WHITE PAPER: ENTERPRISE SOLUTIONS. Symantec Insight Inquire Symantec i 3 Application Availability and Performance Management Solution

Similar documents
Maximizing SQL Server Application Performance and VERITAS i 3. USING VERITAS i 3 FOR WEB APPLICATIONS RUNNING MICROSOFT SQL SERVER

WHITE PAPER September CA Nimsoft Monitor for Servers

WHITE PAPER: ENTERPRISE SOLUTIONS. Implementing Proactive Application Performance Management

IBM Tivoli Composite Application Manager for WebSphere

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

Data Sheet: Storage Management Veritas CommandCentral Storage 5.1 Centralized visibility and control across heterogeneous storage environments

Winning the J2EE Performance Game Presented to: JAVA User Group-Minnesota

Test Run Analysis Interpretation (AI) Made Easy with OpenLoad

Application Performance Monitoring (APM) Technical Whitepaper

Application Performance Management for Enterprise Applications

CA Application Performance Management Cloud Monitor

IBM Tivoli Composite Application Manager for WebSphere

BMC ProactiveNet Performance Management Application Diagnostics

End User Monitoring with Enterprise Manager. Nadu Bharadwaj Principal Product Manager

Holistic Performance Analysis of J2EE Applications

STEELCENTRAL APPINTERNALS

Enterprise Manager 12c for Middleware

Transaction Monitoring Version for AIX, Linux, and Windows. Reference IBM

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Resonate Central Dispatch

SENTINEL MANAGEMENT & MONITORING

Veritas Cluster Server by Symantec

Monitoring applications in multitier environment. Uroš Majcen A New View on Application Management.

The Evolution of Load Testing. Why Gomez 360 o Web Load Testing Is a

Observer Reporting Server Sample Executive Reports

WHITE PAPER Application Performance Management. Managing the Performance of Oracle Application Environments

CA Database Performance

APPLICATION MANAGEMENT SUITE FOR SIEBEL APPLICATIONS

WHITE PAPER OCTOBER CA Unified Infrastructure Management: Solution Architecture

How To Use Ibm Tivoli Composite Application Manager For Response Time Tracking

Using WebLOAD to Monitor Your Production Environment

ROI Business Use Case. Cross-Enterprise Application Performance Management. Helps Reduce Costs & MTTR, Simplify Management, Improve Service Quality

Beyond Logging and Monitoring. New Techniques for Solving J2EE Application Problems in Production Environments. David Kadouch BMC Software

Veritas Cluster Server from Symantec

Borland Silk Performer Synthetic Transaction Monitoring for BMC Software

ManageEngine (division of ZOHO Corporation) Infrastructure Management Solution (IMS)

W H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers

Data Sheet: Storage Management Veritas Virtual Infrastructure Bringing enterprise-class storage management to virtual server environments

End Your Data Center Logging Chaos with VMware vcenter Log Insight

Server & Application Monitor

HP End User Management software. Enables real-time visibility into application performance and availability. Solution brief

How To Use Ibm Tivoli Monitoring Software

MICROSOFT EXCHANGE MAIN CHALLENGES IT MANAGER HAVE TO FACE GSX SOLUTIONS

Heroix Longitude Quick Start Guide V7.1

EMC Data Protection Advisor 6.0

TNT SOFTWARE White Paper Series

Monitoring IBM HMC Server. eg Enterprise v6

WHITE PAPER September CA Nimsoft For Network Monitoring

ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE

Best Practices for NetFlow/IPFIX Analysis and Reporting

Veritas Storage Foundation High Availability for Windows by Symantec

CA Workload Automation Agents Operating System, ERP, Database, Application Services and Web Services

<Insert Picture Here> Java Application Diagnostic Expert

CA Wily Introscope. CA Advantage. Benefits. Overview

Consulting Services for Veritas Storage Foundation

Performance Management for Enterprise Applications

PATROL Internet Server Manager Technical Brief

WHITE PAPER OCTOBER CA Unified Infrastructure Management for Networks

effective performance monitoring in SAP environments

HP Business Availability Center software. Improving IT operational efficiency and customer satisfaction

Riverbed SteelCentral. Product Family Brochure

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010

PROVIDING INSIGHT FOR OPERATIONAL SUCCESS

Datasheet FUJITSU Cloud Monitoring Service

3-Tier Architecture. 3-Tier Architecture. Prepared By. Channu Kambalyal. Page 1 of 19

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Red Hat Network: Monitoring Module Overview

vrealize Operations Manager User Guide

WHITE PAPER June CA Nimsoft Monitor. Delivering a Unified Monitoring Architecture

Achieving Business Performance Goals through Virtualization Management Best Practices

IBM RATIONAL PERFORMANCE TESTER

Network Performance Management Solutions Architecture

Test Equipment Depot Washington Street Melrose, MA TestEquipmentDepot.com. Application Advisor

IMPLEMENTING HEALTHCARE DASHBOARDS FOR OPERATIONAL SUCCESS

Service Virtualization:

Managing User Website Experience: Comparing Synthetic and Real Monitoring of Website Errors By John Bartlett and Peter Sevcik January 2006

End-to-end Service Level Monitoring with Synthetic Transactions

Network Management and Monitoring Software

Riverbed OPNET AppInternals Xpert PRODUCT BRIEF

PROVIDING INSIGHT FOR OPERATIONAL SUCCESS

HP Business Availability Center software. Manage and optimize the health of business services and applications

Solution Brief TrueSight App Visibility Manager

WHITE PAPER. Domo Advanced Architecture

WhatsUp Gold v11 Features Overview

Riverbed SteelCentral. Product Family Brochure

WHITE PAPER: DATA PROTECTION. Veritas NetBackup for Microsoft Exchange Server Solution Guide. Bill Roth January 2008

RIVERBED APPRESPONSE

Application Perspective

APPLICATION PERFORMANCE MONITORING

CA Insight Database Performance Monitor for Distributed Databases

[Document Title] SolarWinds Server & Application Monitor (SAM) [Document Subtitle] Angi Gahler. Share: Author: Manish Chacko

echomountain Enterprise Monitoring, Notification & Reporting Services Protect your business

CA Scheduler Job Management r11

Data Sheet: Server Management Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor

SOA management challenges. After completing this topic, you should be able to: Explain the challenges of managing an SOA environment

SW5706 Application deployment problems

Capacity Planning Use Case: Mobile SMS How one mobile operator uses BMC Capacity Management to avoid problems with a major revenue stream

Global Headquarters: 5 Speen Street Framingham, MA USA P F

ALCATEL-LUCENT VITALSUITE Application & Network Performance Management Software

Version Overview. Business value

Transcription:

WHITE PAPER: ENTERPRISE SOLUTIONS Symantec Insight Inquire Symantec i 3 Application Availability and Performance Management Solution Formerly Veritas i 3 Insight Inquire

White Paper: Symantec Enterprise Solutions Symantec Insight Inquire and Performance Management Solution Contents Overview...........................................................................4 A Typical Web-based Application Environment............................................5 Challenges managing availability and performance in a complex environment.................6 Requirements of an ideal availability and performance management solution.................8 The Symantec Insight inquire Solution................................................10 Symantec Insight Inquire Studio......................................................11 Symantec Insight Inquire Management Console.........................................12 Symantec Insight Inquire Agents......................................................13 Summary..........................................................................24

OVERVIEW Enterprise Web-based applications have become an essential component of every business. These applications are mission critical, executing various organizational business processes. Whether it s a pure Web-based multi-tier application or a front end to an existing ERP or legacy systems, the availability of the application and the content of transaction output need to be monitored 24x7, to ensure the reliable and correct operation of the business processes. One of the biggest challenges facing IT today when it comes to Web-based applications is the requirement to constantly check, 24x7, the availability, reliability, and performance of the applications. In other words, measuring the actual service being delivered to the end user (SLA) and then being able to determine the end-to-end service level contributors in order to find bottlenecks and adhere to service levels (SLAs). Symantec i 3 is the industry s first solution to provide a way to quickly, efficiently, and unobtrusively monitor the availability, reliability, and performance of applications as well as capture the hard-to-get URL-to-SQL application metrics. It presents these important metrics in a manner that enables crisp communication, rapid proactive or reactive detection, correction and verification throughout the application life cycle. Symantec i 3 is the only solution to combine the management of both synthetic and real end-user transactions. The use of synthetic transactions is a major functional enhancement to Symantec i 3. It empowers IT managers with the ability to proactively manage the availability and performance of their applications. The new availability features are part of Symantec Insight Inquire. This paper describes the unique capabilities of the Symantec i 3 availability solution and highlights why a combination of synthetic and real end-user transactions must be measured and managed to provide comprehensive application performance management. 4

A TYPICAL WEB-BASED APPLICATION ENVIRONMENT A typical and simple Web application environment might look like this: End users access the application and execute transactions both from inside the firewall and outside the firewall. End users are located at multiple geographical locations. When users execute transactions against the Web-based application, transactions traverse network links, routers, firewalls, load balancers, Web servers, application server clusters, database servers, and storage components. This path causes increased complexity for IT managers and prolongs the time to resolution when problems arise. There are many potential points where a transaction can fail. For example: Network time-outs on a congested network link End user cannot access the application because of a database failure Unacceptable response time because of a misconfigured application cluster Long delays because of an improper load balancing policy Architectural application problems causing accessibility and performance failures Accessible application but incorrect content display, blank pages, wrong pages, etc. 5

Therefore it is important to test the transaction availability and response-time from the end user s point of view, as he or she experiences it, as well as validating that the content is displayed correctly. Checking the availability of each component along the transaction path is not good enough, since a component could be up and running, but does not function properly or interact with other components properly. For example, an Oracle database could be available with processes running, but still doesn t answer properly to queries. Therefore, to have a complete availability assessment, what matters is the end user s point of view. Is the application transaction accessible in a timely way to the end user? Does it display the right information? CHALLENGES MANAGING AVAILABILITY AND PERFORMANCE IN A COMPLEX ENVIRONMENT The management of this simple Web-based application, spread across multiple tiers, demands a comprehensive yet straightforward way to check if the application is accessible to all users at different locations as well as ensuring that the right service level objectives are being met. Today s complex, multi-tiered Web-based applications introduce several new challenges, which include the following: The introduction of additional tiers and new technologies (e.g. load-balancers, Web servers, application server clusters) add new challenges. The new environments are distributed and much more complex compared with the simple traditional client/server two-tier architectures. The multi-tier architecture makes it difficult to pinpoint the source of the problem. Paradoxically, these Web applications actually demand more responsiveness and around-theclock high performance than their less complex internal predecessor, client/server applications, in order to adhere to SLAs. Many Web-based applications have migrated from traditional client/server or mainframe applications. The new applications have an expectation of performance. Web-based applications have to perform as well as or better than traditional applications. Some applications are not managed properly and suffer from inadequate system and application management solutions. Existing monitoring solutions look at each infrastructure component separately, but do not monitor the service being delivered to the end user. Without understanding the end-user experience, the application manager might waste unnecessary resources trying to tune the application. The application manager needs to fight with a vast number of events that seem to be unrelated but are the symptoms of a single failure. 6

For example, if there are database connections errors, multiple events could be generated on the database as well as on adjacent tiers. The same is true for network and other problems. What happens when the connection to and context of the business is missing? Existing system management tools will alert you on the failure of infrastructure components but do not provide information on the business impact of such a failure. Monitoring business transactions immediately reflects the impact on the business. For example, we might define the following transaction: Login to an account Conduct a few operations such as check balance, transfer, etc. Logout Running the transaction 24x7 and simulating an end user will tell us if the transaction is available in the case of a component failure. We can immediately see the impact of a component if the transaction fails, is not accessible, produces the incorrect page and data, or has a slow response time. Detecting if the application is not available is only the beginning of problem resolution. The next step analysis is very important to quickly focus on the problem and solve it. Existing monitoring tools do not provide an efficient way to isolate the problem symptom and identify and analyze the root cause. Existing tools either lack the granularity of data required for problem resolution or do not correlate the different events and symptoms to pinpoint the problem. Scalability is also a challenge. With the introduction of Web-based applications, midsize to large accounts have tens to hundreds of Web applications, each running many different transactions. Availability and performance solutions have to scale up in order to monitor the vast amount of Web applications and transactions as well as the individual infrastructure components (e.g., network, Web servers, application servers, databases) that serve these applications. 7

REQUIREMENTS OF AN IDEAL AVAILABILITY AND PERFORMANCE MANAGEMENT SOLUTION In order to solve the problems identified, a Web-based availability and performance solution should be able to support the following functionality: The ability to easily define and manage a business transaction service level. In other words, being able to simulate an end-user transaction and run it continuously, 24x7, to check the transaction availability, reliability, and performance. As a result provide reports and alerts that show the delivered service levels over time. Typical enterprises are composed of a central location and multiple remote geographical locations. An ideal availability and performance management solution should support running transactions from multiple locations; these locations include: From inside the firewall to test the data center availability From designated multiple geographical locations to test if transactions are accessible from those key locations The solution should provide a straightforward and simple way to look at the availability, performance, and reliability of the monitored business transactions from all defined geographical locations. In addition, statistics such as Mean Time to Recovery, Mean Time between Failures, and so on should be provided. The solution should verify: Accessibility ensuring transactions are accessible from both inside and outside the firewall Reliability confirming transactions produce the correct output. Validation for certain objects should be supported to verify generated transaction output Response time response times must fall within the defined service level objectives (SLOs) Being able to break down a Web transaction into its pages and each page into its components is important in analyzing SLA breaches due to long response times. The solution should provide details on the slow pages in a Web transaction and be able to break a page into its components to focus on the components that cause the delay. 8

The solution should support monitoring the availability of underlying application and infrastructure components. For example, availability checks for J2EE application servers and SQL checks for the database should be conducted. There are many infrastructure and application components that should be supported. In order to focus and identify application availability problems an initial mandatory monitor list should include the following monitors: Web-based HTTP URLs (single, multiple, recorded transactions) J2EE EJB checks (IBM WebSphere and BEA WebLogic) Database checks (ODBC/JDBC) Network ICMP Ping Middleware (IBM MQ Series, etc.) UNIX and Microsoft Windows OS CPU, memory, disk metrics FTP LDAP SMTP POP3 IMAP4 DNS Radius Generic TCP/IP The solution should be scalable to support many instances of the monitored list defined above. Scalability means being able to run many transactions against multiple different applications and infrastructure components as well as being able to support high scheduling requirements, meaning small enough intervals between each run of a transaction. Provide a firsthand resolution for the suspected component causing a transaction failure. Operation managers would like to know which tier is causing the problem, whether it is the network, Web server tier, application server cluster, or the database. A simple check of each component could tell if the component is available. Such a check can pinpoint a component failure, which enables quick resolution and a shorter MTTR (mean time to repair). For more complex problems like decreased response times and performance bottlenecks, a deep drill-down is required. Additional or next step analysis must be provided in order to isolate the definitive root cause. In order to solve performance issues and adhere to SLAs, very detailed data should be collected from multiple tiers along the transaction path. Granular data should be collected at 9

the Web server tier, application server cluster, and database and storage components. Then this data should be correlated to enable response time segmentation across tiers. When the problematic component is identified an in-depth analysis of this component should be provided. This means enabling drill-down to the root cause of the problem. For example, in J2EE servers, an in-depth monitoring of the different JSPs, EJBs, and JDBC connections down to the method level should be provided. In the case of databases, an in-depth analysis of SQL statements and objects should be provided. The solution should be durable enough to cope with failures like loosing connection between an agent (POP) located at a remote geographical location and the management station. The agent should continue to work independently and autonomously, test the application availability, and when connection is recovered, to sync up with the management station. The solution should be easy to install and configure. Configuration means an easy way to define all the monitored components, including application transactions and infrastructure components, as well as being able to integrate with management platforms. THE SYMANTEC INSIGHT INQUIRE SOLUTION Symantec i 3 provides a Web-based management solution that enables availability and performance monitoring of end-user transactions as well as in-depth monitoring of each component along the transactions path. It captures the hard-to-get availability and performance metrics, which enables detection of deviations from SLAs as well as the next step analysis to drill down to the source of the problem. This enables the proactive detection of potentially problematic application service level trends, identifies those with the highest payback, and significantly reduces the time to proactively or reactively locate the hot spots, determine the impact of the performance anomaly, determine the cause of the performance anomaly, as well as verify that the corrective action had the desired affect A major functional enhancement of Symantec i 3 called Symantec Insight Inquire provides application availability monitoring using synthetic transactions. Symantec i 3 now offers a complete solution for application availability through monitoring of Web-based applications, transactions, and integration with the Veritas Cluster Server solutions. Symantec Insight Inquire with its intuitive Web-based management interface, makes it easy to define and record end-user transactions. Focusing on Web-based applications, the solution monitors the availability, performance, and reliability of key business processes. Application availability can be monitored 10

24x7. Routine application health checks can be scheduled as needed. Availability by unique geographic location can be tested and measured. Symantec Insight Inquire provides the following functionality: Studio an authoring environment for business transaction recording. Using Symantec Insight Inquire IT managers can record a business transaction against a Web-based application. Validations could be asserted to verify existence of different objects on the Web page. Then this recorded transaction would be used in the execution environment. The execution environment includes: A focal management station that collects the data from multiple distributed agents. The management station visualizes the application status at the different locations. Agents, located at multiple geographical locations that run the prerecorded transaction. The agents verify the accessibility, content, and response times of a transaction. SYMANTEC INSIGHT INQUIRE STUDIO Studio is a scriptless transaction recording engine that enables: Definition of a business transaction. This is done by virtually working in a Web browser like interface while conducting usual operations against a Web site. Any novice user who knows how to work with Internet Explorer can record a business transaction. Adding assertions to validate the content of the page such as specific text objects or graphical components. This is done during the transaction definition phase. Testing of the recorded transaction visually, with the ability to see how it is played back before it is deployed. Recorded transactions to be deployed directly to the management station, which in its turn populates the recorded transactions to agents for execution. The environment to maintain recorded transactions when the Web application is changed or updated. 11

SYMANTEC INSIGHT INQUIRE MANAGEMENT CONSOLE The management station is the focal place for configuring, defining, and viewing the status of the Web applications. A typical scenario starts with the definition of a Web application and associating the Web application with prerecorded Studio transactions. Then the management station will send the prerecorded transaction to the different agents for execution. Agents simulate the real user activity and check for accessibility, content validation and performance metrics like page performance, object performance, HTTP errors, and so forth. Symantec Insight Inquire supports policies that define key behaviors such as: Alerting and action policies to be taken in case of a failure Service levels page load times Scheduling policy when and how often to execute transactions Storage policies the granularity of the data kept and when to keep it Symantec Insight Inquire supports firsthand resolution to isolate the problem. Given the application is not accessible or SLAs are being breached, Symantec Insight Inquire conducts a first-aid resolution to determine the most probable component that is causing the problem. This is done by checking the availability of each infrastructure component involved in the transaction execution, the network accessibility, the Web server, application server, and database. When the 12

problematic component is identified only one correlated alert is sent, eliminating the flood of alerts to the management station caused by a single failure. SYMANTEC INSIGHT INQUIRE AGENTS Symantec Insight Inquire agents are the ones that actually do the work. They execute the prerecorded transactions according to the times defined in the scheduling policy. Each transaction is checked for accessibility, content validation, and performance metrics like page load times and HTTP errors. Results are communicated back to the management station. Agents can run in a clustered mode where increased scalability is needed to support numerous Web applications and transactions. In this mode there is a master agent, the management console, which distributes the work to other members in the cluster. Once applications, transactions, and policies are defined in the management console, it is very easy to bring up new agents at different geographical locations. Once the agent is installed and running it will get the definitions and policies populated to it from the management station. Using the Symantec Insight Inquire solution, one can conduct the following: Define and easily manage business transaction service levels. This feature includes the definition of a business application or group of related business applications: The ability to define the Service Level Objectives (SLOs) for those business transactions Create different policies regarding the characteristics of business transaction execution such as how often they run, how much result data to keep, retry policy, etc. Monitor 24x7 the availability and performance of those business applications and be notified when an SLA breach occurs 13

The following screen shows an example of an SLA deviation. The transaction check_my_order crossed the defined SLA threshold while the other transactions are within the SLA objectives. 14

The next screen shows the different available policies for defining the characteristics of a business transaction execution. We can see many different policies like Storage policies, Scheduling policies, Assertion policies, Integration with ESM management platforms, each defining different criteria of behavior. 15

Health checks from multiple geographical locations. Availability, reliability and performance health checks should be conducted from multiple geographical locations as well as from inside and outside the firewall. Checks inside the firewall make sure that the application is available first to local users. Now we need to make sure that remote locations can access the application. Therefore, checks from different locations confirm that the application is accessible to users from that location. The default configuration is to run all checks from all locations. The product also offers flexibility through the use of policies to run certain transactions from certain locations or from all locations. A simple Dashboard screen that shows the Application Availability status from multiple geographical locations. Application by location status, meaning is the application available from different locations, is shown for different applications. The following screen shows in the NAME column the monitored application transactions. Each green or red square along the row represents the status of the transaction from a different monitored location. Pointing with the mouse on the location square shows the location name (USA in the screen shot example). 16

Clicking on a potentially problematic transaction provides more details on the problem, whether it s a network or protocol level error, content validation error, or a performance problem. The next screen shows the status of the transaction check_my_order from multiple locations and we can see that in two locations we have SLA breaches due to performance problems. 17

Assessment of the overall Accessibility, Reliability and Performance of the application. One of the features that Symantec Insight Inquire provides is an at-a-glance view of the accessibility, reliability, and performance of the application. In the following example we can see that everything in the time period is OK. We can also see the MTBF and MTTR metrics. 18

Accessibility, reliability and performance of the application. 19

Drill-down into the slow pages and page components in Web transactions. Symantec Insight Inquire provides the means to break a Web transaction into its pages and focus on the slow pages. The following example shows that the second page in the transaction check_my_order is causing the delay. A closer look at the problematic page shows that most of the time is spent in First Byte, meaning that is the time it takes for the Web infrastructure to serve the HTML source of the page, which means the delay is caused because of a long processing time at the server infrastructure. The server infrastructure is a complex multi-tier environment, comprising several tiers such as a Web server tier, J2EE application tier, and a database tier. 20

In order to get more insight into the components that cause the long response time, we can break the problematic page into its sub-components. The screen following shows such a breakdown. From the example we can see that the component /verify/orders/country/orders_list.jsp is causing the delay. It gives us a clue that the problem is in the J2EE application server or the database, but to get to the root cause of the problem we will need to use the other Symantec i 3 components, such as Symantec Indepth for Web or Symantec Indepth for J2EE, which are described in separate white papers. 21

Supporting a rich set of monitors. Symantec Insight Inquire supports a rich set of monitors. The monitors are divided into two main groups. The first is Web HTTP transactions and the second group is infrastructure monitors like J2EE EJB checks (WebSphere and WebLogic), Database checks (ODBC/JDBC), Network ICMP Ping, Middleware (MQ Series, etc.), UNIX and MS Windows OS CPU, Memory, Disk metrics, FTP, LDAP, SMTP, POP3, IMAP4, Radius and DNS. The following screen shot shows an example of the monitor selection. 22

Providing a firsthand resolution of the problem. Its large number of monitors enables Symantec Insight Inquire to check both the synthetic end-user transaction as well as different infrastructure components along the transaction path. In doing so, Symantec Insight Inquire provides a firsthand problem diagnostics tool. For example, when the application is unavailable Symantec Insight Inquire can issue a check to the database component and then to the J2EE component and to the Web and network components. This provides a health check of the different components when a failure occurs. For a deeper analysis the additional parts of Symantec i 3 are required. The next screen shows the definition of the diagnostics process and the tests to run, starting with Oracle and working backward. First Oracle availability is checked and if the synthetic SQL to Oracle is not able to execute, then Oracle is the suspect. The J2EE tier is then checked, then the Web server tier, and finally the network components. 23

Easy to install and configure. Symantec Insight Inquire comes with a set of policies that are easy to define and apply to all running applications and transactions. It is built in an objectoriented fashion so a new transaction or application added to the policy group automatically inherits the attributes and characteristics of the defined policy. Policies exist for different kinds of transaction execution behaviors, such as scheduling, storage results, assertions, retries, reporting, alerting, integration with ESM platforms, etc. Moreover, installing a new agent (POP) at a remote location is very simple. When a new agent is deployed at a remote location it inherits all the applications, transactions, and policy definitions and starts to run immediately. SUMMARY Web-based applications are an essential component of every business. Web-based applications are distributed, involve multiple tiers, and employ new technologies. Managing the availability of Web-based applications is challenging. Verifying that the right service levels are being met is even more difficult. Symantec Insight Inquire is an application availability management solution and a functional component of the broader Symantec i 3 solution. Symantec Insight Inquire enables checking application transaction availability, both from inside and outside the firewall and from multiple geographical locations. The solution simulates an end user, mimicking the end-user activity and testing for accessibility, content, and performance of Web applications. Symantec Insight Inquire allows IT organizations to take a proactive approach to application availability. Critical business transactions and service levels can be profiled and routinely monitored. Service Level Agreement (SLA) metrics can be easily established and proactively managed. As service levels are not met or as the performance of key business transactions begins to deteriorate, IT staffs are alerted of the problem before end users are affected. In order to drill down to the root cause of the problem, additional components of the Symantec i 3 suite should be used. Using Symantec i 3 helps companies manage service levels, contain the costs, maximize the efficiency of the operational investment, and improve the end-user experience. 24

About Symantec Symantec is the world leader in providing solutions to help individuals and enterprises assure the security, availability, and integrity of their information. Headquartered in Cupertino, Calif., Symantec has operations in more than 40 countries. More information is available at www.symantec.com. For specific country offices and contact numbers, please visit our Web site. For product information in the U.S., call toll-free 1 (800) 745 6054. Symantec Corporation World Headquarters 20330 Stevens Creek Boulevard Cupertino, CA 95014 USA 1 (408) 517 8000 1 (800) 721 3934 www.symantec.com Symantec and the Symantec logo are U.S. registered trademarks of Symantec Corporation. Indepth, i3, Veritas, and Insight are trademarks of Symantec Corporation. Any technical information that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation. NO WARRANTY. The technical information is being delivered to you as-is and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained herein is at the risk of the user. All other brand and product names are trademarks of their respective holder(s). Copyright 2006 Symantec Corporation. All rights reserved. Printed in the USA. 01/06 10534682