Onderwerpen  |   Branches  |   Afdelingen  |   Bedrijven  |   Aanleveren  |   FAQ  |   Nieuwsbrief  |   Contact
Whitepaper

CIO’s opgelet: de grote meerwaarde van Application Performance Monitoring

A CIO’s Guide: Building Business Trust with Application Performance Monitoring

Download CIO’s opgelet: de grote meerwaarde van Application Performance Monitoring

Terwijl bedrijven voortdurend nog afhankelijker worden van IT, blijft de verantwoordelijkheid van de CIO groeien. Analisten van Enterprise Management Associates (EMA) zijn voortdurend met CIO’s in dialoog over hun belangrijkste zorgen en uitdagingen. Deze whitepaper van EMA licht toe hoe Application Performance Monitoring (APM) organisaties een stevig fundament biedt voor het gebruik van innovatieve bedrijfskritische applicaties. Foglight APM van Quest heeft al duizenden bedrijven geholpen hun APM te versimpelen en daarmee zowel de prestaties als de gebruikerservaring van hun bedrijfskritische applicaties sterk te verbeteren.

Type
Whitepaper
Datum
februari 2013
Taal
EN
Bedrijf
Onderwerpen:
Afdelingen
Inhoudsopgave
  • Inleiding
  • De goede manier vinden
  • Gevaarlijke technologie transformeren tot zakelijke kansen
  • Innovatie maximaliseren en risico’s minimaliseren
  • Moderne applicaties en hun risico’s
  • Routekaart voor kwaliteit
  • Samenvatting
  • Over Quest Foglight APM
A CIO's Guide: Building Business Trust with Application Performance Monitoring An ENTERPRISE MANAGEMENT ASSOCIATES® (EMATM) White Paper Prepared for Quest Software April 2012 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING A CIO's Guide: Building Business Trust with Application Performance Monitoring Table of Contents Introduction ..........................................................................................................................................................1 Getting it Right .....................................................................................................................................................1 Transform Disruptive Technology into Business Opportunity .................................................................2 Maximizing Innovation while Minimizing Risk..............................................................................................2 Modern Applications and Risk ..........................................................................................................................3 Quality Roadmap ..................................................................................................................................................4 Summary ................................................................................................................................................................5 About Quest Foglight® APM ..........................................................................................................................5 ©2012 Enterprise Management Associates, Inc. All Rights Reserved. | www.enterprisemanagement.com A CIO's Guide: Building Business Trust with Application Performance Monitoring Introduction ENTERPRISE MANAGEMENT ASSOCIATES® (EMATM) analysts are in constant dialogue with CIOs and other high-level business executives about their top challenges and concerns. Although WKHLU VSHFLÀF FKDOOHQJHV FKDQJH ZLWK WKH WLPHV³FOHDUO FKDQJLQJ EXVLQHVV DQG HFRQRPLF IDFWRUV GULYH SULRULWLHV³WKH FDQ DOPRVW DOZDV EH JURXSHG DURXQG WKUHH NH IDFWRUV SHUVRQQHOVNLOOV EXVLQHVV HQDEOHPHQW DQG EXGJHWV ,Q WKH PRVW UHFHQW GLVFXVVLRQV (0$ ÀQGV WKDW &ORXG DQG PRELOH DUH WRGD·V ´KRW EXWWRQVµ $V RQH ,7 H[HFXWLYH QRWHV ´6XSSRUWLQJ WKHVH DSSOLFDWLRQV UHTXLUHV VNLOOV ZH GRQ·W KDYHµ $QRWKHU REVHUYHV WKDW ´(YHUWKLQJ LV FRQQHFWHG WR HYHUWKLQJ DQG WKLV LV LPSDFWLQJ RXU DELOLW WR HIIHFWLYHO VXSSRUW WKH EXVLQHVVµ 7R FRPSOLFDWH WKH UROH RI WKH &,2 (0$ LV DOVR ÀQGLQJ WKDW PDQDJHPHQW VROXWLRQV DYDLODEOH WR the typical IT organization often lack support for modern technologies. Mobile and application SHUIRUPDQFH PDQDJHPHQW IRU H[DPSOH DUH WKH WRS WZR GRPDLQV ZKLFK ,7 H[HFXWLYHV EHOLHYH DUH ´PRVW SRRUO DGGUHVVHG E FXUUHQW PDUNHW VROXWLRQVµ This EMA white paper highlights key steps that CIOs can take to ensure business relevance in this DJH RI GLVUXSWLYH WHFKQRORJLHV DQG HYROYLQJ ´EHVW SUDFWLFHVµ 7DNLQJ LQWR DFFRXQW WKH KLJK VWDNHV DQG FRPSOH[LWLHV VXUURXQGLQJ WKH GHOLYHU RI PRGHUQ DSSOLFDWLRQV (0$ VHHV OHDGLQJHGJH PDQDJHPHQW solutions as being a key to harnessing disruption to deliver business value. Application Performance Monitoring (APM) solutions provide a fundamental foundation for delivering KLJK TXDOLW PRGHUQ DSSOLFDWLRQV 7KH HQDEOH ,7 RUJDQL]DWLRQV WR FDSLWDOL]H RQ GLVUXSWLYH WHFKQRORJLHV E GHOLYHULQJ LQQRYDWLYH EXVLQHVVGLIIHUHQWLDWLQJ VHUYLFHV Getting it Right :KHQ LW FRPHV WR GHOLYHULQJ TXDOLW DSSOLFDWLRQV WKHUH DUH LQQXPHUDEOH RSSRUWXQLWLHV IRU IDLOXUH³ EXW OLPLWHG ZDV WR ´JHW LW ULJKWµ 7HFKQRORJ DQG KXPDQ IDFWRUV DUH LQWHUDFWLQJ LQ QHZ DQG XQIRUHVHHQ ZDV FUHDWLQJ D ZHDOWK RI QHZ EXVLQHVV RSSRUWXQLWLHV +RZHYHU IURP WKH &,2 SHUVSHFWLYH WDNLQJ DGYDQWDJH RI WKHVH RSSRUWXQLWLHV HQWDLOV VLJQLÀFDQW risk. CIOs put their reputations on the line for each new application UROORXW DQG FUHGLELOLW LV D GLIÀFXOW FRPPRGLW WR EXLOG DQG PDLQWDLQ LQ WRGD·V IDVWSDFHG WHFKQRORJ HQYLURQPHQW When it comes to delivering quality applications, there are innumerable opportunities for failure-- but limited ways to "get it right." 7KH FKDOOHQJHV DUH FRPSOLFDWHG DQG GLYHUVH 6WDNHKROGHUV FDQ³DQG GR³SXUFKDVH &ORXG VHUYLFHV ZLWK D FUHGLW FDUG (QG XVHUV DUH DFFXVWRPHG WR :$1RSWLPL]HG DFFHOHUDWHG FRQVXPHU VLWHV FUHDWLQJ high expectations for performance and availability. Applications and business services are increasingly GLVWULEXWHG DQG FRPSOH[ UHTXLULQJ FDGUHV RI ,7 VSHFLDOLVWV WR GHSOR DGPLQLVWHU DQG PDLQWDLQ $W WKH VDPH WLPH WKHUH LV DOZDV DQ HPSKDVLV RQ VWDIÀQJ HIÀFLHQF FRVW FXWWLQJ DQG ´GRLQJ PRUH ZLWK OHVVµ $GPLWWHGO WKH UROH RI WRGD·V &,2 LV H[FHSWLRQDOO GHPDQGLQJ 1HYHUWKHOHVV RSSRUWXQLWLHV IRU delivering extraordinary business value have never been more abundant. As a bridge between technology DQG EXVLQHVV DQG DV D WHFKQRORJ H[SHUW ZKR XQGHUVWDQGV EXVLQHVV GULYHUV WKH &,2 KDV WKH VNLOOV QHFHVVDU WR LGHQWLI QHZ WHFKQRORJHQDEOHG UHYHQXH VWUHDPV DQG FRVW HIÀFLHQFLHV 1 ©2012 Enterprise Management Associates, Inc. All Rights Reserved. | www.enterprisemanagement.com Page 1 A CIO's Guide: Building Business Trust with Application Performance Monitoring +RZHYHU LW LV GLIÀFXOW WR HDUQ WUXVW ZLWKRXW D WUDFN UHFRUG RI VXFFHVV DQG WKH &,2·V PRVW YLVLEOH DFKLHYHPHQW OLHV LQ WKH TXDOLW RI WKH VHUYLFHV GHOLYHUHG WR WKH EXVLQHVV ,Q WKH HQG LW LV WKHVH VHUYLFHV WKDW DUH WKH ´IDFH RI ,7µ WKH FOHDU OLQN EHWZHHQ ,7 DQG WKH EXVLQHVV )RU &,2V WR WDNH WKHLU ULJKWIXO SODFH DW WKH H[HFXWLYH WDEOH XVDELOLW SHUIRUPDQFH DQG DYDLODELOLW PXVW PHHW WKH H[SHFWDWLRQV RI RWKHU H[HFXWLYHV FXVWRPHUV DQG HQG XVHUV Transform Disruptive Technology into Business Opportunity *LYHQ WKH FRQIXVLRQ LQWURGXFHG LQWR WKH EXVLQHVV E ´KSH FFOHVµ DQG LQGXVWU QHZV VRXUFHV LW LV up to the CIO to decide which new technologies to adopt and which to ignore. Without judicious HYDOXDWLRQ E DQ H[SHUW LW LV IDU WRR HDV WR MXPS RQ WKH QH[W EDQGZDJRQ LQGXOJLQJ LQ ´FKDQJH IRU WKH VDNH RI FKDQJHµ $W WKH VDPH WLPH WDNLQJ DGYDQWDJH RI WUDQVIRUPDWLYH WHFKQRORJ FDQ EH WUHPHQGRXVO YDOXDEOH &ORXG DQG %LJ 'DWD IRU H[DPSOH DUH OLWHUDOO FKDQJLQJ WKH IDFH RI WKH EXVLQHVV &ORXG KDV HQDEOHG ,7 WR become more responsive by delivering new applications in days versus months. Big Data is enabling ERWK EXVLQHVV DQG ,7 OHDGHUVKLS WR PDNH EHWWHU PRUH WLPHO DQG PRUH EXVLQHVV UHOHYDQW GHFLVLRQV +RZHYHU ZKLOH HYROYLQJ WHFKQRORJLHV GULYH RSSRUWXQLW WKH DOVR KDYH WKH SRWHQWLDO WR FUHDWH IDOORXW WKDW XOWLPDWHO ODQGV RQ WKH &,2 2QH WUDYHOUHODWHG EXVLQHVV IRU H[DPSOH H[SHULHQFHG ´ORVWµ WUDQVDFWLRQV &XVWRPHUV LQVLVWHG WKH KDG PDGH D UHVHUYDWLRQ EXW ZKHQ WKH VKRZHG XS DW WKH FRXQWHU WKHUH ZDV QR UHFRUG WKDW WKH KDG GRQH VR $ KHDOWKFDUHUHODWHG FODLPV SURFHVVLQJ FRPSDQ UHSRUWHG ´ORVWµ FODLPV $OWKRXJK WKH FODLPV KDG EHHQ HOHFWURQLFDOO VHQW IRU SURFHVVLQJ WKH VLPSO ´GLVDSSHDUHGµ ,Q ERWK FDVHV WKH LVVXHV ZHUH UHODWHG WR DSSOLFDWLRQ DUFKLWHFWXUH DQG FRXOG KDYH EHHQ GHWHFWHG ZLWK DGHTXDWH WRROVHWV $QG LQ ERWK FDVHV &,2V XOWLPDWHO WRRN WKH EODPH IRU FXVWRPHU GLVVDWLVIDFWLRQ ,Q VKRUW ZKLOH HPEUDFLQJ OHDGLQJHGJH WHFKQRORJ FDQ LHOG VLJQLÀFDQW EXVLQHVV YDOXH LW DOVR HQJHQGHUV ULVN &,2V ZDON D WLJKW URSH EDODQFHG EHWZHHQ GHOLYHULQJ LQQRYDWLYH VHUYLFHV DQG DVVXULQJ VHUYLFH TXDOLW ,7 RUJDQL]DWLRQV WKDW DUH DGHSW DW VWULNLQJ WKLV EDODQFH DUH VDLG WR EH ´DJLOHµ DQG LQ WRGD·V HFRQRP ´DJLOLWµ FDQ PHDQ WKH GLIIHUHQFH EHWZHHQ VXFFHVV DQG IDLOXUH Maximizing Innovation while Minimizing Risk $XWRPDWHG PDQDJHPHQW VROXWLRQV DUH D YHU SRZHUIXO IDFWRU³SHUKDSV the PRVW SRZHUIXO IDFWRU³LQ HQVXULQJ WKDW WKLV EDODQFLQJ DFW KDV D SRVLWLYH RXWFRPH ,Q IDFW WKH IUHTXHQF RI FKDQJH FRPELQHG ZLWK WKH RYHUDOO FRPSOH[LW RI WRGD·V DSSOLFDWLRQ HQYLURQPHQWV OHDYHV YHU IHZ DOWHUQDWLYHV (YHQ ZLWK WKH EHVW SHRSOH DQG WKH PRVW URFNVROLG SURFHVVHV LQ SODFH SHRSOH DQG SURFHVV DORQH DUH VLPSO QR ORQJHU ´DJLOHµ HQRXJK WR HQVXUH KLJK OHYHOV RI VHUYLFH TXDOLW Even with the best people And while traditional monitoring systems may deliver component level YLVLELOLW LQIUDVWUXFWXUH PRQLWRULQJ DORQH LV LQDGHTXDWH IRU WUDFNLQJ HQGWRHQG SHUIRUPDQFH DYDLODELOLW DQG XVHU H[SHULHQFH IRU PRGHUQ DSSOLFDWLRQV /HDGLQJHGJH WHFKQRORJ UHTXLUHV OHDGLQJHGJH PDQDJHPHQW WRROV DQG PRGHUQ $30 VROXWLRQV FDQ UHGXFH DGPLQLVWUDWLYH VSHQG ZKLOH HQVXULQJ DSSOLFDWLRQ TXDOLW 7KH DOVR SURYLGH D ZD WR TXDQWLI DSSOLFDWLRQ GHOLYHU LQ ZDV WKDW EXVLQHVV VWDNHKROGHUV FDQ UHODWH WR .H 3HUIRUPDQFH ,QGLFDWRUV .3,V and the most rock-solid processes in place, people and process alone are simply no longer "agile" enough to ensure high levels of service quality. 2 ©2012 Enterprise Management Associates, Inc. All Rights Reserved. | www.enterprisemanagement.com Page 2 A CIO's Guide: Building Business Trust with Application Performance Monitoring IRU H[DPSOH FDQ EH UHODWHG WR IDFWRUV LPSDFWLQJ DXWRPDWHG EXVLQHVV SURFHVVHV 0HDQ 7LPH 7R 5HSDLU 0775 UHSRUWLQJ FDQ TXDQWLI FRQWLQXRXV VHUYLFH LPSURYHPHQWV DV GHÀQHG E WKH ,7 ,QIUDVWUXFWXUH /LEUDU ,7,/ 'HFUHDVHV LQ VKRSSLQJ FDUW DEDQGRQPHQW UDWHV FDQ EH UHODWHG WR VDOHV ÀJXUHV DQG TXDQWLILQJ UHVSRQVH WLPH GHOLYHUHG WR HQG XVHUV FDQ SURYLGH ´SURRI µ RI 4XDOLW RI 6HUYLFH 4R6 % GHPRQVWUDWLQJ WKDW KH RU VKH LV LQ FRQWURO RI WKH DSSOLFDWLRQ GHOLYHU FFOH WKH &,2 HDUQV FUHGLELOLW These tools also supplement the skills available within the IT organization. Virtually every IT Maturity Model stresses judicious use of automation to supplement IT skills and processes. The Control Objectives for Information and related Technology (COBIT® IRU H[DPSOH SURYLGH JXLGHOLQHV IRU ,7 DXGLWRUV 7KH GHÀQH WKH KLJKHVW OHYHO RI RSHUDWLRQDO PDWXULW /HYHO LQ SDUW DV IROORZV ´,QWHUQDO FRQWURO DQG ULVN PDQDJHPHQW DUH LQWHJUDWHG ZLWK HQWHUSULVH SUDFWLFHV VXSSRUWHG ZLWK automated realtime monitoring«µ1 ,Q RWKHU ZRUGV ZLWKLQ PDWXULW IUDPHZRUNV DXWRPDWHG UHDOWLPH PDQDJHPHQW VROXWLRQV DUH D SUHUHTXLVLWH IRU UHGXFLQJ ULVN DQG XOWLPDWHO IRU DFKLHYLQJ RSHUDWLRQDO H[FHOOHQFH Modern Applications and Risk 'XH WR WKH FRPSOH[LW RI PRGHUQ DSSOLFDWLRQV DQG WKH ULVN IDFWRUV WKLV FRPSOH[LW HQJHQGHUV WKH ´ULJKWµ PDQDJHPHQW WRROV DUH PRUH LPSRUWDQW WKDQ HYHU EHIRUH :KLOH PDQ ,7 RUJDQL]DWLRQV DUH VWLOO WULQJ WR PDQDJH DSSOLFDWLRQV E PRQLWRULQJ LQIUDVWUXFWXUH PRGHUQ LQWHJUDWHG DSSOLFDWLRQV KDYH IDU more potential failure points than legacy applications. $ FRQVROLGDWHG ´WRS GRZQµ ´ERWWRP XSµ DQG LQWHJUDWLRQDZDUH YLHZ RI DSSOLFDWLRQ SHUIRUPDQFH LV WKH KDOOPDUN RI $30 VROXWLRQV &RUUHODWLRQ DFURVV LQIUDVWUXFWXUH PHWULFV ´ERWWRP XSµ LQWHJUDWLRQ SRLQWV DQG WUDQVDFWLRQ PHWULFV ´WRS GRZQµ GHOLYHUV D ´UHDO ZRUOGµ YLHZ RI WKH DSSOLFDWLRQ DV LW UHODWHV to supporting infrastructure. Leading APM solutions (see Figure 1) ensure that information about all RI WKHVH HOHPHQWV LV FDSWXUHG FRUUHODWHG DQG DQDO]HG 7KH SHUIRUP WKHVH DFWLRQV LQ QHDU UHDOWLPH D UHTXLUHPHQW QRWHG LQ WKH &2%,7 GHÀQLWLRQ DERYH D IHDW WKDW FDQ·W EH GXSOLFDWHG E KXPDQ RSHUDWRUV no matter how skilled they are. Figure 1: Multiple Capabilities Support Full-Featured APM Toolsets 1 COBIT 4.1, IT Governance Institute, available at: https://www.isaca.org (parentheses are by the author) Page 3 3 ©2012 Enterprise Management Associates, Inc. All Rights Reserved. | www.enterprisemanagement.com A CIO's Guide: Building Business Trust with Application Performance Monitoring $GGLWLRQDO EHQHÀWV RI $30 VROXWLRQV LQFOXGH 7KH TXDQWLI WKH TXDOLW RI WKH DSSOLFDWLRQ GHOLYHUHG WR WKH XVHU They encapsulate world-class APM expertise which supplements skill sets already in place within IT. 7KH PD[LPL]H WKH XWLOL]DWLRQ RI SHUVRQQHO E UHGXFLQJ WLPH VSHQW LQ ´DOO KDQGV RQ GHFNµ troubleshooting exercises. 7KH KHOS EULGJH RSHUDWLRQDO VLORV DQRWKHU LQGXVWU EHVW SUDFWLFH WKDW HQDEOHV FURVVIXQFWLRQDO WHDPV WR ZRUN WRJHWKHU PRUH HIÀFLHQWO WR VROYH DSSOLFDWLRQUHODWHG SUREOHPV They help optimize facilities costs and mitigate environmental factors by identifying opportunities IRU YLUWXDOL]DWLRQ DQG ´ULJKWVL]LQJµ 6LQFH OHVV PDQSRZHU LV UHTXLUHG IRU GDWRGD VXSSRUW &,2V FDQ UHIRFXV WKH HIIRUWV RI ,7 personnel from support to innovation. Quality Roadmap The ability to earn the trust of the business is an essential skill for every H[HFXWLYH EXW SDUWLFXODUO IRU WKH &,2 7KH &,2·V VNLOO VHW VSDQV EXVLQHVV WHFKQRORJ DQG SROLWLFV DQG KLV RU KHU VXFFHVV KDV D VWURQJ FRUUHODWLRQ with the value of the services delivered by the IT organization. And while best practice frameworks such as ITIL and COBIT embody the FROOHFWLYH ´OHVVRQV OHDUQHGµ RI WKH LQGXVWU RYHU WLPH WKH DELOLW WR LQVSLUH WUXVW JRHV EHRQG WUDGLWLRQDO ´URDGPDSVµ ,W DOVR UHTXLUHV WKH WHFKQLFDO H[SHUWLVH H[SHULHQFH DQG DGDSWDELOLW WKDW HQDEOH WKH H[HFXWLYH WR EXLOG D YLVLRQ WKDW LQVSLUHV KLVKHU VWDII WR GHOLYHU WR WKDW YLVLRQ Factors that contribute to trust building and operational excellence can EH JURXSHG DW D KLJK OHYHO LQWR IRXU NH FDSDELOLWLHV While best practice frameworks such as ITIL and COBIT embody the collective "lessons learned" of the industry over time, the ability to inspire trust goes beyond traditional "roadmaps." People: High performing IT organizations are adept at selecting personnel who combine a high GHJUHH RI WHFKQLFDO DFXPHQ ZLWK JRRG SHRSOH VNLOOV 'HOLYHULQJ DSSOLFDWLRQV LV D WHDP VSRUW QRW DQ LQGLYLGXDO RQH 6XSSRUWLQJ HQGWRHQG VHUYLFHV UHTXLUHV WKDW ,7 VSHFLDOLVWV WUDQVFHQG VLORV WR YLHZ WKH ´VHUYLFHµ WKH GHOLYHU DV WKH VDPH ´VHUYLFHµ WKDW LV H[SHULHQFHG E WKH HQG XVHU :RUNLQJ FURVVIXQFWLRQDOO LV D NH UHTXLUHPHQW DV LV HPEUDFLQJ D FRPPRQ FXVWRPHUFHQWULF YLVLRQ Process: 3URFHVVHV VKRXOG EH IRUPDOL]HG DQG GRFXPHQWHG EXW DV OLJKWZHLJKW DV SRVVLEOH 7KH VKRXOG VXSSRUW WKH RUJDQL]DWLRQDO YLVLRQ DQG SURPRWH EXVLQHVV DOLJQPHQW DQG UHSHDWDEOH SUHGLFWDEOH RXWFRPHV 3URFHVVHV DORQJ ZLWK VXSSRUWLQJ WHFKQRORJ VKRXOG DOVR VHUYH DV D XQLILQJ factor across silos. Technology: Leading-edge APM solutions provide the basis for improving cross-functional FROODERUDWLRQ EHWZHHQ GHYHORSPHQW DQG RSHUDWLRQV ´'HY2SVµ WHDPV $1' EHWZHHQ VLOR technology teams. Tools should be selected with this outcome in mind. Leadership: 2SHUDWLRQDO H[FHOOHQFH GRHVQ·W KDSSHQ LQ D YDFXXP DQG WKH &,2·V OHDGHUVKLS SDV RII ZLWK D ZLGH YDULHW RI EHQHÀWV 7KH LQFOXGH FRVW DQG VWDII RSWLPL]DWLRQ SURWHFWLRQ RI WDQJLEOH DQG LQWDQJLEOH EXVLQHVV DVVHWV LH EUDQG FXVWRPHU VDWLVIDFWLRQ VXSSOLHUSDUWQHU VDWLVIDFWLRQ HWF FRPSHWLWLYH GLIIHUHQWLDWLRQ DQG WKH DELOLW WR DSSO WKH ´ULJKWµ WHFKQRORJ WR WKH ´ULJKWµ EXVLQHVVWHFKQRORJ SUREOHP 4 ©2012 Enterprise Management Associates, Inc. All Rights Reserved. | www.enterprisemanagement.com Page 4 A CIO's Guide: Building Business Trust with Application Performance Monitoring Summary ,Q VXPPDU $30 LQYHVWPHQWV DUH IXQGDPHQWDO WR EXLOGLQJ WUXVW 7KH SURPRWH WKH GHOLYHU RI TXDOLW VHUYLFHV DQG KHOS WKH ,7 RUJDQL]DWLRQ to build a track record of operational excellence. They provide a basis for positive outcomes because they encapsulate world-class expertise. 7KH DOVR EULQJ WRJHWKHU WKH SHRSOH SURFHVV DQG WHFKQRORJ DVSHFWV of operational maturity with an end-to-end perspective on critical services and applications. EMA analysts see Application Performance 0RQLWRULQJ DV LQFUHDVLQJO EXVLQHVV FULWLFDO SDUWLFXODUO DV WKH SDFH RI FKDQJH LQWHQVLÀHV DQG WKH UHOLDQFH RQ ,7 VHUYLFHV FRQWLQXHV WR HVFDODWH EMA analysts see Application Performance Monitoring as increasingly business critical, particularly as the pace of change LQWHQVL¿HV DQG WKH reliance on IT services continues to escalate. About Quest Foglight® APM :LWK WKHLU VWURQJ JUDVS RI DQ RUJDQL]DWLRQ·V HQGWRHQG SURFHVVHV &,2V DUH XQLTXHO SRVLWLRQHG WR profoundly alter the value a business offers to its customers. Transformational IT leaders possess WKH DELOLW WR LQÁXHQFH WKHLU RUJDQL]DWLRQ·V XVH RI WHFKQRORJ LQ ZDV WKDW KHOS EXVLQHVV FXVWRPHUV FRQWLQXRXVO DGDSW WR FKDQJLQJ PDUNHW QHHGV )RJOLJKW RXU LQGXVWUOHDGLQJ DSSOLFDWLRQ SHUIRUPDQFH PRQLWRULQJ VROXWLRQ KDV KHOSHG WKRXVDQGV RI FRPSDQLHV VLPSOLI $30 HOLPLQDWH EXVLQHVVLPSDFWLQJ SHUIRUPDQFH LVVXHV DQG SURYLGH WKH PHWULFV WR IRUHFDVW FKDQJHV QHHGHG WR VXSSRUW VKLIWV LQ WKH market. Leading organizations all over the globe use Foglight to manage business-critical application SHUIRUPDQFH DQG HQG XVHU H[SHULHQFH DFURVV WKH HQWLUH DSSOLFDWLRQ VWDFN )RU PRUH LQIRUPDWLRQ YLVLW ZZZTXHVWFRPVLPSOLI$30. About Enterprise Management Associates, Inc. )RXQGHG LQ (QWHUSULVH 0DQDJHPHQW $VVRFLDWHV (0$ LV D OHDGLQJ LQGXVWU DQDOVW ÀUP WKDW SURYLGHV GHHS LQVLJKW DFURVV WKH IXOO VSHFWUXP RI ,7 DQG GDWD PDQDJHPHQW WHFKQRORJLHV (0$ DQDOVWV OHYHUDJH D XQLTXH FRPELQDWLRQ RI SUDFWLFDO H[SHULHQFH LQVLJKW LQWR LQGXVWU EHVW SUDFWLFHV DQG LQGHSWK NQRZOHGJH RI FXUUHQW DQG SODQQHG YHQGRU VROXWLRQV WR KHOS LWV FOLHQWV DFKLHYH WKHLU JRDOV /HDUQ PRUH DERXW (0$ UHVHDUFK DQDOVLV DQG FRQVXOWLQJ VHUYLFHV IRU HQWHUSULVH OLQH RI EXVLQHVV XVHUV ,7 SURIHVVLRQDOV DQG ,7 YHQGRUV DW www.enterprisemanagement.com or blogs.enterprisemanagement.com. You can also follow EMA on Twitter or Facebook. 7KLV UHSRUW LQ ZKROH RU LQ SDUW PD QRW EH GXSOLFDWHG UHSURGXFHG VWRUHG LQ D UHWULHYDO VVWHP RU UHWUDQVPLWWHG ZLWKRXW SULRU ZULWWHQ SHUPLVVLRQ RI (QWHUSULVH 0DQDJHPHQW $VVRFLDWHV ,QF $OO RSLQLRQV DQG HVWLPDWHV KHUHLQ FRQVWLWXWH RXU MXGJHPHQW DV RI WKLV GDWH DQG DUH VXEMHFW WR FKDQJH ZLWKRXW QRWLFH 3URGXFW QDPHV PHQWLRQHG KHUHLQ PD EH WUDGHPDUNV DQGRU UHJLVWHUHG WUDGHPDUNV RI WKHLU UHVSHFWLYH FRPSDQLHV ´(0$µ DQG ´(QWHUSULVH 0DQDJHPHQW $VVRFLDWHVµ DUH WUDGHPDUNV RI (QWHUSULVH 0DQDJHPHQW $VVRFLDWHV ,QF LQ WKH 8QLWHG 6WDWHV DQG RWKHU FRXQWULHV (QWHUSULVH 0DQDJHPHQW $VVRFLDWHV ,QF $OO 5LJKWV 5HVHUYHG (0$ (17(535,6( 0$1$*(0(17 $662&,$7(6® DQG WKH PRELXV VPERO DUH UHJLVWHUHG WUDGHPDUNV RU FRPPRQODZ WUDGHPDUNV RI (QWHUSULVH 0DQDJHPHQW $VVRFLDWHV ,QF Corporate Headquarters: &HQWUDO $YHQXH 6XLWH %RXOGHU &2 3KRQH )D[ www.enterprisemanagement.com 2449.032912 5 ©2012 Enterprise Management Associates, Inc. All Rights Reserved. | www.enterprisemanagement.com Page 5