SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
Finding Application Problems
Before they Impact Users
____________________________________________________________________________________________________________

CA Application Performance Management
Aruna Ravichandran
Vice President, Product and Solution Marketing
APM and DevOps
CA Technologies
2/25/14

© 2014 CA. All rights reserved.
What has APM got to do with Water???

Water Pressure
This is similar to
infrastructure
monitoring

Water Quality
This is similar to
application quality

Both have to viewed
concurrently
CA looks at EVERYTHING
that touches the
application

2

© 2014 CA. All rights reserved.
APM Domains
Off- Premise
End-User
Analysis

Application-Delivery
Analysis
Measures the
performance of
the delivery of the
application over
Multi-Variant
the Network and
Analytics
Servers

End-User
Analysis
Measures
performance
from the
perspective of the
End User

Diagnostics, RootCause Analysis and
triage of application
component tiers

3

Application Root
Cause Analysis
© 2014 CA. All rights reserved.
CA APM: End-user Experience
End-to-end View of Business Transactions
Understand
End-User
experience;
establish SLAs

Monitor all business
transactions through the
infrastructure; measure
response & SLAs

Proactively detect issues;
conduct problem triage; diagnose root
cause
BACK END
SAP
PSFT

USER

NETWORK

Siebel

FRONT END
MIDDLEWARE

WAN/
WWW

Router

Firewall

Switch

Load Balancer

Web
Servers

Portal

Mainframe

App Server

Database

End User

1

4

End User
Experience
What is happening
with my critical
applications?

Web Services

How well are my key
transactions
performing?
Who’s impacted?

Which
transactions
are failing to
meet
expectations?

© 2014 CA. All rights reserved.

3rd Party
Applications

Databases
CA APM: Application-delivery Analysis
Visibility to Tier-based Performance
Passive Traffic
Analysis gives
visibility to
each leg of an
application

Each Client ->
Network -> Server
connection is
analyzed.

Every packet for every Client – Server hop is
analyzed and compared against adaptive
baseline
BACK END
SAP
PSFT

USER

NETWORK

Siebel

FRONT END
MIDDLEWARE

WAN/
WWW

Router

Firewall

Switch

Load Balancer

Web
Servers

Portal

Mainframe

App Server

Database
Backend
Network

End User

Web Services

2 Network Triage:
Which locations
are being
impacted, for
how long?
5

3rd Party
Applications

Is it an application or
an infrastructure
problem?

Which tier is
the cause of
the problem?

© 2014 CA. All rights reserved.

Databases
CA APM: Root-cause Analysis
Deep-dive Inspection; See Inside The Application
Understand
Application
interactions.;
Detect
anomalies

Triage application
performance
degradations

On Prem
or in the
Cloud

Diagnose root cause
BACK END
SAP

PSFT

USER

NETWORK

Siebel

FRONT END
MIDDLEWARE

WAN/
WWW

Router

Firewall

Switch

Load Balancer

Web
Servers

Portal

Mainframe

App Server

Database

End User

3

6

Application Tiers:
Why is my
customer
unhappy?

Web Services

Is the application
waiting on a slow
backend service?

Is there a
block of code
that is
causing the
issue?

© 2014 CA. All rights reserved.

3rd Party
Applications

Databases
CA APM: Four Simple Steps
One Holistic Solution

Multi-Variant Analytics:
Application Behavior Analysis

End-User Experience:

1

Data Agnostic, Anomaly Detection,
SAP
Pattern Matching,
PSFT
Auto Configuration

Customer Experience Manager
CA Identity
Manager

Business-Centric Reporting,
Transaction Throughput, SLA’s &
Scorecards, Success & Failure
Rates, Tie Actual Users to Activity

Siebel

Mainframe

A
Network

Router

Firewall

Switch

Load Balancer

Web
Servers

Portal

Database

App Server

Copied
Network
Traffic

End User

Web Services

Databases

Multiport Collector
(MTP)

2

Enterprise Manager

Agentless Triage:
Application Delivery Analysis
Proactive notification when
performance varies from historic
norms. Triage whether issues lie
in application or infrastructure.
7

3

Root-Cause Analysis:
Introscope
Java/.NET Class & Method
Performance, Errors, Always-on
Recording, Transaction tracing,
Visibility into backend services.

Role-Specific
Advanced
Mobile
Management © 2014 CA. All rights reserved.
Analytics
Dashboards
Consoles
Engine

4
CA APM: 360 View of Applications
Scalable to the Largest Environments

Proactive Analytics
Multi-variate analytics
finds problems BEFORE
they impact users

Unmatched Depth
Drill down deep into
from end-user to the
mainframe

Real Time Metrics
See each user
transaction in real time

Deepest Coverage of Most Critical Apps
SAP, Citrix, SharePoint, Hadoop
Java, .NET, Mobile applications, web 2.0,
Many, many other protocols
8

Relentless Tracking
Ability to track every
transaction any time

© 2014 CA. All rights reserved.
CA APM: Application Behavior Analytics (ABA)
CA Exclusive Feature
Data Agnostic
Reviews data from ANY
soource

Anomaly Detection
Processes 100,000
multi-variant metrics
per 15-second interval

Auto-Config
Automatically
configures itself &
adapts to app changes

Pattern Matches
Recognizes abnormal
behavior on its own
9

•
•
•
•

ABA: A Different Type of Analysis
Takes multiple data sources
Analyzes in aggregate
Fully integrated into APM user experience
NO ADDITONAL COST FOR ABA!!

© 2014 CA. All rights reserved.
CA Cloud Monitor
Deep SaaS Based APM Solution

Synthetic
Transactions
From global Points Of
Presence (POPs)
48 Countries / 92 Cities
24x7
15 Time Zones
Application availability,
& service levels, API &
web services monitoring

End to End
User experience
validation

On-premise Monitoring Stations

• 48 Countries / 94 locations / 15 Time Zones
• Same capability when as set behind the
firewall
• Unmatched browser monitoring ability
• Mobile Access!
10

© 2014 CA. All rights reserved.

Integrated
Use stand alone or
integrated with on-prem
CA APM
CA APM: Comprehensive Integration
Complete Enterprise-wide Solution

Public
Cloud

On-Prem / Cloud

Cross Enterprise Integration

11

CA Mainframe
CA Siteminder (Security)
CA Infrastructure Management
CA LISA (Test & Dev)

OEM Integration
SAP (Exclusive)
Citrix
Microsoft
Many More

Cloud Providers
Amazon
Rackspace
More

Differentiation for partners
Better business outcomes
for customers

© 2014 CA. All rights reserved.
CA APM: For Industry Leaders
1000+ Large Enterprise Installations
Software Customer

Telecommunications
Customer

• Monitors 9,000+ JVMs
• Monitors 2,500,00
concurrent sessions
• Across on-prem, private
& public cloud
• Reports to 120+ managers

• Monitors 25,000+ JVMs
• Across global datacenters
• Reports 25,000,000
metrics every 15 seconds
• Over 140B metrics/day

Communications
Customer

Banking
Customer

• Monitors 16,000+ JVMs
• 20,000,000 metrics
every 15 seconds
• Watches 2500 business
processes
• Dashboards to exes

• Manages 14,000+ JVMs
& middleware
• Manages critical
applications like Online
banking & Investment
banking

12

7 of

*
10

*Source: Fortune Global 500, 2013

of Top Banks

of Top Telecommunications Companies
of Top Healthcare Companies
© 2014 CA. All rights reserved.
CA APM with Application Behavior Analytics
No Other Solution Provides this Breadth of Coverage
360 View for
Exceptional
Experience

Scale for Largest
Environments

Visualization for
Relevant Insight

Application Behavior Analytics
Auto-configures & automatically searches for anomalies
to find problems BEFORE they impact users

13

© 2014 CA. All rights reserved.
CA APM
Application Behavior Analytics
Demonstration
Bart Peluso

February 25, 2014

© 2014 CA. All rights reserved.

Mais conteúdo relacionado

Mais de CA Technologies

Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and RiskCA Technologies
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...CA Technologies
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...CA Technologies
 
When You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantWhen You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantCA Technologies
 
Application Security in a DevOps World
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps WorldCA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 

Mais de CA Technologies (20)

Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and Risk
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
 
When You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantWhen You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is Important
 
Application Security in a DevOps World
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps World
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 

Último

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Último (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

Finding application problems before they impact users

  • 1. Finding Application Problems Before they Impact Users ____________________________________________________________________________________________________________ CA Application Performance Management Aruna Ravichandran Vice President, Product and Solution Marketing APM and DevOps CA Technologies 2/25/14 © 2014 CA. All rights reserved.
  • 2. What has APM got to do with Water??? Water Pressure This is similar to infrastructure monitoring Water Quality This is similar to application quality Both have to viewed concurrently CA looks at EVERYTHING that touches the application 2 © 2014 CA. All rights reserved.
  • 3. APM Domains Off- Premise End-User Analysis Application-Delivery Analysis Measures the performance of the delivery of the application over Multi-Variant the Network and Analytics Servers End-User Analysis Measures performance from the perspective of the End User Diagnostics, RootCause Analysis and triage of application component tiers 3 Application Root Cause Analysis © 2014 CA. All rights reserved.
  • 4. CA APM: End-user Experience End-to-end View of Business Transactions Understand End-User experience; establish SLAs Monitor all business transactions through the infrastructure; measure response & SLAs Proactively detect issues; conduct problem triage; diagnose root cause BACK END SAP PSFT USER NETWORK Siebel FRONT END MIDDLEWARE WAN/ WWW Router Firewall Switch Load Balancer Web Servers Portal Mainframe App Server Database End User 1 4 End User Experience What is happening with my critical applications? Web Services How well are my key transactions performing? Who’s impacted? Which transactions are failing to meet expectations? © 2014 CA. All rights reserved. 3rd Party Applications Databases
  • 5. CA APM: Application-delivery Analysis Visibility to Tier-based Performance Passive Traffic Analysis gives visibility to each leg of an application Each Client -> Network -> Server connection is analyzed. Every packet for every Client – Server hop is analyzed and compared against adaptive baseline BACK END SAP PSFT USER NETWORK Siebel FRONT END MIDDLEWARE WAN/ WWW Router Firewall Switch Load Balancer Web Servers Portal Mainframe App Server Database Backend Network End User Web Services 2 Network Triage: Which locations are being impacted, for how long? 5 3rd Party Applications Is it an application or an infrastructure problem? Which tier is the cause of the problem? © 2014 CA. All rights reserved. Databases
  • 6. CA APM: Root-cause Analysis Deep-dive Inspection; See Inside The Application Understand Application interactions.; Detect anomalies Triage application performance degradations On Prem or in the Cloud Diagnose root cause BACK END SAP PSFT USER NETWORK Siebel FRONT END MIDDLEWARE WAN/ WWW Router Firewall Switch Load Balancer Web Servers Portal Mainframe App Server Database End User 3 6 Application Tiers: Why is my customer unhappy? Web Services Is the application waiting on a slow backend service? Is there a block of code that is causing the issue? © 2014 CA. All rights reserved. 3rd Party Applications Databases
  • 7. CA APM: Four Simple Steps One Holistic Solution Multi-Variant Analytics: Application Behavior Analysis End-User Experience: 1 Data Agnostic, Anomaly Detection, SAP Pattern Matching, PSFT Auto Configuration Customer Experience Manager CA Identity Manager Business-Centric Reporting, Transaction Throughput, SLA’s & Scorecards, Success & Failure Rates, Tie Actual Users to Activity Siebel Mainframe A Network Router Firewall Switch Load Balancer Web Servers Portal Database App Server Copied Network Traffic End User Web Services Databases Multiport Collector (MTP) 2 Enterprise Manager Agentless Triage: Application Delivery Analysis Proactive notification when performance varies from historic norms. Triage whether issues lie in application or infrastructure. 7 3 Root-Cause Analysis: Introscope Java/.NET Class & Method Performance, Errors, Always-on Recording, Transaction tracing, Visibility into backend services. Role-Specific Advanced Mobile Management © 2014 CA. All rights reserved. Analytics Dashboards Consoles Engine 4
  • 8. CA APM: 360 View of Applications Scalable to the Largest Environments Proactive Analytics Multi-variate analytics finds problems BEFORE they impact users Unmatched Depth Drill down deep into from end-user to the mainframe Real Time Metrics See each user transaction in real time Deepest Coverage of Most Critical Apps SAP, Citrix, SharePoint, Hadoop Java, .NET, Mobile applications, web 2.0, Many, many other protocols 8 Relentless Tracking Ability to track every transaction any time © 2014 CA. All rights reserved.
  • 9. CA APM: Application Behavior Analytics (ABA) CA Exclusive Feature Data Agnostic Reviews data from ANY soource Anomaly Detection Processes 100,000 multi-variant metrics per 15-second interval Auto-Config Automatically configures itself & adapts to app changes Pattern Matches Recognizes abnormal behavior on its own 9 • • • • ABA: A Different Type of Analysis Takes multiple data sources Analyzes in aggregate Fully integrated into APM user experience NO ADDITONAL COST FOR ABA!! © 2014 CA. All rights reserved.
  • 10. CA Cloud Monitor Deep SaaS Based APM Solution Synthetic Transactions From global Points Of Presence (POPs) 48 Countries / 92 Cities 24x7 15 Time Zones Application availability, & service levels, API & web services monitoring End to End User experience validation On-premise Monitoring Stations • 48 Countries / 94 locations / 15 Time Zones • Same capability when as set behind the firewall • Unmatched browser monitoring ability • Mobile Access! 10 © 2014 CA. All rights reserved. Integrated Use stand alone or integrated with on-prem CA APM
  • 11. CA APM: Comprehensive Integration Complete Enterprise-wide Solution Public Cloud On-Prem / Cloud Cross Enterprise Integration 11 CA Mainframe CA Siteminder (Security) CA Infrastructure Management CA LISA (Test & Dev) OEM Integration SAP (Exclusive) Citrix Microsoft Many More Cloud Providers Amazon Rackspace More Differentiation for partners Better business outcomes for customers © 2014 CA. All rights reserved.
  • 12. CA APM: For Industry Leaders 1000+ Large Enterprise Installations Software Customer Telecommunications Customer • Monitors 9,000+ JVMs • Monitors 2,500,00 concurrent sessions • Across on-prem, private & public cloud • Reports to 120+ managers • Monitors 25,000+ JVMs • Across global datacenters • Reports 25,000,000 metrics every 15 seconds • Over 140B metrics/day Communications Customer Banking Customer • Monitors 16,000+ JVMs • 20,000,000 metrics every 15 seconds • Watches 2500 business processes • Dashboards to exes • Manages 14,000+ JVMs & middleware • Manages critical applications like Online banking & Investment banking 12 7 of * 10 *Source: Fortune Global 500, 2013 of Top Banks of Top Telecommunications Companies of Top Healthcare Companies © 2014 CA. All rights reserved.
  • 13. CA APM with Application Behavior Analytics No Other Solution Provides this Breadth of Coverage 360 View for Exceptional Experience Scale for Largest Environments Visualization for Relevant Insight Application Behavior Analytics Auto-configures & automatically searches for anomalies to find problems BEFORE they impact users 13 © 2014 CA. All rights reserved.
  • 14. CA APM Application Behavior Analytics Demonstration Bart Peluso February 25, 2014 © 2014 CA. All rights reserved.