Gartner's 5 Dimensions of APM
December 02, 2011
Pete Goldin

Gartner's recently published Magic Quadrant for Application Performance Monitoring defines “five distinct dimensions of, or perspectives on, end-to-end application performance” which are essential to APM, listed below.

Gartner points out that although each of these five technologies are distinct, and often deployed by different stakeholders, there is “a high-level, circular workflow that weaves the five dimensions together.”

1. End-user experience monitoring

End-user experience monitoring is the first step, which captures data on how end-to-end performance impacts the user, and identifies the problem.

2. Runtime application architecture discovery, modeling and display

The second step, the software and hardware components involved in application execution, and their communication paths, are studied to establish the potential scope of the problem.

3. User-defined transaction profiling

The third step involves examining user-defined transactions, as they move across the paths defined in step two, to identify the source of the problem.

4. Component deep-dive monitoring in application context

The fourth step is conducting deep-dive monitoring of the resources consumed by, and events occurring within, the components discovered in step two.

5. Analytics

The final step is the use of analytics – including technologies such as behavior learning engines – to crunch the data generated in the first four steps, discover meaningful and actionable patterns, pinpoint the root cause of the problem, and ultimately anticipate future issues that may impact the end user.

Applying the 5 dimensions to your APM purchase

“These five functionalities represent more or less the conceptual model that enterprise buyers have in their heads – what constitutes the application performance monitoring space, ” explains Will Cappelli, Gartner Research VP in Enterprise Management and co-author of the Magic Quadrant for Application Performance Monitoring.

“If you go back and look at the various head-to-head competitions and marketing arguments that took place even as recently as two years ago, you see vendors pushing one of the five functional areas as: what you need in order to do APM,” Cappelli recalls. “I think it's only because of the persistent demand on the part of enterprise buyers, that they needed all five capabilities, that drove the vendors to populate their portfolios in a way that would adequately reflect those five functionalities.”

The question is: should one vendor be supplying all five capabilities?

“You will see enterprises typically selecting one vendor as their strategic supplier for APM,” Cappelli continues, “but if that vendor does not have all the pieces of the puzzle, the enterprise will supplement with capabilities from some other vendor. This can make a lot of sense.”

“When you look at some of the big suites, and even the vendors that offer all five functionalities, in most cases those vendors have assembled those functionalities out of technologies they have picked up when they acquired many diverse vendors. Even when you go out to buy a suite from one of the larger vendors that offers everything across the board, at the end of the day you are left with very distinct products even if they all share a common name.”

For this reason, Cappelli says there is usually very little technology advantage associated with selecting a single APM vendor over going with multiple vendors providing best-of-breed products for each of the five dimensions. However, he notes that there can be a significant advantage to minimizing the number of vendors you have to deal with.

“Because APM suites, whether assembled by yourself or by a vendor, are complex entities, it is important to have the vendor support that can span across the suite,” Cappelli says. “So in general it makes sense to go with a vendor that can support you at least across the majority of the functionalities that you want.”

“But you do need to be aware that the advantage derived from going down that path – choosing a single vendor rather than multiple vendors – has more to do with that vendor's ability to support you in solving a complex problem rather than any kind of inherent technological advantage derived from some kind of pre-existing integration.”

Related Links:

Another Look At Gartner's 5 Dimensions of APM

Click here to read Part One of the APMdigest interview with Will Cappelli, Gartner Research VP in Enterprise Management.

Click here to read Part Two of the APMdigest interview with Will Cappelli, Gartner Research VP in Enterprise Management.

The Latest

February 05, 2016

As the Super Bowl approaches, an equally epic game is taking place in cyberspace. The Super Bowl is the "moment of truth" for the NFL, sports media, advertisers, restaurants (especially pizza joints), food delivery services and gambling sites. They have to be ready in order to capitalize on unpredictably "spiky" traffic and the transactions before, during and, for some, after the game. To better evaluate the impact of the Super Bowl on ecommerce and website traffic, SOASTA conducted a survey that examined the online and mobile habits and preferences of Americans watching this year's big game ...

February 04, 2016

It’s hard to define software-defined networking (SDN) as one thing, given that it is applied to so many different areas of networking: Data centers, enterprise campus, the WAN, radio access networks, etc. And each vendor that introduces an SDN product to the market is working from a definition that fits into its own strategy. But … what do those people who deploy SDN have to say? ...

February 03, 2016

Remember the adage "beauty is in the eye of the beholder?" Similarly, service quality is in the eye of the user. So, to understand service quality, we should be measuring end-user experience (EUE). You may already be measuring EUE. Some of your applications – particularly those based on Java and .NET – may already be instrumented with agent-based APM solutions. But there are a few challenges to an agent-based approach to EUE ...

February 02, 2016

IT and business executives agree that digital transformation and the use of hybrid clouds are key to competitive success in the digital age, according to a new study conducted by IDG Research Services ...

February 01, 2016

ExtraHop expects to see the network emerge as a critical nexus of business over the next twelve months, with significant integration between network and security, demand for operational support of connected devices, and the ability to mine all data-in-motion for correlated, cross-tier and cross-team insights ...

January 29, 2016

Log Analytics is a process of investigating logs and hoping to derive actionable information that might be useful to the business. Many log analytics tools are used to gain visibility into web traffic, security, application behavior, etc. But how valuable and practical is log analytics in reality? ...

January 28, 2016

Nearly one out of every three businesses (32%) become aware of most application performance issues from their end users, according to the ManageEngine Application Performance Monitoring Survey 2015 ...

January 27, 2016

While IoT is gaining traction with consumers, it's already having a transformative effect on the business world. Companies can analyze the volumes of data connected devices supply to improve decision-making processes and to help employees be more productive. However, as an enterprise brings more connected devices online, IT will struggle to maintain adequate application performance levels. Implementing application performance monitoring (APM) establishes the end-to-end visibility IT needs in order to immediately identify what's causing an application to perform poorly ...

January 26, 2016

Companies are beginning the business mobility transformation — transitioning from the client-server era to the mobile-cloud era — shifting at least one core business process to the mobile paradigm, according to the VMware 2015 State of Business Mobility Report ...

January 25, 2016

BMC and Forbes Insights recently surveyed executives in North America and Europe to get their perspective on their organization's overall security health and to find out what issues are critical to address. The results revealed the need for a framework organizations can use to get a solid strategy in place for improved security and compliance ...

Share this