SlideShare a Scribd company logo
1 of 32
Download to read offline
Five Best Practices for
Application-aware Network Performance
Management (AANPM) in 2014
March 26, 2014
Jim Frey
VP of Research
Enterprise Management Associates
@jfrey80
Doug Roberts
Managing Director Product
Strategy
Fluke Networks
Today’s Presenters
Slide 2 © 2014 Enterprise Management Associates, Inc.
Jim Frey
Vice President of Research, Network Management
Jim has over 25 years of experience in the computing industry
developing, deploying, managing, and marketing software and
hardware products, with the last 20 of those years spent in network
and infrastructure management, straddling both enterprise and
service provider sectors.
Doug Roberts
Managing Director Product Strategy
Doug has worked in the IT industry for over 18 years in various
business development, product management and innovation roles.
Currently he oversees the product strategy across enterprise, cloud
and service provider landscapes.
Five Best Practices for
Application-aware Network Performance
Management (AANPM) in 2014
March 26, 2014
Jim Frey
VP of Research
Enterprise Management Associates
@jfrey80
Agenda
• What is AANPM?
• Fluke Networks AANPM Vision and Solution
• Five Best Practices
• Embrace Multiple Data Sources
• Aim for Full Coverage and Visibility
• Address All Three Primary Use Cases
• Incorporate All Application Types
• Collaborate, Collaborate, Collaborate
• Wrap-up and Key Takeaways
• Q&A
Slide 4 © 2014 Enterprise Management Associates, Inc.
Application-Aware Network Performance
Management (AANPM) Defined
• Ties network performance/health to what the
organization/business consumes most directly
• Supports services-oriented shifts in broader IT
Operations
• Performance Visibility/Monitoring continuum:
• NPM – network (infrastructure) performance
monitoring
• AANPM – App-Aware network performance
monitoring
• APM – Application performance monitoring
Slide 5 © 2013 Enterprise Management Associates, Inc.
Application/Service Visibility from the Network Perspective
DATA CENTER
WANREMOTE SITE
Authenticate
Call Manager
Secure WEB
CITRIX
App Delivery
Controller
App Delivery
Controller
APP
APP
APP
SQL Cluster
Oracle Cluster
Core Switch
Branch
User
Firewall
Firewall
Remote
User
Mobile
User
Branch Router PE Router
PE Router
Wireless
User
What Problem Are We Solving?
DATA CENTER
WANREMOTE SITE
Authenticate
Call Manager
Secure WEB
CITRIX
App Delivery
Controller
App Delivery
Controller
APP
APP
APP
SQL Cluster
Oracle Cluster
Core Switch
Branch
User
Firewall
Firewall
Remote
User
Mobile
User
Branch Router PE Router
PE Router
Wireless
User
The Network
is Slow!
What Problem Are We Solving?
DATA CENTER
WANREMOTE SITE
Authenticate
Call Manager
Secure WEB
CITRIX
App Delivery
Controller
App Delivery
Controller
APP
APP
APP
SQL Cluster
Oracle Cluster
Core Switch
Branch
User
Firewall
Firewall
Remote
User
Mobile
User
Branch Router PE Router
PE Router
Wireless
User
The Network
is Slow!
What Problem Are We Solving?
DATA CENTER
WANREMOTE SITE
Authenticate
Call Manager
Secure WEB
CITRIX
App Delivery
Controller
App Delivery
Controller
APP
APP
APP
SQL Cluster
Oracle Cluster
Core Switch
Branch
User
Firewall
Firewall
Remote
User
Call Signaling
Success/Fail?
Mobile
User
Branch Router PE Router
PE Router
Is the firewall
blocking something?
Is the user load being
properly distributed?
Is the application
server responding?
Is it the XenApp
tier or a backend
issue?
Is the web server
over-loaded?
Did they authenticate
successfully?
Is the site
congested?
Could be a carrier
problem?
Maybe QoS/CoS is
mis-configured?
Are logs
showing
any errors?
Wireless
User
Wireless
Interference?
Switch fabric
overloaded?
Is the firewall
blocking something?
The Network
is Slow!
What Problem Are We Solving?
DATA CENTER
WANREMOTE SITE
Authenticate
Call Manager
Secure WEB
CITRIX
App Delivery
Controller
App Delivery
Controller
APP
APP
APP
SQL Cluster
Oracle Cluster
Core Switch
Branch
User
Firewall
Firewall
Remote
User
Call Signaling
Success/Fail?
WHERE DO YOU BEGIN?
Mobile
User
Branch Router PE Router
PE Router
Is the firewall
blocking something?
Is the user load being
properly distributed?
Is the application
server responding?
Is it the XenApp
tier or a backend
issue?
Is the web server
over-loaded?
Did they authenticate
successfully?
Is the site
congested?
Could be a carrier
problem?
Maybe QoS/CoS is
mis-configured?
Are logs
showing
any errors?
Wireless
User
Wireless
Interference?
Switch fabric
overloaded?
Is the firewall
blocking something?
The Network
is Slow!
What Problem Are We Solving?
A Unified Network and Application Performance
Troubleshooting Appliance That Solves Problems FAST!
Simple
• Racked to reporting in <15 minutes
• Auto-discovery and configuration
• Intuitive web interface
Intelligent
• Self-learning baselines
• Time correlated views
• Guided workflows
Complete
• Monitoring and Troubleshooting
• Network and Application
• Packets, Flows, SNMP, Active Test
Introducing Visual TruView
Monitoring and Alerting:
 Dashboards and dynamic thresholds
 End-user experience reporting
 All sites, all users, all transactions, all the time
Triage:
 Determine scope and impact
 Drill-down into specific domain
 Isolate to Network Device, Server/VM,
or Application Transaction
Troubleshooting:
 Leverage rich forensic data
 Drill into individual components
 Event re-construction & replay
1
2
3
End-to-End Visibility, Simplified!
Five Best Practices for AANPM
© 2013 Enterprise Management Associates, Inc.
AANPM Best Practices #1:
Embrace Multiple Data Sources
Primary AANPM Data Sources
• Network packets
• Flow records
Supplemental Sources
• Synthetic testing
• Log file analysis
• SNMP
Slide 14 © 2013 Enterprise Management Associates, Inc.
The more information you are able to include, the more
accurate your understanding will be…
A Unified Network and Application Performance
Troubleshooting Appliance That Solves Problems FAST!
Simple
• Racked to reporting in <15 minutes
• Auto-discovery and configuration
• Intuitive web interface
Intelligent
• Self-learning baselines
• Time correlated views
• Guided workflows
Complete
• Monitoring and Troubleshooting
• Network and Application
• Packets, Flows, SNMP, Active Test
Remember this slide?
16
Flow
SNMP
Packets
Active
Test
Why This is important!
Any Region, Site, Server, Application, User, Device…
Packets or
Active Test
SNMP
Flow
How it works in real-life
AANPM Best Practice #2:
Aim for Full Coverage and Visibility
Slide 18 © 2013 Enterprise Management Associates, Inc.
The broader your instrumentation, the more complete your
view will be…
Visibility Starts in the Datacenter, but problems
can also be rooted in…
1. Internet Access/Paths
2. Wide Area Networks
3. Campus LAN
4. Remote Site LAN
5. And don’t forget….
Virtual Networks
End-to-End
• End-to-End Visibility: A TRUE single appliance approach for complete End-to-
end network based application performance monitoring and troubleshooting.
• Self Guided Workflows: Workflows that are patterned after logical
troubleshooting thought processes.
• TruView Stores Everything: 10Gbps line rate ensures that you will NEVER
miss an important event again.
19
End
Every vendor promises this,
but few deliver!
End-to-End
• End-to-End Visibility: A TRUE single appliance approach for complete End-to-
end network based application performance monitoring and troubleshooting.
• Self Guided Workflows: Workflows that are patterned after logical
troubleshooting thought processes.
• TruView Stores Everything: 10Gbps line rate ensures that you will NEVER
miss an important event again.
20
End
Every vendor promises this,
but few deliver!
LAN / BYOD
One Click Path Analysis
CPU
Memory
Usage
I/O
L2 Stats
Response Time
Virtual Traffic Visibility
AANPM Best Practice #3:
Address All Three Use Cases
Common/driving use cases for ANPM technology
1. Capacity planning
 Understand usage drivers
2. Sustained monitoring
 Recognize users, apps
3. Troubleshooting
 Definitive diagnostics
Slide 23 © 2013 Enterprise Management Associates, Inc.
AANPM solutions that can serve more than one purpose
improve cost and work efficiency…
Network Capacity Planning
Individual Site/Interface
breakdown of burst utilization &
associate
application/conversation traffic
Enterprise-Wide view of both site
& interface utilization with burst
analysis & time spent over 30%,
60%, & 80%
Sustained Monitoring  Troubleshooting
AANPM Best Practice #4:
Incorporate All Application Types
Slide 26 © 2013 Enterprise Management Associates, Inc.
Diversity is the rule – Make sure you can cover all the bases!
Common Application/Service Types
1. Web/Secure Web
2. Email/Collaboration
3. Network Services
4. Custom Applications
5. VoIP
6. Video
VoIP & Unified Communications
In the cloud for the cloud
SaaS
Hosted VoIP
AANPM Best Practice #5:
Collaborate, Collaborate, Collaborate
Slide 29 © 2013 Enterprise Management Associates, Inc.
The true value of AANPM insights are best realized when
shared across the organization…
Important Techniques for Sharing AANPM
Operational Intelligence
1. Performance Alarm Forwarding
2. Constituent-based Reporting
3. Shared Consoles
Common Platform & Services
Configuration Baselining Analytics Alarming Notification
Visual TruView
Event Life-Cycle
Management
Executive
Dashboard
CMDB
Configuration
Management
Connex Web Services
Key EMA Takeaways – AANPM Best Practices
• AANPM a must-have for today’s networking teams
• Include all relevant/supportive data sets
• Cover the entire infrastructure – not just the
datacenter
• Consider AANPM solutions that can cover multiple
needs – for better cost and workflow efficiencies
• Make sure your AANPM tools can accommodate all
apps and services in your mix
• Share the gathered intelligence for maximum
positive results
Slide 31 © 2013 Enterprise Management Associates, Inc.
Q&A – Please Log Questions in the Q&A Panel
Slide 32 © 2014 Enterprise Management Associates, Inc.
Learn more about Fluke Networks AANPM solution at:
www.flukenetworks.com/aanpm

More Related Content

What's hot

Choosing a Desktop Virtualization (VDI) Partner
Choosing a Desktop Virtualization (VDI) Partner Choosing a Desktop Virtualization (VDI) Partner
Choosing a Desktop Virtualization (VDI) Partner AnuntaTech
 
Presentation riverbed steelhead appliance main 2010
Presentation   riverbed steelhead appliance main 2010Presentation   riverbed steelhead appliance main 2010
Presentation riverbed steelhead appliance main 2010chanwitcs
 
Sangfor wano v5.0 presentation
Sangfor wano v5.0 presentationSangfor wano v5.0 presentation
Sangfor wano v5.0 presentationAdvanced comm
 
Ensuring the compliance, resiliency, and availability of business-critical ne...
Ensuring the compliance, resiliency, and availability of business-critical ne...Ensuring the compliance, resiliency, and availability of business-critical ne...
Ensuring the compliance, resiliency, and availability of business-critical ne...Riverbed Technology
 
Take Control of Application Performance
Take Control of Application PerformanceTake Control of Application Performance
Take Control of Application PerformanceRiverbed Technology
 
The Need for Unified Performance Management
The Need for Unified Performance ManagementThe Need for Unified Performance Management
The Need for Unified Performance ManagementRiverbed Technology
 
Why and How to Monitor App Performance in Azure
Why and How to Monitor App Performance in AzureWhy and How to Monitor App Performance in Azure
Why and How to Monitor App Performance in AzureIan Downard
 
Riverbed at Microsoft TechEd 2014
Riverbed at Microsoft TechEd 2014Riverbed at Microsoft TechEd 2014
Riverbed at Microsoft TechEd 2014Riverbed Technology
 
Delivering Enterprise Applications: Faster. Cheaper. Better
Delivering Enterprise Applications: Faster. Cheaper. BetterDelivering Enterprise Applications: Faster. Cheaper. Better
Delivering Enterprise Applications: Faster. Cheaper. BetterProlifics
 
SteelCentral Portal Take the War Out of the War Room
SteelCentral Portal Take the War Out of the War RoomSteelCentral Portal Take the War Out of the War Room
SteelCentral Portal Take the War Out of the War RoomRiverbed Technology
 
Riverbed Performance Management
Riverbed Performance ManagementRiverbed Performance Management
Riverbed Performance ManagementCTI Group
 
OpenTechSummit InterConnect2015 DevOps
OpenTechSummit InterConnect2015 DevOpsOpenTechSummit InterConnect2015 DevOps
OpenTechSummit InterConnect2015 DevOpsSanjeev Sharma
 
Riverbed SteelCentral AppResponse 9.0 NetProfiler and NetShark 10.6
Riverbed SteelCentral AppResponse 9.0 NetProfiler and NetShark 10.6Riverbed SteelCentral AppResponse 9.0 NetProfiler and NetShark 10.6
Riverbed SteelCentral AppResponse 9.0 NetProfiler and NetShark 10.6Riverbed Technology
 
Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?Riverbed Technology
 
Mobile to Mainframe - En-to-end transformation
Mobile to Mainframe - En-to-end transformationMobile to Mainframe - En-to-end transformation
Mobile to Mainframe - En-to-end transformationSanjeev Sharma
 

What's hot (20)

Sangfor presentation new world new it
Sangfor presentation   new world new itSangfor presentation   new world new it
Sangfor presentation new world new it
 
Choosing a Desktop Virtualization (VDI) Partner
Choosing a Desktop Virtualization (VDI) Partner Choosing a Desktop Virtualization (VDI) Partner
Choosing a Desktop Virtualization (VDI) Partner
 
Presentation riverbed steelhead appliance main 2010
Presentation   riverbed steelhead appliance main 2010Presentation   riverbed steelhead appliance main 2010
Presentation riverbed steelhead appliance main 2010
 
Sangfor wano v5.0 presentation
Sangfor wano v5.0 presentationSangfor wano v5.0 presentation
Sangfor wano v5.0 presentation
 
Cascade
CascadeCascade
Cascade
 
Ensuring the compliance, resiliency, and availability of business-critical ne...
Ensuring the compliance, resiliency, and availability of business-critical ne...Ensuring the compliance, resiliency, and availability of business-critical ne...
Ensuring the compliance, resiliency, and availability of business-critical ne...
 
Take Control of Application Performance
Take Control of Application PerformanceTake Control of Application Performance
Take Control of Application Performance
 
The Need for Unified Performance Management
The Need for Unified Performance ManagementThe Need for Unified Performance Management
The Need for Unified Performance Management
 
Why and How to Monitor App Performance in Azure
Why and How to Monitor App Performance in AzureWhy and How to Monitor App Performance in Azure
Why and How to Monitor App Performance in Azure
 
Riverbed at Microsoft TechEd 2014
Riverbed at Microsoft TechEd 2014Riverbed at Microsoft TechEd 2014
Riverbed at Microsoft TechEd 2014
 
Delivering Enterprise Applications: Faster. Cheaper. Better
Delivering Enterprise Applications: Faster. Cheaper. BetterDelivering Enterprise Applications: Faster. Cheaper. Better
Delivering Enterprise Applications: Faster. Cheaper. Better
 
soc
socsoc
soc
 
Cloud Provider Matching
Cloud Provider MatchingCloud Provider Matching
Cloud Provider Matching
 
SteelCentral Portal Take the War Out of the War Room
SteelCentral Portal Take the War Out of the War RoomSteelCentral Portal Take the War Out of the War Room
SteelCentral Portal Take the War Out of the War Room
 
Riverbed Performance Management
Riverbed Performance ManagementRiverbed Performance Management
Riverbed Performance Management
 
OpenTechSummit InterConnect2015 DevOps
OpenTechSummit InterConnect2015 DevOpsOpenTechSummit InterConnect2015 DevOps
OpenTechSummit InterConnect2015 DevOps
 
Riverbed SteelCentral AppResponse 9.0 NetProfiler and NetShark 10.6
Riverbed SteelCentral AppResponse 9.0 NetProfiler and NetShark 10.6Riverbed SteelCentral AppResponse 9.0 NetProfiler and NetShark 10.6
Riverbed SteelCentral AppResponse 9.0 NetProfiler and NetShark 10.6
 
Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?
 
Mobile to Mainframe - En-to-end transformation
Mobile to Mainframe - En-to-end transformationMobile to Mainframe - En-to-end transformation
Mobile to Mainframe - En-to-end transformation
 
Cybernetyx introduction
Cybernetyx introductionCybernetyx introduction
Cybernetyx introduction
 

Viewers also liked

Virtually Speaking: Leading Distributed Test Teams
Virtually Speaking: Leading Distributed Test TeamsVirtually Speaking: Leading Distributed Test Teams
Virtually Speaking: Leading Distributed Test TeamsTechWell
 
MOVIMIENTO ARTÍSTICO 4050
MOVIMIENTO ARTÍSTICO 4050MOVIMIENTO ARTÍSTICO 4050
MOVIMIENTO ARTÍSTICO 4050Miranda Llama
 
Comment augmenter son volume d'admission dans les écoles privés ?
Comment augmenter son volume d'admission dans les écoles privés ?Comment augmenter son volume d'admission dans les écoles privés ?
Comment augmenter son volume d'admission dans les écoles privés ?Thibaut Bourgon
 
1pre_engineered_building_system
1pre_engineered_building_system1pre_engineered_building_system
1pre_engineered_building_systemManju natha
 
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint DataAchieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint DataEnterprise Management Associates
 
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...Enterprise Management Associates
 
procomunidad blog
procomunidad blogprocomunidad blog
procomunidad blograul andres
 
Sulphonamides: A Pharmaceutical Review
Sulphonamides: A Pharmaceutical ReviewSulphonamides: A Pharmaceutical Review
Sulphonamides: A Pharmaceutical Reviewinventionjournals
 
நல்ல போர்ச்சேவகன்
நல்ல போர்ச்சேவகன்நல்ல போர்ச்சேவகன்
நல்ல போர்ச்சேவகன்jesussoldierindia
 
Trabajo fina CRM y mkt relacional
Trabajo fina CRM y mkt relacionalTrabajo fina CRM y mkt relacional
Trabajo fina CRM y mkt relacionalKelly Silva
 

Viewers also liked (18)

Virtually Speaking: Leading Distributed Test Teams
Virtually Speaking: Leading Distributed Test TeamsVirtually Speaking: Leading Distributed Test Teams
Virtually Speaking: Leading Distributed Test Teams
 
MOVIMIENTO ARTÍSTICO 4050
MOVIMIENTO ARTÍSTICO 4050MOVIMIENTO ARTÍSTICO 4050
MOVIMIENTO ARTÍSTICO 4050
 
69177635 autocad-2
69177635 autocad-269177635 autocad-2
69177635 autocad-2
 
Comment augmenter son volume d'admission dans les écoles privés ?
Comment augmenter son volume d'admission dans les écoles privés ?Comment augmenter son volume d'admission dans les écoles privés ?
Comment augmenter son volume d'admission dans les écoles privés ?
 
El Artesan@
El Artesan@El Artesan@
El Artesan@
 
Fiesta de Amely
Fiesta de AmelyFiesta de Amely
Fiesta de Amely
 
1pre_engineered_building_system
1pre_engineered_building_system1pre_engineered_building_system
1pre_engineered_building_system
 
Mirada a la Crisis
Mirada a la CrisisMirada a la Crisis
Mirada a la Crisis
 
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint DataAchieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
 
Open access and Big Data
Open access and Big DataOpen access and Big Data
Open access and Big Data
 
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
 
procomunidad blog
procomunidad blogprocomunidad blog
procomunidad blog
 
PBC Marketing Presentation
PBC Marketing Presentation  PBC Marketing Presentation
PBC Marketing Presentation
 
Sulphonamides: A Pharmaceutical Review
Sulphonamides: A Pharmaceutical ReviewSulphonamides: A Pharmaceutical Review
Sulphonamides: A Pharmaceutical Review
 
நல்ல போர்ச்சேவகன்
நல்ல போர்ச்சேவகன்நல்ல போர்ச்சேவகன்
நல்ல போர்ச்சேவகன்
 
Medikonda_CRM_PM
Medikonda_CRM_PMMedikonda_CRM_PM
Medikonda_CRM_PM
 
Trabajo fina CRM y mkt relacional
Trabajo fina CRM y mkt relacionalTrabajo fina CRM y mkt relacional
Trabajo fina CRM y mkt relacional
 
Traumatorax
TraumatoraxTraumatorax
Traumatorax
 

Similar to 5 Best Practices for Application-aware Network Performance Management (AANPM) in 2014

Best Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility ArchitecturesBest Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility ArchitecturesEnterprise Management Associates
 
How to stop fingerpointing when your application is down
How to stop fingerpointing when your application is downHow to stop fingerpointing when your application is down
How to stop fingerpointing when your application is downCompuware ASEAN
 
ManageEngine - Forrester Webinar: Maximize your application performance to en...
ManageEngine - Forrester Webinar: Maximize your application performance to en...ManageEngine - Forrester Webinar: Maximize your application performance to en...
ManageEngine - Forrester Webinar: Maximize your application performance to en...ManageEngine
 
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfImprove_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfمنیزہ ہاشمی
 
Encontrando la Aguja en el Rendimiento de Aplicaciones
Encontrando la Aguja en el Rendimiento de AplicacionesEncontrando la Aguja en el Rendimiento de Aplicaciones
Encontrando la Aguja en el Rendimiento de AplicacionesSoftware Guru
 
Accelerate Cloud Migrations - Introduction to PaaSLane
Accelerate Cloud Migrations - Introduction to PaaSLaneAccelerate Cloud Migrations - Introduction to PaaSLane
Accelerate Cloud Migrations - Introduction to PaaSLaneBenjamin Grubin
 
Mobile app users will decide the fate of your business—it’s time to impress t...
Mobile app users will decide the fate of your business—it’s time to impress t...Mobile app users will decide the fate of your business—it’s time to impress t...
Mobile app users will decide the fate of your business—it’s time to impress t...CA Technologies
 
Pure App + Patterns + Prolifics = Feeding Change
Pure App + Patterns + Prolifics = Feeding Change Pure App + Patterns + Prolifics = Feeding Change
Pure App + Patterns + Prolifics = Feeding Change Prolifics
 
T3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of ExcellenceT3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of Excellenceveehikle
 
PureApp Presentation
PureApp PresentationPureApp Presentation
PureApp PresentationProlifics
 
DevOps in the Hybrid Cloud
DevOps in the Hybrid CloudDevOps in the Hybrid Cloud
DevOps in the Hybrid CloudRichard Irving
 
Performance Testing: Putting Cloud Customers Back in the Driver’s Seat
Performance Testing:  Putting Cloud Customers Back in the Driver’s SeatPerformance Testing:  Putting Cloud Customers Back in the Driver’s Seat
Performance Testing: Putting Cloud Customers Back in the Driver’s SeatCompuware APM
 
Devops Indonesia Presentation Monitoring Framework
Devops Indonesia Presentation Monitoring FrameworkDevops Indonesia Presentation Monitoring Framework
Devops Indonesia Presentation Monitoring FrameworkYusuf Hadiwinata Sutandar
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloudtcarrucan
 
CIO Event - Info vista - Application Transformation
CIO Event - Info vista - Application TransformationCIO Event - Info vista - Application Transformation
CIO Event - Info vista - Application TransformationGlobal Business Intel
 
Monitoring in the DevOps Era
Monitoring in the DevOps EraMonitoring in the DevOps Era
Monitoring in the DevOps EraMike Kavis
 
SplunkLive! Frankfurt 2018 - Monitoring the End User Experience with Splunk
SplunkLive! Frankfurt 2018 - Monitoring the End User Experience with SplunkSplunkLive! Frankfurt 2018 - Monitoring the End User Experience with Splunk
SplunkLive! Frankfurt 2018 - Monitoring the End User Experience with SplunkSplunk
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
IBM i Application Lifecycle Management with Remain Software
IBM i Application Lifecycle Management with Remain SoftwareIBM i Application Lifecycle Management with Remain Software
IBM i Application Lifecycle Management with Remain SoftwareRemain Software
 
Troubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyesTroubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyesThousandEyes
 

Similar to 5 Best Practices for Application-aware Network Performance Management (AANPM) in 2014 (20)

Best Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility ArchitecturesBest Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility Architectures
 
How to stop fingerpointing when your application is down
How to stop fingerpointing when your application is downHow to stop fingerpointing when your application is down
How to stop fingerpointing when your application is down
 
ManageEngine - Forrester Webinar: Maximize your application performance to en...
ManageEngine - Forrester Webinar: Maximize your application performance to en...ManageEngine - Forrester Webinar: Maximize your application performance to en...
ManageEngine - Forrester Webinar: Maximize your application performance to en...
 
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfImprove_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
 
Encontrando la Aguja en el Rendimiento de Aplicaciones
Encontrando la Aguja en el Rendimiento de AplicacionesEncontrando la Aguja en el Rendimiento de Aplicaciones
Encontrando la Aguja en el Rendimiento de Aplicaciones
 
Accelerate Cloud Migrations - Introduction to PaaSLane
Accelerate Cloud Migrations - Introduction to PaaSLaneAccelerate Cloud Migrations - Introduction to PaaSLane
Accelerate Cloud Migrations - Introduction to PaaSLane
 
Mobile app users will decide the fate of your business—it’s time to impress t...
Mobile app users will decide the fate of your business—it’s time to impress t...Mobile app users will decide the fate of your business—it’s time to impress t...
Mobile app users will decide the fate of your business—it’s time to impress t...
 
Pure App + Patterns + Prolifics = Feeding Change
Pure App + Patterns + Prolifics = Feeding Change Pure App + Patterns + Prolifics = Feeding Change
Pure App + Patterns + Prolifics = Feeding Change
 
T3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of ExcellenceT3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of Excellence
 
PureApp Presentation
PureApp PresentationPureApp Presentation
PureApp Presentation
 
DevOps in the Hybrid Cloud
DevOps in the Hybrid CloudDevOps in the Hybrid Cloud
DevOps in the Hybrid Cloud
 
Performance Testing: Putting Cloud Customers Back in the Driver’s Seat
Performance Testing:  Putting Cloud Customers Back in the Driver’s SeatPerformance Testing:  Putting Cloud Customers Back in the Driver’s Seat
Performance Testing: Putting Cloud Customers Back in the Driver’s Seat
 
Devops Indonesia Presentation Monitoring Framework
Devops Indonesia Presentation Monitoring FrameworkDevops Indonesia Presentation Monitoring Framework
Devops Indonesia Presentation Monitoring Framework
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
CIO Event - Info vista - Application Transformation
CIO Event - Info vista - Application TransformationCIO Event - Info vista - Application Transformation
CIO Event - Info vista - Application Transformation
 
Monitoring in the DevOps Era
Monitoring in the DevOps EraMonitoring in the DevOps Era
Monitoring in the DevOps Era
 
SplunkLive! Frankfurt 2018 - Monitoring the End User Experience with Splunk
SplunkLive! Frankfurt 2018 - Monitoring the End User Experience with SplunkSplunkLive! Frankfurt 2018 - Monitoring the End User Experience with Splunk
SplunkLive! Frankfurt 2018 - Monitoring the End User Experience with Splunk
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
IBM i Application Lifecycle Management with Remain Software
IBM i Application Lifecycle Management with Remain SoftwareIBM i Application Lifecycle Management with Remain Software
IBM i Application Lifecycle Management with Remain Software
 
Troubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyesTroubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyes
 

More from Enterprise Management Associates

Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryEnterprise Management Associates
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...Enterprise Management Associates
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsEnterprise Management Associates
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...Enterprise Management Associates
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Enterprise Management Associates
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Enterprise Management Associates
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityEnterprise Management Associates
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesEnterprise Management Associates
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...Enterprise Management Associates
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Enterprise Management Associates
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Enterprise Management Associates
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Enterprise Management Associates
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessEnterprise Management Associates
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...Enterprise Management Associates
 
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...Enterprise Management Associates
 

More from Enterprise Management Associates (20)

Real-world incident response, management, and prevention
Real-world incident response, management, and preventionReal-world incident response, management, and prevention
Real-world incident response, management, and prevention
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizations
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
 
Transcending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in AuthenticationTranscending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in Authentication
 
Modernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network MonitoringModernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network Monitoring
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...
 
CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
 
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
 

Recently uploaded

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Recently uploaded (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

5 Best Practices for Application-aware Network Performance Management (AANPM) in 2014

  • 1. Five Best Practices for Application-aware Network Performance Management (AANPM) in 2014 March 26, 2014 Jim Frey VP of Research Enterprise Management Associates @jfrey80 Doug Roberts Managing Director Product Strategy Fluke Networks
  • 2. Today’s Presenters Slide 2 © 2014 Enterprise Management Associates, Inc. Jim Frey Vice President of Research, Network Management Jim has over 25 years of experience in the computing industry developing, deploying, managing, and marketing software and hardware products, with the last 20 of those years spent in network and infrastructure management, straddling both enterprise and service provider sectors. Doug Roberts Managing Director Product Strategy Doug has worked in the IT industry for over 18 years in various business development, product management and innovation roles. Currently he oversees the product strategy across enterprise, cloud and service provider landscapes.
  • 3. Five Best Practices for Application-aware Network Performance Management (AANPM) in 2014 March 26, 2014 Jim Frey VP of Research Enterprise Management Associates @jfrey80
  • 4. Agenda • What is AANPM? • Fluke Networks AANPM Vision and Solution • Five Best Practices • Embrace Multiple Data Sources • Aim for Full Coverage and Visibility • Address All Three Primary Use Cases • Incorporate All Application Types • Collaborate, Collaborate, Collaborate • Wrap-up and Key Takeaways • Q&A Slide 4 © 2014 Enterprise Management Associates, Inc.
  • 5. Application-Aware Network Performance Management (AANPM) Defined • Ties network performance/health to what the organization/business consumes most directly • Supports services-oriented shifts in broader IT Operations • Performance Visibility/Monitoring continuum: • NPM – network (infrastructure) performance monitoring • AANPM – App-Aware network performance monitoring • APM – Application performance monitoring Slide 5 © 2013 Enterprise Management Associates, Inc. Application/Service Visibility from the Network Perspective
  • 6. DATA CENTER WANREMOTE SITE Authenticate Call Manager Secure WEB CITRIX App Delivery Controller App Delivery Controller APP APP APP SQL Cluster Oracle Cluster Core Switch Branch User Firewall Firewall Remote User Mobile User Branch Router PE Router PE Router Wireless User What Problem Are We Solving?
  • 7. DATA CENTER WANREMOTE SITE Authenticate Call Manager Secure WEB CITRIX App Delivery Controller App Delivery Controller APP APP APP SQL Cluster Oracle Cluster Core Switch Branch User Firewall Firewall Remote User Mobile User Branch Router PE Router PE Router Wireless User The Network is Slow! What Problem Are We Solving?
  • 8. DATA CENTER WANREMOTE SITE Authenticate Call Manager Secure WEB CITRIX App Delivery Controller App Delivery Controller APP APP APP SQL Cluster Oracle Cluster Core Switch Branch User Firewall Firewall Remote User Mobile User Branch Router PE Router PE Router Wireless User The Network is Slow! What Problem Are We Solving?
  • 9. DATA CENTER WANREMOTE SITE Authenticate Call Manager Secure WEB CITRIX App Delivery Controller App Delivery Controller APP APP APP SQL Cluster Oracle Cluster Core Switch Branch User Firewall Firewall Remote User Call Signaling Success/Fail? Mobile User Branch Router PE Router PE Router Is the firewall blocking something? Is the user load being properly distributed? Is the application server responding? Is it the XenApp tier or a backend issue? Is the web server over-loaded? Did they authenticate successfully? Is the site congested? Could be a carrier problem? Maybe QoS/CoS is mis-configured? Are logs showing any errors? Wireless User Wireless Interference? Switch fabric overloaded? Is the firewall blocking something? The Network is Slow! What Problem Are We Solving?
  • 10. DATA CENTER WANREMOTE SITE Authenticate Call Manager Secure WEB CITRIX App Delivery Controller App Delivery Controller APP APP APP SQL Cluster Oracle Cluster Core Switch Branch User Firewall Firewall Remote User Call Signaling Success/Fail? WHERE DO YOU BEGIN? Mobile User Branch Router PE Router PE Router Is the firewall blocking something? Is the user load being properly distributed? Is the application server responding? Is it the XenApp tier or a backend issue? Is the web server over-loaded? Did they authenticate successfully? Is the site congested? Could be a carrier problem? Maybe QoS/CoS is mis-configured? Are logs showing any errors? Wireless User Wireless Interference? Switch fabric overloaded? Is the firewall blocking something? The Network is Slow! What Problem Are We Solving?
  • 11. A Unified Network and Application Performance Troubleshooting Appliance That Solves Problems FAST! Simple • Racked to reporting in <15 minutes • Auto-discovery and configuration • Intuitive web interface Intelligent • Self-learning baselines • Time correlated views • Guided workflows Complete • Monitoring and Troubleshooting • Network and Application • Packets, Flows, SNMP, Active Test Introducing Visual TruView
  • 12. Monitoring and Alerting:  Dashboards and dynamic thresholds  End-user experience reporting  All sites, all users, all transactions, all the time Triage:  Determine scope and impact  Drill-down into specific domain  Isolate to Network Device, Server/VM, or Application Transaction Troubleshooting:  Leverage rich forensic data  Drill into individual components  Event re-construction & replay 1 2 3 End-to-End Visibility, Simplified!
  • 13. Five Best Practices for AANPM © 2013 Enterprise Management Associates, Inc.
  • 14. AANPM Best Practices #1: Embrace Multiple Data Sources Primary AANPM Data Sources • Network packets • Flow records Supplemental Sources • Synthetic testing • Log file analysis • SNMP Slide 14 © 2013 Enterprise Management Associates, Inc. The more information you are able to include, the more accurate your understanding will be…
  • 15. A Unified Network and Application Performance Troubleshooting Appliance That Solves Problems FAST! Simple • Racked to reporting in <15 minutes • Auto-discovery and configuration • Intuitive web interface Intelligent • Self-learning baselines • Time correlated views • Guided workflows Complete • Monitoring and Troubleshooting • Network and Application • Packets, Flows, SNMP, Active Test Remember this slide?
  • 17. Any Region, Site, Server, Application, User, Device… Packets or Active Test SNMP Flow How it works in real-life
  • 18. AANPM Best Practice #2: Aim for Full Coverage and Visibility Slide 18 © 2013 Enterprise Management Associates, Inc. The broader your instrumentation, the more complete your view will be… Visibility Starts in the Datacenter, but problems can also be rooted in… 1. Internet Access/Paths 2. Wide Area Networks 3. Campus LAN 4. Remote Site LAN 5. And don’t forget…. Virtual Networks
  • 19. End-to-End • End-to-End Visibility: A TRUE single appliance approach for complete End-to- end network based application performance monitoring and troubleshooting. • Self Guided Workflows: Workflows that are patterned after logical troubleshooting thought processes. • TruView Stores Everything: 10Gbps line rate ensures that you will NEVER miss an important event again. 19 End Every vendor promises this, but few deliver!
  • 20. End-to-End • End-to-End Visibility: A TRUE single appliance approach for complete End-to- end network based application performance monitoring and troubleshooting. • Self Guided Workflows: Workflows that are patterned after logical troubleshooting thought processes. • TruView Stores Everything: 10Gbps line rate ensures that you will NEVER miss an important event again. 20 End Every vendor promises this, but few deliver! LAN / BYOD
  • 21. One Click Path Analysis CPU Memory Usage I/O L2 Stats Response Time
  • 23. AANPM Best Practice #3: Address All Three Use Cases Common/driving use cases for ANPM technology 1. Capacity planning  Understand usage drivers 2. Sustained monitoring  Recognize users, apps 3. Troubleshooting  Definitive diagnostics Slide 23 © 2013 Enterprise Management Associates, Inc. AANPM solutions that can serve more than one purpose improve cost and work efficiency…
  • 24. Network Capacity Planning Individual Site/Interface breakdown of burst utilization & associate application/conversation traffic Enterprise-Wide view of both site & interface utilization with burst analysis & time spent over 30%, 60%, & 80%
  • 25. Sustained Monitoring  Troubleshooting
  • 26. AANPM Best Practice #4: Incorporate All Application Types Slide 26 © 2013 Enterprise Management Associates, Inc. Diversity is the rule – Make sure you can cover all the bases! Common Application/Service Types 1. Web/Secure Web 2. Email/Collaboration 3. Network Services 4. Custom Applications 5. VoIP 6. Video
  • 27. VoIP & Unified Communications
  • 28. In the cloud for the cloud SaaS Hosted VoIP
  • 29. AANPM Best Practice #5: Collaborate, Collaborate, Collaborate Slide 29 © 2013 Enterprise Management Associates, Inc. The true value of AANPM insights are best realized when shared across the organization… Important Techniques for Sharing AANPM Operational Intelligence 1. Performance Alarm Forwarding 2. Constituent-based Reporting 3. Shared Consoles
  • 30. Common Platform & Services Configuration Baselining Analytics Alarming Notification Visual TruView Event Life-Cycle Management Executive Dashboard CMDB Configuration Management Connex Web Services
  • 31. Key EMA Takeaways – AANPM Best Practices • AANPM a must-have for today’s networking teams • Include all relevant/supportive data sets • Cover the entire infrastructure – not just the datacenter • Consider AANPM solutions that can cover multiple needs – for better cost and workflow efficiencies • Make sure your AANPM tools can accommodate all apps and services in your mix • Share the gathered intelligence for maximum positive results Slide 31 © 2013 Enterprise Management Associates, Inc.
  • 32. Q&A – Please Log Questions in the Q&A Panel Slide 32 © 2014 Enterprise Management Associates, Inc. Learn more about Fluke Networks AANPM solution at: www.flukenetworks.com/aanpm