INETCO Insight 5.3 Launches Into Hot APM Market
According to Gartner, APM has become a central focus for IT operations, and growth in spend continues while the market evolves rapidly. Gartner estimated that the global spend for APM software was $2.14 billion in 2012, 9 percent growth from the $2 billion spent in 2011. Infighting among key players is not uncommon as competition heats up. For instance, in April, CA sued AppDynamics for patent infringement. CA said it is seeking undisclosed damages for lost profits and legal costs and an injunction against AppDynamics prohibiting the infringement of CA Technologies patents and the misuse of the company's intellectual property. The complaint alleges that AppDynamics, founded by Jyoti Bansal, a former CA Technologies and Wily Technology employee, infringes three important CA Technologies APM patents. CA Technologies took ownership of key APM patents, including the three described in the complaint, when the company acquired Wily Technology in 2006 for $375 million. Meanwhile, in addition to INETCO's May 29 announcement, Dell, on May 28, announced the release of Foglight APM 5.9. And earlier this month, Compuware introduced an APM-as-a-service offering.Foglight APM links all application layer traces back to the end user, creating a single customer-centric transaction model that provides IT with actionable information to help them better understand and manage the technology. With its Transaction DNA technology, the new release of Foglight APM can also facilitate improved collaboration between IT operations and developers, Dell Software officials said. The Transaction DNA technology unifies disparate data sources under a common business-oriented framework, enabling the two groups to work on the same problem as a team to resolve it quickly. "Foglight APM 5.9 represents a significant breakthrough in collaborative customer-centric APM, with user behavior monitoring, end-to-end transaction analysis, and contextual forensics that provide critical insight for both IT and the business," John Newsom, executive director of application performance monitoring at Dell Software, said in a statement. "The best measure of application delivery is the end-user experience, and Foglight APM offers a more dynamic, real-time, transaction-centric view of the entire application, including every aspect of every end-user interaction. With Foglight, application support teams can see the exact end-user experience, and isolate problems to application code within the browser or on the application server, external third-party service calls, the application infrastructure, or anywhere else in the execution path." Foglight APM combines data collected from both the network and within the browser to continuously report on 100 percent of user session activity, including performance breakdown and errors, navigation timing and keyboard/mouse events. It also features a Transaction Trace Repository for storage and analysis of high-volume, high-granularity data. This repository is designed to address the big data problem in APM by capturing all performance and content details for every click by every Web user. A turnkey appliance provides a single point of management and scales to support the largest user volumes with security and compliance adherence. "We chose Foglight to monitor and replay the experience of users interacting with our Web applications, and have been thrilled with the results," Hoang Nguyen, vice president of applications at LQ Management, which operates La Quinta Inns, said in a statement. "With Foglight, we are able to identify transactions that could affect our revenue or customer confidence. We look forward to becoming even more proactive with the new customer-centric approach and Transaction DNA technology in Foglight APM 5.9."
Foglight APM allows IT to see every step of a transaction for a complete picture of the end user's experience with an application. The software also provides users with the exact execution path of an application and other details through the entire application stack from the code and middleware, all the way down through the operating system and hypervisor.