety of questions were asked, from the number of monitoring tools they use, to the time it takes to detect and resolve incidents, to what they hope to see from vendors in the future. While some responses were predictable, some were actually rather surprising ...

February 10, 2016
Umair Khan
CA Technologies

To optimize application performance, IT teams need to proactively ensure the optimized performance of every underlying infrastructure component, including physical and virtual servers, networks, storage devices, databases, end-user services and cloud and big data environments. It is imperative that they not only identify and resolve issues quickly, but also pre-empt potential issue before there's an adverse impact on the user experience. Below are six key requirements that can help you achieve these objectives ...

February 08, 2016
Matt Jacobs
AppDynamics

Just seconds after her Super Bowl performance (and subsequent tour teaser), Beyonce found her website "slayed" by an onslaught of traffic and connection failures. This outage illustrates that even the biggest celebrities and brands can easily find their digital performance put to the test ...

February 05, 2016
Ann Ruckstuhl
SOASTA

As the Super Bowl approaches, an equally epic game is taking place in cyberspace. The Super Bowl is the "moment of truth" for the NFL, sports media, advertisers, restaurants (especially pizza joints), food delivery services and gambling sites. They have to be ready in order to capitalize on unpredictably "spiky" traffic and the transactions before, during and, for some, after the game. To better evaluate the impact of the Super Bowl on ecommerce and website traffic, SOASTA conducted a survey that examined the online and mobile habits and preferences of Americans watching this year's big game ...

February 03, 2016
Gary Kaiser
Dynatrace

Remember the adage "beauty is in the eye of the beholder?" Similarly, service quality is in the eye of the user. So, to understand service quality, we should be measuring end-user experience (EUE). You may already be measuring EUE. Some of your applications – particularly those based on Java and .NET – may already be instrumented with agent-based APM solutions. But there are a few challenges to an agent-based approach to EUE ...

February 01, 2016
Erik Giesa
ExtraHop

ExtraHop expects to see the network emerge as a critical nexus of business over the next twelve months, with significant integration between network and security, demand for operational support of connected devices, and the ability to mine all data-in-motion for correlated, cross-tier and cross-team insights ...

January 29, 2016
Albert Mavashev
Nastel Technologies

Log Analytics is a process of investigating logs and hoping to derive actionable information that might be useful to the business. Many log analytics tools are used to gain visibility into web traffic, security, application behavior, etc. But how valuable and practical is log analytics in reality? ...

January 28, 2016
Sridhar Iyengar
ManageEngine

Nearly one out of every three businesses (32%) become aware of most application performance issues from their end users, according to the ManageEngine Application Performance Monitoring Survey 2015 ...

January 27, 2016
Krishnan Badrinarayanan
Riverbed Technology

While IoT is gaining traction with consumers, it's already having a transformative effect on the business world. Companies can analyze the volumes of data connected devices supply to improve decision-making processes and to help employees be more productive. However, as an enterprise brings more connected devices online, IT will struggle to maintain adequate application performance levels. Implementing application performance monitoring (APM) establishes the end-to-end visibility IT needs in order to immediately identify what's causing an application to perform poorly ...

January 25, 2016
Bill Berutti
BMC

BMC and Forbes Insights recently surveyed executives in North America and Europe to get their perspective on their organization's overall security health and to find out what issues are critical to address. The results revealed the need for a framework organizations can use to get a solid strategy in place for improved security and compliance ...

January 22, 2016
Andrew Levy
Apteligent

Crittercism's new report, Extending the Mobile Enterprise, outlines practices for building effective and profitable m-commerce applications ...

January 21, 2016
Kent Alstad
Radware

Although half of all online travel bookings in the US are expected to occur via mobile device in 2016, 76% of the industry’s top 100 sites are slow to load, paralyzed by third-party scripts and trackers, and image-heavy, according to Radware's study titled 2015 State of the Union: Mobile Performance of the Top Travel Industry Sites: Do Your Customers Want To Take A Vacation From Your Slow Site?

January 20, 2016
Brendan Crowe
Unisys

A typical IT organization expends close to 70% of its human and capital resources maintaining an ever-growing inventory of applications and supporting infrastructure. A lot of this effort is simply misdirected as the organization doesn't need a significant portion of these applications because they are simply not integral to the day-to-day functioning of its business ...

January 14, 2016
Dirk Paessler
Paessler AG

New Year's resolutions aren't always the easiest to keep, but for IT workers, we have a few suggestions that will work wonders in 2016. Network and systems administrators do important work that keep businesses operating, yet are often overworked and overlooked. But this year, if they resolve to monitor their networks, they'll improve performance, productivity and perhaps even work a little less. Here are five easy ways IT can solve common problems with network monitoring in 2016 ...

January 12, 2016
Pradyut Roy
ManageEngine

It is imperative that enterprises start preparing their monitoring capabilities to withstand the barrage of mobile devices that will come into their environment over the next few years. Here are some ways Application Performance Management can help enterprises deal with the influx of mobile devices ...

January 11, 2016
Steve Brar
Riverbed Technology

A new survey revealed a major performance gap between the needs of business and IT’s current ability to deliver – 98% of executives agree that optimal enterprise application performance is critical to achieving optimal business performance. And yet, 89% of executives say the poor performance of enterprise applications has negatively impacted their work, and 58% say it impacts their work at least weekly. This performance gap is causing a series of problems for companies, from lost revenue and customers to lower morale to negative impact on brand image ...

January 08, 2016
Troy McAlpin
xMatters

If your critical business applications go down, or even run below peak level, your business pays a tremendous price. When a major IT incident occurs, engaging the right people quickly to restore service and manage communications is crucial. But security and business incidents occur so regularly that we aren't even surprised anymore when they happen. They come in the form of data breaches, malware attacks, power outages, intermittent service availability and performance degradation to name a few ...

Pages