Selection Requirements for Business Activity Monitoring Tools



Similar documents
Deliver Process-Driven Business Intelligence With a Balanced BI Platform

Security and Identity Management Auditing Converge

How to Develop an Effective Vulnerability Management Process

2010 FEI Technology Study: CPM and BI Show Improvement From 2009

Key Issues for Data Management and Integration, 2006

Research. Identity and Access Management Defined

The Five Competencies of MRM 'Re-' Defined

Overcoming the Gap Between Business Intelligence and Decision Support

Real-Time Decisions Need Corporate Performance Management

Key Issues for Identity and Access Management, 2008

Gartner Updates Its Definition of IT Infrastructure Utility

Business Intelligence Focus Shifts From Tactical to Strategic

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities

Research Agenda and Key Issues for Converged Infrastructure, 2006

Business Intelligence Platform Usage and Quality Dynamics, 2008

Five Business Drivers of Identity and Access Management

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products

Research. Mastering Master Data Management

Gartner's Business Intelligence and Performance Management Framework

How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing

Use This Eight-Step Process for Identity and Access Management Audit and Compliance

Discovering the Value of Unified Communications

The Current State of Agile Method Adoption

Organizations Must Employ Effective Data Security Strategies

Key Issues for Business Intelligence and Performance Management Initiatives, 2008

CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance

The What, Why and When of Cloud Computing

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process

Best Practices for Confirming Software Inventories in Software Asset Management

Eight Critical Forces Shape Enterprise Data Center Strategies

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle

Governance Is an Essential Building Block for Enterprise Information Management

The Six Triggers for Using Data Center Infrastructure Management Tools

Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.

Toolkit: Reduce Dependence on Desk-Side Support Technicians

Gartner Defines Enterprise Information Architecture

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users

The Seven Building Blocks of MDM: A Framework for Success

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.

Consider Identity and Access Management as a Process, Not a Technology

How BPM Can Enhance the Eight Building Blocks of CRM

GARTNER EXP CIO TOOLKIT: THE FIRST 100 DAYS. Executive Summary

IT Operational Considerations for Cloud Computing

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption

Now Is the Time for Security at the Application Level

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.

Q&A: The Many Aspects of Private Cloud Computing

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud

The Growing Role of Events in Enterprise Applications

Data in the Cloud: The Changing Nature of Managing Data Delivery

Roundup of Business Intelligence and Information Management Research, 1Q08

IT asset management (ITAM) will proliferate in midsize and large companies.

The Four New Ps of Marketing That CMOs and CIOs Should Consider

Risk Intelligence: Applying KM to Information Risk Management

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools

Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost

Managing IT Risks During Cost-Cutting Periods

Recognize the Importance of Digital Marketing

Transactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes.

The Next Generation of Functionality for Marketing Resource Management

Cloud, SaaS, Hosting and Other Off-Premises Computing Models

Organizational Structure: Business Intelligence and Information Management

An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success

Cloud IaaS: Service-Level Agreements

Gartner Clarifies the Definition of the Term 'Enterprise Architecture'

Gartner's View on 'Bring Your Own' in Client Computing

IT Architecture Is Not Enterprise Architecture

Agenda for Supply Chain Strategy and Enablers, 2012

Make the maturity model part of the effort to educate senior management, so they understand the phases of the EIM journey.

Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality

Understanding Vulnerability Management Life Cycle Functions

Tips for Evaluators: Better Business Intelligence RFPs

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity

Private Cloud Computing: An Essential Overview

Repurposing Old PCs as Thin Clients as a Way to Save Money

Singapore Empowers Land Transport Planners With Data Warehouse

Government 2.0 is both citizen-driven and employee-centric, and is both transformational and evolutionary.

Transcription:

Research Publication Date: 13 May 2005 ID Number: G00126563 Selection Requirements for Business Activity Monitoring Tools Bill Gassman When evaluating business activity monitoring product alternatives, focus on the features that distribute alerts and display business indicators, the analytic engine that generates the information and the mechanisms to collect business events. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.

WHAT YOU NEED TO KNOW Business activity monitoring requires a basic set of functionality, but competition is driving providers to offer advanced features. When comparing products, use this decision framework to break down the alternatives by architectural level and evaluate the need and availability of basic vs. advanced features. ANALYSIS Along with the increased availability of products for business activity monitoring (BAM) come many features from which to choose. Although the purpose of BAM technology is to provide business users with real-time access to, and analysis about, important business indicators, the level of sophistication in the solution can widely vary. The output of a BAM application may be a simple e-mail message, or BAM may be the underlying technology for a complex operational decision support system. The analysis underlying a BAM application may use simple threshold comparisons, or it may incorporate standard deviation monitoring, complex event processing and pattern matching. The requirements for sophistication are driven by how complicated the business indicators are to obtain and monitor, what analysis is involved in delivering the information, and the decisions and actions that will be driven by the insight delivered. As with many software projects, budget, skills and motivation also determine what is selected. BAM functionality is based on a relatively simple architecture. Alerts and frequently updated displays are driven by a processing and analytic engine that is supplied with a stream of events that is received or collected from a variety of sources working in real time. When evaluating products, it is easier to use an architectural approach to understand the value of available alternatives. Use the architectural breakdown and description of basic and advanced criteria in this research as evaluation guidelines. They do not include every feature on the market. The evaluation criteria are based on: Gartner's view of how BAM capabilities will develop Discussions with BAM technology providers Client requirements Depending on its target market, a BAM solution does not have to support every feature listed here, but it must address the general requirements and each the basic features of four architectural categories: Delivery and display Processing and analysis Operational databases Event collection, filtering and transformation General Requirements A system to monitor business activity will likely: Publication Date: 13 May 2005/ID Number: G00126563 Page 2 of 6

Require continuous operation Support mission-critical business functions Operate in a fault-tolerant mode Make configuration changes during operation Retain context during restarts Have enough instrumentation so that its health can be monitored with self-contained operations and maintenance tools, or managed with an IT operations framework In addition, security requirements, ideally through integration with an enterprisewide security model, are applicable at each architectural layer. Vendor requirements for viability and support are dependent on how long the solution will be deployed and the urgency and complexity of the business problem being addressed. Delivery and Display Although the degree of sophistication in a BAM system lies in its ability to process and analyze events, the value is exhibited in the timeliness, accuracy and context of alerts. To get the most value out of a BAM product, users need a degree of visual delight, usability, perception of performance and at least task-level integration with other applications. Most BAM systems offer a console with a thick, thin or rich Web client to show key business indicators and manage alerts. A separate mechanism to deliver alerts is commonly included. Alerts can be consumed by people, drive scripted actions or be sent to other event-driven applications. A visually intuitive dashboard that updates in real time and can be personalized Delivery of alerts in multiple formats e-mail, instant message, icon-tray, Short Message Service (SMS) or pager with support of Extensible Markup Language (XML) formatting User-controlled filtering and reporting of alerts, and setting the scope of what is monitored Scripting tool to accomplish simple actions based on the context of an alert Web links in alerts that point to detailed drill-down information (internal or external to the BAM system) Guided decision support with suggested actions and resolutions Support for links to unstructured information, such as policies, contracts and manuals Embedded business intelligence functions for historical reporting and analytic tasks Collaboration tools to share views of situations and discuss actions Knowledge-capture features to record situations, actions taken and results Search capability through events, captured knowledge and rules Publication Date: 13 May 2005/ID Number: G00126563 Page 3 of 6

Incident life cycle management system to prioritize, assign, forward, escalate and close alerts A rule editor and activation utility that is easy to use by a broad user base, such as dragand-drop definition and wizard-driven actions A design utility to build custom dashboards with standards-based portal support Dashboards and reports tailored to vertical-industry-specific jargon, tasks and best practices Delivery of alerts to integration brokers, with transformation to specified event formats Processing and Analysis Processing and analysis are the core of a BAM system. They determine the system's sophistication, and these capabilities are important to establishing trust with users that the critical business indicators are being monitored correctly. Scope and scale are the key issues. Scope is determined by the type of rules that are supported and the ability to obtain and maintain historical context. Scale is important, because processing and analysis must keep up with a rapid stream of events with little latency between significant incidents and emergence of results. Continuous-flow rule engine that processes each event that has successfully passed through the event-filtering and transformation layer Library of analytic functions, such as static and dynamic thresholds, absolute values, duration, coincidence, frequency, statistical balance and rate of change Discrete and aggregated metric analysis Complex event processing rules can be nested and based on a sequence of events Support of forecast analytic models and rules that trigger on forecast changes Packages of metrics and rules that are tailored for a vertical-industry solution Use of scripting tools to verify situations before issuing alerts and add external data context before delivery Captured event replay to enable analysis and debugging; detect correlations; and model, simulate and optimize rules Compliance features to examine metadata for rules, including source, modification log (who, what and when), times activated and deactivated, how often invoked and how often triggered Complex event-processing rule development environment Integration with external rule engines Security to restrict access to sensitive data and rules based on profiles Operational Databases Publication Date: 13 May 2005/ID Number: G00126563 Page 4 of 6

Several databases may be required in a BAM system. A real-time operational database is used to maintain the state of metrics and business indicators, and as temporary storage for intermediary results of complex rules. Additional historical databases may be present for auditing purposes. High performance, which may be delivered through in-memory databases Persistence to maintain context across application restarts Derived, abstracted and aggregated metrics support, with immediate update as root metrics are changed analogous to spreadsheet function Maintenance functions to age and archive data that is no longer required The ability to easily implement changes to the schema of the event-driven operational database Federated query support to enable a single query by a scripted action to obtain data from multiple sources Historical storage of basic and derived metrics state changes and values to provide context for rules and alert drill-down Event Collection, Filtering and Transformation The analytic engine is fed by a stream of raw events. The source of events can be passive or active. Passive collection is accomplished through integration broker subscriptions, listening daemons or Web services, and provides the least latency with the lowest overhead. Active collection uses scripts or remote software agents that are associated with the BAM system to poll for information and look for changes, then generate an event that represents the change. Validation and augmentation of incoming events to ensure data quality and add contextual information, such as the source and a time stamp Event cleansing, such as sequencing and consolidating duplicates High-performance design that queues event streams until they can be processed Library of adapters to event sources, such as message brokers Change data capture agents for databases and event logs Polling engines for data acquisition Configuration of collection agents to acquire what is needed and filter what is not Screen scrapers to gather information from applications Web page data capture of unstructured information Development tools to build adapters as required Publication Date: 13 May 2005/ID Number: G00126563 Page 5 of 6

Event-profiling utility to aid in building transformations Transformation functions, such as data type conversion, string manipulation, calculations, lookup and replace, and aggregations Prepackaged adapters and transformation routines for specific vertical applications, such as retail point of sale or healthcare diagnostic systems Key Issues What evaluation criteria should IT managers consider for business activity monitoring systems? Acronym Key BAM SMS XML business activity monitoring Short Message Service Extensible Markup Language REGIONAL HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT 06902-7700 U.S.A. +1 203 964 0096 European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM +44 1784 431611 Asia/Pacific Headquarters Level 7, 40 Miller Street North Sydney New South Wales 2060 AUSTRALIA +61 2 9459 4600 Latin America Headquarters Av. das Nações Unidas 12.551 9 andar WTC 04578-903 São Paulo SP BRAZIL +55 11 3443 1509 Publication Date: 13 May 2005/ID Number: G00126563 Page 6 of 6