Table of Recommendations for End-User Monitoring Solutions



Similar documents
HP End User Management software. Enables real-time visibility into application performance and availability. Solution brief

HP Business Availability Center software. Manage and optimize the health of business services and applications

HP Business Availability Center software. Improving IT operational efficiency and customer satisfaction

The top 10 misconceptions about performance and availability monitoring

The Top 10 Reasons Why You Need Synthetic Monitoring

Taming Microsoft Environments with HP SiteScope Exchange and Active Directory Solution Templates

When application performance is better, business works better.

A closer look at HP LoadRunner software

HP Application Performance Management

HP SiteScope software

Application Visibility and Monitoring >

How To Use Ibm Tivoli Monitoring Software

POINT OF VIEW. The Critical Role of Networking in Enterprise Resource Planning. Introduction

Information Technology Services

Provide access control with innovative solutions from IBM.

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE

Automate performance testing to predict system behavior and improve application performance. White paper

Brocade Network Monitoring Service (NMS) Helps Maximize Network Uptime and Efficiency

Analyze, Validate, and Optimize Business Application Performance

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

Study Shows Businesses Experience Significant Operational and Business Benefits from VMware vrealize Operations

Move beyond monitoring to holistic management of application performance

E-Guide. Sponsored By:

Cloud Services Catalog with Epsilon

how do I tame IT complexity, align with business goals, and deliver a great end-user experience?

Technology. Accenture Infrastructure Outsourcing Services

HOW IS WEB APPLICATION DEVELOPMENT AND DELIVERY CHANGING?

The Evolution of Load Testing. Why Gomez 360 o Web Load Testing Is a

Measuring end-to-end application performance in an on-demand world. Shajeer Mohammed Enterprise Architect

Get Significant Application Quality Improvement without Major Investment Performance driven. Quality assured.

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

HP Performance Engineering Best Practices Series

Create Operational Flexibility with Cost-Effective Cloud Computing

Application Performance Management

CA Scheduler Job Management r11

Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation

Get Significant Application Quality Improvement without Major Investment Performance driven. Quality assured.

agility made possible

Business white paper. Load factor: performance testing for Web applications

WebSphere Cast Iron Cloud integration

Maximize potential with services Efficient managed reconciliation service

Optimize Application Performance and Enhance the Customer Experience

Accelerate Your Transition to a Unified Computing Architecture

Datasheet FUJITSU Cloud Monitoring Service

Managed Service Plans

RIVERBED APPRESPONSE

ORACLE SYSTEMS OPTIMIZATION SUPPORT

BUSINESSOBJECTS DATA INTEGRATOR

echomountain Enterprise Monitoring, Notification & Reporting Services Protect your business

ACI ON DEMAND DELIVERS PEACE OF MIND

Operations Manager Comprehensive, secure remote monitoring and management of your entire digital signage network infrastructure

Get what s right for your business. Technologies.

Cisco Tidal Enterprise Scheduler

Silk Performer LOAD TESTING. The key to keeping business applications running

When application performance is better, business works better.

CA Wily Introscope. CA Advantage. Benefits. Overview

Address IT costs and streamline operations with IBM service request and asset management solutions.

Kenandy TM Cloud ERP White Paper. Kenandy Cloud ERP Overview

Guarantee Microsoft Office 365 end-user experience

SAP Managed Services SAP MANAGED SERVICES. Maximizing Performance and Value, Minimizing Risk and Cost

Mobile Device Management

How To Protect Your Network From Attack From A Network Security Threat

IBM WebSphere Business Monitor, Version 6.1

Managed Services. Business Intelligence Solutions

Connected Product Maturity Model

NetApp OnCommand Management Software Storage and Service Efficiency

SOLUTION BRIEF CA SERVICE MANAGEMENT - SERVICE CATALOG. Can We Manage and Deliver the Services Needed Where, When and How Our Users Need Them?

WHITE PAPER: Egenera Cloud Suite

VitalSuite Application Performance Management Software for Optimizing Wireless Data Services

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER

End-to-end management

How To Use Itil To Improve Your Business

WHITE PAPER Using SAP Solution Manager to Improve IT Staff Efficiency While Reducing IT Costs and Improving Availability

Cisco Unified Computing Support and Warranty Services

Address IT costs and streamline operations with IBM service desk and asset management.

How To Manage A Network With Ccomtechnique

SOLUTION WHITE PAPER. Align Change and Incident Management with Business Priorities

Application Performance Management

PULSE SECURE CARE PLUS SERVICES

Driving workload automation across the enterprise

IBM asset management solutions White paper. Using IBM Maximo Asset Management to manage all assets for hospitals and healthcare organizations.

ENABLING TODAY S WIRELESS ENTERPRISE

Select the right configuration management database to establish a platform for effective service management.

Contact Center on Demand

The Advantages of Converged Infrastructure Management

VCE PROFESSIONAL SERVICES PORTFOLIO OVERVIEW

Application Testing Suite Overview

Navajo Nation Department of Information Technology (NNDIT) Helpdesk Policy P100

Transcription:

2005 CMP MEDIA SURVEY RESULTS: TRENDS IN END-USER MONITORING

EXECUTIVE SUMMARY Mercury recently enlisted CMP Media s help in conducting a survey of IT professionals to better understand the trends affecting the use of end-user monitoring solutions. This white paper will present the survey findings and discuss some of the important forces that are driving companies to accelerate and expand their use of these solutions. TABLE OF CONTENTS Executive Summary 2 Introduction 3 Mercury End-User Monitoring Survey Background 4 End-User Monitoring What, When, Where, and How Often? 4 Forces Accelerating the Use of End-User Monitoring Solutions 5 Mercury Solutions 9 Mercury End User Management 9 Mercury SiteScope 10 Mercury Managed Services 11 For More Information 11 End-User Monitoring Usage Trends 6 Trend #1: End-User Monitoring Has Become More Strategic to the Enterprise. 6 Trend #2: Enterprises Are Monitoring from Outside their Firewall. 8 Trend #3: Companies are Conducting Both Real and Emulated User Monitoring. 8

Introduction More than ever before, today s enterprises are relying heavily on the health and performance of their computing infrastructure. Key corporate IT applications are becoming increasingly more strategic to nearly every business. In order to measure and manage the effectiveness of these missioncritical online applications, organizations must implement powerful end-user management solutions and practices. Many organizations need to ensure that their essential applications are available to customers and employees 24x7. The cost of downtime for many critical business functions, such as billing and procurement, can be devastating. One large cellular provider recently estimated that system downtime cost its enterprise more than $250,000 per hour. System downtime can also create major public relations nightmares. A large Fortune 500 company experienced this situation when a simple code change to its corporate website brought the entire site down on the same day that its corporate earnings were announced. These are clearly unacceptable circumstances for today s enterprises. Most companies have already implemented a variety of tools and procedures for monitoring their computing infrastructure. These traditional infrastructure monitoring solutions do provide a bottoms-up view of system performance, but infrastructure monitoring only provides part of the information needed to verify that key applications are performing as they should. Sophisticated end-user management solutions are essential for understanding the experience of real users accessing key applications. End-user management solutions monitor the actual user experience, including application availability and response time, to accurately measure IT performance from the end user s perspective. These solutions augment traditional infrastructure monitoring solutions, enabling IT to be proactive and deal with performance and availability issues before they escalate to the point where organizations and customers are negatively impacted. Early end-user management solutions consisted of multiple, non-integrated point applications, including the diagnostic tools that came bundled with servers. There was rarely any integration or interoperability between these sets of disparate tools. But the increasing complexity of today s IT infrastructure now requires the ability to manage heterogeneous environments with comprehensive and unified end-user monitoring solutions. These initial monitoring solutions relied on reactive end-user management practices that only alerted IT when system performance degraded or failed completely. Now enterprises are demanding highly integrated, proactive applications that provide the ability to identify and diagnose problems even before end users experience them. Today s systems managers need powerful and easy-to-use tools that can monitor all of the interactions between the diverse software, networks, databases, and infrastructure components that can affect the performance of their enterprises core online applications. WWW.MERCURY.COM 3

Mercury End-User Monitoring Survey Background Mercury recently enlisted the expert assistance of CMP Media LLC and CIC Research to conduct a research study to better understand the forces and trends shaping the use of end-user management solutions. All study participants had specific IT job titles and job functions relating to applications management, e-business/e-commerce, networking/telecom, or outsourcing. These professionals were all involved in procuring application/systems management, network management, performance management, or similar services for their companies. Only those who worked at companies with 50 employees or more were interviewed. The breakout of the 100 study respondents by company size was as follows: 1,000 or more employees 48% 100-999 employees 41% 50-99 employees 11% Survey respondents were asked about the frequency of their end-user monitoring activities, what kinds of applications were being monitored, what factors were driving the scope of their end-user monitoring activities, and how the importance of end-user monitoring had changed over the previous year. End-User Monitoring What, When, Where, and How Often? Several questions were asked about the variety and frequency of monitoring projects. 74% of survey participants indicated that they currently monitored some or all of their applications. Of that group, 75% monitored their custom applications and 62% monitored their email applications. Specific survey questions and answers included: 1. How frequently do you monitor the end-user experience of your live applications? 80% 70% 60% 74% Currently monitored their applications 40% 30% 20% 10% 0% 33% Monitored 24x7 26% Never monitored or only monitored when there was an application failure WWW.MERCURY.COM 4

2. What kinds of applications are you monitoring? 80% 70% 60% 40% 75% Custom applications 62% Email 30% 20% 10% 0% 28% 28% ERP CRM 16% J2EE 10% Other applications 3% Websites 3. How many applications are you monitoring? 0-19 More than 500 applications 6% 100-499 applications 11% 58% 20-99 applications 25% Forces Accelerating the Use of End-User Monitoring Solutions There are many forces driving IT to increase the usage of end-user monitoring solutions. The most significant motivator was the desire to prevent any damage inflicted by viruses or malicious hackers. Another strong driver was the desire to ensure the functionality and performance of key software applications. Over half (55%) of respondents indicated the need to make applications available 24x7. WWW.MERCURY.COM 5

Survey questions included: 1. What factors are driving the scope of your monitoring projects? 90% 80% 70% 60% 40% 30% 20% 10% 86% Preventing (or reacting to) hostile intrusions to your network (e.g., viruses, worms, malicious hackers) 75% Ensuring proper functionality of your software applications 71% Monitoring the general health and availability of your hardware 67% Ensuring a positive end-user experience 45% Proactively monitoring network bandwidth 39% Verifying service-level agreements 0% 2. What forces are affecting the hours your applications are available? 60% 40% 30% 20% 10% 0% 55% Increased use of round-the-clock applications (24x7 catalog ordering, etc.) 40% Increased use of remote devices allowing employees to access internal systems outside of regular business hours 29% Expanding global operations 16% Increased implementation of flex time for employees End-User Monitoring Usage Trends The survey uncovered several key trends in end-user monitoring: Trend #1: End-User Monitoring Has Become More Strategic to the Enterprise. Survey results indicated that end-user monitoring is increasingly becoming more strategic to today s enterprises. Two-thirds (66%) of respondents indicated that end-user monitoring was very important or one of the most important factors contributing to their company s success, and 43% of survey participants indicated that the importance of end-user monitoring had increased from the previous year. WWW.MERCURY.COM 6

The survey also showed that end-user monitoring is gaining higher visibility across the enterprise. In addition to application developers, IT, and QA teams, more than half (52%) of the respondents indicated that their line-of-business managers and more than one-quarter (27%) of C-level executives now regularly review end-user monitoring reports. 1. Which of the following best describes how you would classify end-user management's role in your organization? 66% Very important 34% Necessary 2. Has the importance of end-user monitoring for your organization changed over the past year? 2% Decreased 43% Increased 55% Stayed same 3. Which of these groups in your organization regularly review end-user monitoring status reports? 60% 40% 30% 20% 10% 0% 54% Application developers 52% Line-ofbusiness managers 31% QA teams 27% C-level executives 20% Finance 14% Legal 8% 6% IT Other 6% None WWW.MERCURY.COM 7

Trend #2: Enterprises Are Monitoring from Outside their Firewall. As end-user monitoring grows in importance, companies are focusing more on monitoring from their end users location. For global companies with worldwide customers, monitoring from where their customers are means monitoring outside the firewall from multiple domains and geographies. Monitoring from outside the firewall enables companies to understand the last-mile and more rapidly triage availability and performance problems when they occur. In fact, of the study participants were monitoring their applications across multiple domains or geographies. Of those monitoring from multiple locations, 48% were monitoring from over six domains or geographies. 1. Do you monitor from multiple domains and geographies? Yes No 2. How many geographies or domains do you monitor from? 52% Between one and five 26% Between six and ten 22% More than ten Trend #3: Companies are Conducting Both Real and Emulated User Monitoring. The survey also investigated respondents attitudes toward the importance of conducting real- vs. emulated-user monitoring: Real-user monitoring observes the behavior of actual users on the system. It helps to quantify the impact or to measure performance and availability of all users for verifying service-level agreement (SLA) compliance. User emulation refers to the process of proactively driving virtual transactions against applications using simulated users, alerting IT teams to potential issues before actual customers have any problems. End-user emulation can also be used for SLA compliance and reporting. WWW.MERCURY.COM 8

Almost half (48.5%) or respondents were performing emulations of end-user experience, and over half (51.5%) of survey participants felt that it was important to monitor using both emulated end users and actual end users. By using a combination of real-user monitoring with user emulation, companies can benefit from the best of both worlds they are able to proactively detect problems, understand the impact of availability/performance issues on real users, and proactively manage service levels. 1. Do you currently perform proactive emulations of end-user experience? 48.5% Yes 51.5% No 2. How important is real versus emulated end-user monitoring to you? 5.1% Emulated-user only 51.5% Both are important 13.1% No preference 30.3% 51.5% Real-user only Mercury Solutions Mercury provides several powerful solutions for effective end-user monitoring, including Mercury End User Management Mercury s end-user monitoring application, and Mercury SiteScope an agentless monitoring software that helps maximize the availability of an enterprise s entire IT infrastructure. Mercury End User Management Mercury End User Management complements system/infrastructure monitoring strategies and is the only solution to combine real-user and emulated-user monitoring into one integrated application. Mercury End User Management proactively monitors application availability in real time, enabling IT to fix issues before customers experience problems. WWW.MERCURY.COM 9

Mercury End User Management proactively emulates end-user business processes against applications on a 24x7 basis for over 50 protocols web, non-web environments, and packaged applications such as Siebel, SAP, PeopleSoft, Oracle, Citrix, and others. Plus, it enables IT to assess business impact on real users across multiple domains and geographies, and manage end-user performance from a wide number of supported desktops, handheld, and devices. Mercury End User Management includes Business Process Monitors for emulating end users, Real User Monitors for measuring true transaction performance of all users of Web applications, and Client Monitors for measuring the real user experience of specific known users. Organizations can use one or more of the monitors depending on their application monitoring requirements. Mercury SiteScope Mercury SiteScope is an agentless monitoring solution designed to ensure the availability of distributed IT infrastructures, including servers, operating systems, network devices, network services, applications, and application components. This proactive, web-based infrastructure monitoring solution is lightweight, highly customizable, and doesn t require high overhead agents on production systems. It lays the framework for a comprehensive monitoring strategy. Mercury SiteScope also serves as a monitoring foundation for other Mercury offerings, such as Mercury Business Availability Center and Mercury LoadRunner. With Mercury SiteScope, IT operations teams gain the real-time information they need to verify infrastructure operations, stay apprised of problems, and solve bottlenecks before they become critical. FIREWALL WEB SERVER FIREWALL APPLICATION SERVER DATABASE SERVER Suite of monitors track 65+ IT infrastructure components. Users can easily configure alert and automated error recovery settings. SITESCOPE SiteScope identifies problems using detailed reports and performance date. Mercury SiteScope monitors IT infrastructure performance and availability, and alerts operations groups to problems. WWW.MERCURY.COM 10

Mercury Managed Services Mercury Managed Services is the recommended delivery method for Mercury s application management solution. Mercury Managed Services enables enterprises to: Jump-start implementations using Mercury s pre-deployed, high-availability system. Configure and modify the views, monitors, alerts, and reports based on specific customer requirements. Script business processes and modify them as needed. Utilize initial training and ongoing mentoring based on proven best practices. Mercury Managed Services provides an extensive monitoring infrastructure that allows enterprises to gain insight into the end-user experience both inside and outside the firewall. Mercury maintains a network of host machines, to help measure end-user performance experience at any time, from any of 80 global locations. Mercury Managed Services also offers the option to migrate the monitoring configuration and data to an in-house environment when the enterprise is ready. By leveraging Mercury s pre-deployed infrastructure, operations, and expertise, IT organizations can benefit from faster time-to-value at a lower total cost of ownership. IT organizations can focus on their core competencies and rely on Mercury to assist them with configuration, scripting, data analysis, and ongoing mentoring. IT GOVERNANCE MERCURY IT GOVERNANCE CENTER TM MERCURY QUALITY CENTER APPLICATION DELIVERY APPLICATION MANAGEMENT MERCURY PERFORMANCE CENTER MERCURY BUSINESS AVAILABILITY CENTER TM TM TM Solutions for: J2EE.Net SAP Siebel Oracle PeopleSoft FLEXIBLE DELIVERY OPTIONS MERCURY MANAGED SERVICES Combination SERVICES FOR IN-HOUSE DEPLOYMENT Mercury Services offers flexible delivery options for Mercury s BTO offerings. For More Information To learn more about end-user monitoring using Mercury End User Management or Mercury SiteScope, contact your local Mercury sales representative, or visit www.mercury.com. WWW.MERCURY.COM 11

Mercury is the global leader in business technology optimization (BTO). We are committed to helping customers optimize the business value of IT. WWW.MERCURY.COM 2005 Mercury Interactive Corporation. Patents pending. All rights reserved. The Mercury logo, Mercury Business Availability Center, Mercury End User Management, Mercury LoadRunner, Mercury Managed Services, and Mercury SiteScope are trademarks or registered trademarks of Mercury Interactive Corporation in the United States and/or other foreign countries. All other company, brand, and product names are marks of their respective holders. WP-1365-0205