Premium Content

Access "Have service assurance tools finally come of age?"

Rivka Gewirtz Little, Senior Site Editor, TechTarget Published: 11 Dec 2012

Here’s a concept: Whether or not a specific link on your network is healthy is the least of your worries. In fact, service assurance (SA) vendors warn that networking is only a tiny fraction of what can go wrong behind an application, yet poor user experience still falls at least partially on the shoulders of the networking team. That’s where SA tools come in. SA tools monitor across IT infrastructure and report into a single console where the information can be analysed to track both the root cause behind poor application performance and troubled end-user experience. The idea is to take monitoring completely away from specific infrastructure elements, such as networks, storage, servers, virtual machines and databases, and instead examine the interdependencies among these systems. “The problem is not just the network or the servers; it’s that and everything in between,” said Steve Shalita, vice president of marketing at management and monitoring company NetScout. Multi-tiered applications, for example, depend on a collection of middleware, servers and ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • The next frontier for managed print services
    The-next-frontier-for-managed-print-services-(1361197877_756).jpg
    E-Handbook

    The managed print services (MPS) market has matured since many organisations inked their first deal. Organisations moving beyond first generation ...

  • World-Class EA: The Agile Enterprise
    World-Class-EA---The-Agile-Enterprise-(1360587978_371).jpg
    E-Handbook

    The concept of “agile” has recently come to the fore, typically in connection with technical activities, such as software development. Subsequently, ...

  • Security Visualisation
    Security-visualisation-(1358519141_684).jpg
    E-Handbook

    This article is guideline of how to generate a visual representation of a given dataset and use in the evaluation of known security vulnerabilities. ...