ARE AGENTS NECESSARY FOR ACCURATE MONITORING?



Similar documents
5 IPTV MONITORING BEST PRACTICES

Server & Application Monitor

Comprehensive Monitoring of VMware vsphere ESX & ESXi Environments

Riverbed SteelCentral. Product Family Brochure

Riverbed SteelCentral. Product Family Brochure

Observer Analysis Advantages

Observer Analyzer Provides In-Depth Management

Extending Network Visibility by Leveraging NetFlow and sflow Technologies

agility made possible

Application Visibility and Monitoring >

WHITE PAPER. Solving the Challenges of Virtual Machine Backups with Acronis Backup & Recovery 10

How To Use Ibm Tivoli Monitoring Software

SapphireIMS 4.0 BSM Feature Specification

Devising a Server Protection Strategy with Trend Micro

Cloud and Data Center Security

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

Whitepaper. Business Service monitoring approach

Devising a Server Protection Strategy with Trend Micro

Modern IT Operations Management. Why a New Approach is Required, and How Boundary Delivers

EMC Documentum Performance Tips

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

A Guide to Understanding SNMP

Proactively Secure Your Cloud Computing Platform

CA Application Performance Management Cloud Monitor

Vulnerability Management

Build Your Managed Services Business with ScienceLogic

Uptime Infrastructure Monitor Whitepaper THE TRUTH ABOUT AGENT VS. AGENTLESS MONITORING. A Short Guide to Choosing the Right Monitoring Solution.

SolarWinds Network Performance Monitor

SapphireIMS Business Service Monitoring Feature Specification

Best Practices for NetFlow/IPFIX Analysis and Reporting

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

A Vision for Operational Analytics as the Enabler for Business Focused Hybrid Cloud Operations

Effective End-to-End Cloud Security

WHITEPAPER. PHD Virtual Monitor: Unmatched Value. of your finances. Unmatched Value for Your Virtual World

McAfee Server Security

Total Protection for Compliance: Unified IT Policy Auditing

PULSE SECURE CARE PLUS SERVICES

Solution Brief. Deliver Production Grade OpenStack LBaaS with Citrix NetScaler. citrix.com

HP SiteScope software

STEELCENTRAL APPRESPONSE

Application Performance Management. Java EE.Net, Databases Message Queue Transaction, Web Servers End User Experience

Analyzing Full-Duplex Networks

An Oracle White Paper June, Enterprise Manager 12c Cloud Control Application Performance Management

Ensuring High Service Levels for Public Cloud Deployments Keys to Effective Service Management

Client Monitoring with Microsoft System Center Operations Manager 2007

CA Workload Automation Agents Operating System, ERP, Database, Application Services and Web Services

Proactive Performance Management for Enterprise Databases

Bringing Enterprise-class Network Performance and Security Management Together using NetFlow

The Truth about Agent vs. Agentless Monitoring

IBM Security Intrusion Prevention Solutions

Virtualization Support - Real Backups of Virtual Environments

Monitoring Service Delivery in an MPLS Environment

Data Center Networking Managing a Virtualized Environment

Juniper Care Plus Services

Veritas Configuration Manager Profile. A Profile Prepared by EMA October 2006

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

How To Buy Nitro Security

IBM SmartCloud Monitoring

Virtual Operational Data Store (VODS) A Syncordant White Paper

Extreme Networks Solutions for Microsoft Skype for Business Deployments SOLUTION BRIEF

ScaleArc for SQL Server

SQL diagnostic manager Management Pack for Microsoft System Center. Overview

TECH TIPS 4 STEPS TO FORECAST AND PLAN YOUR NETWORK CAPACITY NEEDS

IBM Tivoli Monitoring for Applications

Vistara Lifecycle Management

Achieving Service Quality and Availability Using Cisco Unified Communications Management Suite

CA IT Client Manager Asset Inventory and Discovery

RIVERBED APPRESPONSE

Intel Service Assurance Administrator. Product Overview

Fujitsu Cloud IaaS Trusted Public S5. shaping tomorrow with you

Network Instruments white paper

SolarWinds Network Performance Monitor powerful network fault & availabilty management

EMC IONIX FOR SMART GRID VISIBILITY AND INTELLIGENCE

Business case for VoIP Readiness Network Assessment

Remote Network Monitoring Software for Managed Services Providers

Pluribus Netvisor Solution Brief

Network Performance + Security Monitoring

Virtual Desktop Infrastructure Optimization with SysTrack Monitoring Tools and Login VSI Testing Tools

TABLE OF CONTENTS. 1...Introducing N-central 3...What You Can Do With N-central 4...MONITOR: Proactively Identify Potential Problems

Mobile Device Management

Enterprise Buyer Guide

How To Manage Cloud Computing

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

Your Location Instant NOC using Kaseya. Administrator at Remote Location Secure access to Management Console from anywhere using only a browser

Assuring Converged Infrastructure: Converged Management Strategies for Cisco UCS

Network Instruments white paper

CA NSM System Monitoring Option for OpenVMS r3.2

Transcription:

ARE AGENTS NECESSARY FOR ACCURATE MONITORING? In managing network performance, user experience takes priority. Being proactive in managing performance means not only tracking the network and application, but obtaining an in-depth view of the underlying infrastructure health. There are two primary ways to obtain this information: agent or agentless Selecting the best method for your team requires understanding the options and selecting the solution that integrates well with your existing resources. This IT Brief will: Define agent and agentless approaches Outline pros and cons for each approach Establish a strategy for cost-effective, scalable performance visibility

DEFINING AGENT & AGENTLESS Agents are typically proprietary software loaded onto relevant application components, devices, and servers. The question to ask application performance monitoring (APM) vendors is whether their platform requires software to be installed on your critical infrastructure.

DOES THE PLATFORM REQUIRE SOFTWARE TO BE INSTALLED ON YOUR INFRASTRUCTURE? YES If the answer is yes, the program you re loading is most likely an agent, which gathers data and sends it to the console or platform for analysis. Agents can also perform tasks that impact or modify the operation of the device.

DOES THE PLATFORM REQUIRE SOFTWARE TO BE INSTALLED ON YOUR INFRASTRUCTURE? NO If the answer is no, the APM platform is likely relying upon polling technologies to acquire device performance and related application information. These solutions are typically referred to as agentless.

AGENTLESS SOLUTIONS Agentless solutions often tap into pre-existing or native agents and reporting capabilities placed on the system or device by the infrastructure manufacturer. Utilizing intelligence from these native agents allows agentless solutions to track performance variables including power, CPU, and memory usage without affecting device performance. Additionally, using polling technologies like SNMP or querying Windows systems through WMI provides nearly limitless information about devices and hosted applications.

AGENT PROS & CONS PROS Designed to provide critical management specific metrics Uses SSL or other encrypted methods to provide data Typically will auto-update to avoid maintenance overhead CONS Can impact critical infrastructure, consuming device s CPU, memory, and storage Cannot monitor beyond system on which its installed Time-consuming deployment requires agents for every critical device monitored Every new server requires additional agents be purchased Only tracks conditions and metrics it has been designed to target Cloud vendor may prohibit agents; coverage of multiple VMs can be cost prohibitive

AGENTLESS PROS & CONS PROS Tracks performance without impacting devices Immediate device discovery and monitoring, once IP address and credentials provided Scales as fast as new devices can be added Any devices can be monitored with minimal deployment effort, not just critical devices Taps into cloud vendor APIs and mimics user experience via synthetic transactions CONS Data sources may not provide full or relevant data Typically requires pre-existing services and agents to be turned on; may also require changes to firewall On larger networks, polling needs to be spaced out enough to avoid overlapping executions

ESTABLISHING EFFECTIVE PERFORMANCE VISIBILITY Ultimately, each team must assess the merits of leveraging proprietary agents versus going agentless. Each has strengths and weaknesses. Many vendors now offer significant insight into the underlying health and status of the devices and network by exploiting the wealth of information infrastructure and application developers now incorporate directly into their solutions with native agents. Cloud providers as well are introducing APIs that can be readily supported by agentless solutions. This is an important point as cloud vendors generally forbid the placement of any agents within their environments.

ESTABLISHING EFFECTIVE PERFORMANCE VISIBILITY Alternatively, if you have ready access to source code and/or require unique visibility into devices not available from agentless monitoring, then proprietary agents could be a consideration. For select applications, they can offer deep insight into application health at the expense of broad service support.

CONCLUSION Finally, whether utilizing proprietary agents or an agentless approach, it is important to note that many solutions also provide packet-based analysis to monitor the flow of applications traversing the network. This integrated monitoring approach yields highly granular detail on the overall health of applications and infrastructure, enabling optimal operational efficiency and reduced MTTR when problems are detected.

ABOUT NETWORK INSTRUMENTS Network Instruments, a JDSU Performance Management Solution is an industry leader in application and network management. It provides products that optimize performance and speed problem resolution, helping ensure delivery of critical applications for businesses worldwide. Network Instruments delivers these benefits through a seamlessly integrated line of precision-engineered software and hardware systems for exact network monitoring and analysis. For more information about Network Instruments, visit: www.networkinstruments.com North American Location 10701 Red Circle Drive Minnetonka, MN 55343 USA Toll Free: (800) 526-7919 Voice: (952) 358-3800 2014 Network Instruments. All rights reserved. Network Instruments and all associated logos are trademarks or registered trademarks of Network Instruments, a JDSU Performance Management Solution. ITB-140929-V17