Do You Have The Right IT Monitoring And Management Strategy?

Do You Have The Right IT Monitoring And Management Strategy?

Do You Have The Right IT Monitoring And Management Strategy?

As more organizations embrace hybrid IT, the task of monitoring and managing these environments becomes more complex. Virtualization and cloud add layers of abstraction, making detection and resolution of a performance/availability issue extremely challenging for the IT operations department. Without the correct process and tools in place, restoration of service becomes a difficult, long drawn process and downtime becomes a constant detrimental issue.

The team here at Zenoss commissioned Forrester Consulting to conduct a study on the current state of IT’s ability to manage the performance and availability of critical applications and services in an increasingly complex IT environment. Forrester surveyed 157 IT professionals in North America via multiple channels and asked questions around the tactics the operations team uses to address downtime, capabilities that are most important to IT organizations in a monitoring tool and where they currently stand on addressing the complexities of the modern data center.

Below are key findings from this survey and ways in which organizations can begin to improve the way in which they manage IT operations.

Organization are experiencing way too much downtime

The findings suggested that IT greatly struggles to manage complexity of the modern data center with more than a third of organizations running into IT issues on a daily basis. The cost? Forrester found that companies lose $10,000 to $1 million hourly on down time. No wonder IT has become the number one concern for CEOs – even above people skills and market factors.

Organizations are not able to find or solve the problem quickly

In addition to experiencing a lot of downtime, another major problem was the time it took the operations team to find the root cause of the problem. According to this study, results showed that 42 percent of the respondents spend from one hour to more than a week identifying the root cause of service problems. Making it worse is the fact that over 60% of the surveyed need to involve 4 to 10+ full-time employees to solve the problem. This is a huge issue when it comes to costs for the company – as stated above an hour of downtime can cost upwards of a million dollars.

Why are IT operation teams struggling?

The two reasons for the downtime issue and mean time to recover were linked back to IT monitoring tool clutter and poor capacity planning.

More than 50 percent of respondents are using five or more monitoring tools, and an astounding 14 percent are using 20 or more different tools to find and fix issues. This leads to slow detection and imprecise root cause analysis. Even though, the number one benefit that companies look for in a monitoring tool is that the tool identifies an issue or problem before it can impact end users. 28 percent of respondents are unaware of service degradation until end users or business leaders contact them.

The tools are not providing the necessary intelligence to enable organizations to effectively work on a resolution. As a result, teams of SMEs from different groups have to be assembled each time there is a disruption. This is neither efficient nor scalable.

Capacity planning continues to be the Achilles’ heel for IT operations. Unplanned capacity planning was the number one cause for performance and availability issues. They need better insights into their environment to understand the utilization patterns and start to anticipate the upcoming capacity.

What can you do?

In order to get the agility and elasticity that cloud computing and virtualization provides, companies need to start tightening up their monitoring and management strategy. Monitoring cannot be siloed, you simply cannot afford 20 disjointed monitoring tools. You need a unified tool that can monitor virtual, cloud and physical infrastructure as well as their resources like storage and the network. A solution such as Zenoss Service Dynamics, can holistically monitor your environment, speed up root cause analysis and analyze your environment to provide you with trends and patterns to help you better conduct capacity planning and infrastructure optimization. While it is critical that organizations manage their environment to continue delivering on their SLAs, it is equally important to have monitoring be a strategic part of their IT planning as they mature.

Chris_SmithBy Chris Smith, Chief Marketing Officer at Zenoss

Chris Smith joined Zenoss in 2012 as CMO and is responsible for all aspects of brand management, product marketing, and demand generation. Prior to joining Zenoss, Chris was VP of Product and Partner Marketing at Quest Software. Before Quest, Chris was VP of Marketing and Product Management at Alert Logic, guiding the company from startup to over 1,000 customers and SaaS network security leadership in less than 4 years.

Smith holds a B.S. in Electrical Engineering from Texas A&M University and an MBA from Rice University.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Fintech Systems, Advancements and Investments

Fintech Systems, Advancements and Investments

Fintech Growth According to a recent report, global investment in fintech companies including both venture-backed and non-venture-backed businesses reached $9.4 billion in the second quarter of 2016; investment in venture capital-backed fintech startups, however, fell by 49%. Nevertheless, the Pulse of Fintech, published jointly by KPMG International and CB Insights, suggests venture capital investment in…

How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Significant Emerging Technologies To Lookout For In 2017

Significant Emerging Technologies To Lookout For In 2017

Emerging Technologies The entire world is being transformed right before our eyes. Emerging technologies are developing at break-neck speeds, and the global community needs to be prepared for what lies in the horizon. As with anything new or evolving there is benefit versus risk to consider. Most of the up-and-coming technologies that will soon affect…

In The Fast Lane: Connected Car Hacking A Big Risk

In The Fast Lane: Connected Car Hacking A Big Risk

Connected Car Hacking Researchers and cybersecurity experts working hard to keep hackers out of the driver’s seat. Modern transportation has come a million miles, and most all of today’s vehicles are controlled entirely by digital technology. Millions of drivers are not aware that of the many devices in their digital arsenal, the most complex of…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence All businesses need a strategy and processes for governance, risk and compliance (GRC). Many still view GRC activity as a burdensome ‘must-do,’ approaching it reactively and managing it with non-specialized tools. GRC is a necessary business endeavor but it can be elevated from a cost drain to a value-add activity. By integrating…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Cloud Computing Price War Rages On

Cloud Computing Price War Rages On

Cloud Computing Price War There’s little question that the business world is a competitive place, but probably no area in business truly defines cutthroat quite like cloud computing. At the moment, we are witnessing a heated price war pitting some of the top cloud providers against each other, all in a big way to attract…

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security Risks Does security in the cloud ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that,…

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications It’s no secret that organizations are embracing the cloud and all the benefits that it entails. Whether its cost savings, increased flexibility or enhanced productivity – businesses around the world are leveraging the cloud to scale their business and better serve their customers. They are using a variety of cloud solutions…

Mobile Connected Technologies – The Future Of The Healthcare Industry

Mobile Connected Technologies – The Future Of The Healthcare Industry

Mobile Connected Technologies Clinics, hospitals, and other healthcare facilities are embracing new mobile technologies in order to be more efficient in their daily tasks. With faster communication and better collaboration, clinicians can spend much less time handling medical devices and more time administering care to their patients. Industry experts are stating that mobile connected technologies…

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Public, Private & Hybrid Differences Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb

Utilizing Digital Marketing Techniques Via The Cloud

Utilizing Digital Marketing Techniques Via The Cloud

Digital Marketing Trends In the past, trends in the exceptionally fast-paced digital marketing arena have been quickly adopted or abandoned, keeping marketers and consumers on their toes. 2016 promises a similarly expeditious temperament, with a few new digital marketing offerings taking center stage. According to Gartner’s recent research into Digital Marketing Hubs, brands plan to…