SlideShare a Scribd company logo
CRACK THE CASE
Clues for Solving
Cloud-Based App
Performance
Based on the Intellyx whitepaper
Nabbing Performance Suspects in AWS
Cloud-Based Apps Through Visibility
by Principal Analyst, John English.
NETSCOUT Crack the Case: Clues for Solving Cloud-Based App Performance2
You don’t have to be
an expert performance
engineering sleuth to
notice when a site or
app you are using seems
‘out of breath.’
The delay may cost you a few extra
seconds of load time after a click,
or it may manifest itself as the
endlessly spinning ‘disk of death.’
The causes of these interruptions
may seem a mystery, but the results
are well known. In a retail setting,
users can start to lose enthusiasm
and abandon their carts within 2–5
seconds of lag time. For a banking or
insurance company, a compromised
network can be a board level issue.
And if your company uses SaaS
or cloud-based software for work,
you will definitely experience work
delays and missed deadlines due to
a procrastinating business system.
Companies undergoing a digital
transformation increasingly move
parts of their applicationsand data
to a hybrid IT infrastructure, which
includes cloud services like AWS, to
gain the benefits of elastic scaling
and dynamic flexibility. But that
doesn’t address several mysterious
performance and security problems.
Let’s investigate and find out
what clues we can track with
greater visibility.
Jason “JE” English is Principal Analyst and
CMO at Intellyx. Drawing on expertise in
designing, marketing and selling enterprise
software and services, he is focused on
covering how agile collaboration between
customers, partners and employees
accelerates innovation.
ABOUT THE AUTHOR
A Lack of
Appropriate
Security Visibility?
The UI or Network
Response Time?
AWS Itself?
SUSPECT 3 SUSPECT 4
SUSPECT 2
EXPLORE EXPLORE
EXPLORE
What are the usual
suspects affecting
performance of AWS
cloud-based apps?
The Development
Process?
SUSPECT 1
EXPLORE
NETSCOUT Crack the Case: Clues for Solving Cloud-Based App Performance3
The Development
Process?
SUSPECT 1
New development patterns are emerging, as companies
seek to become more responsive to customer demand. The
Agile Revolution accelerated development, but also brought
fragmentation, especially within large enterprises. Scaling
causes uncertainty when semiautonomous teams may
provision their own labs and meet business requirements
on independent iterative cycles.
Getting beyond yesterday’s waterfall approaches and
requirement tracking tools leads to newer project
approaches and a portfolio of open and proprietary
toolsets to support them. This creates borders to visibility
between teams, departments and partners as to what is
really being promoted to production.
NETSCOUT Crack the Case: Clues for Solving Cloud-Based App Performance4
SOLVE THE CASE
SUSPECT 3
SUSPECT 1
SUSPECT 4
SUSPECT 1 SUSPECT 2
EXPLORE
NETSCOUT Crack the Case: Clues for Solving Cloud-Based App Performance5
With the right tools and the right reorganization of IT personnel,
DevSecOps teams can deliver high performance and secure
application functionality to deliver an exceptional customer
experience that is continually improving.
Follow the “Roadmap to DevSecOps” and learn how Visibility
without Borders™ drives business performance.
READ NOW
The Development
Process?
SUSPECT 1
Look for patterns of interdependency at every detected deployment
to see if there are upstream or downstream release impacts that
can ultimately hamper user experience.
Clues to Solve the Case
NETSCOUT Expert Tip
SUSPECT 3
SUSPECT 4
SUSPECT 2
EXPLORE
SUSPECT 1
AWS Itself?
SUSPECT 2
Whether you are running applications entirely on, or, more
likely, using them as one part of your hybrid IT strategy, you
can’t simply fault the cloud. AWS is taking performance
tuning as far as they possibly can, beyond what any company
would be able to do by itself, given the massive traffic and
storage load they are subject to on a daily basis.
Still, the devil is in the details. AWS may host applications
and data in different geo regions, which often talk to outside
app services and data sources. Since even the fastest fiber
can’t carry data faster than light, even data moving within the
cloud provider can get held up for large cumulative amounts
of time as it is routed around the world. There may be
potential for network flow improvement here.
6
SOLVE THE CASE
NETSCOUT Crack the Case: Clues for Solving Cloud-Based App Performance
SUSPECT 3
SUSPECT 1
SUSPECT 4
SUSPECT 2
EXPLORE
Having the same level of visibility in data centers as well as public
cloud is key to being confident in the quality of application and
network performance and security. But the solution has to provide
IT a single pane view of metrics in order to cut time to resolve
problems—pin pointing the source and not simply ruling out areas.
Learn how this large manufacturing company gained the visibility
they needed to operate efficiently before, during and after their
critical hybrid cloud deployments.
READ NOW
Ensure packet-level tracing across a networked transaction, and
don’t just settle for round-trip response time as an indicator. Try
to break down the ‘stops’ in each transaction as a performance
budget and look for variations across sessions.
7
AWS Itself?
SUSPECT 2
Clues to Solve the Case
NETSCOUT Expert Tip
SUSPECT 3
SUSPECT 1
SUSPECT 4
SUSPECT 2
EXPLOREEXPLORE
NETSCOUT Crack the Case: Clues for Solving Cloud-Based App Performance
A Lack of Appropriate
Security Visibility?
SUSPECT 3
Many applications do a great job of solving for the “known
knowns” of perimeter security: preventing and detecting
unauthorized access attempts and DDoS attacks seeking to
knock down the front door.
But what do you do when the ‘front door’ is potentially
renewed and changing as dynamic application instances are
added? Every new service integration and API can introduce
new data sources to your app, which may execute actions
within applications. Add in feeds from 5G networks, mobile
and IoT devices, and the attack surface grows exponentially.
And what about internal employee misuse of the network?
Perfectly authorized users that are responsible for almost
half of the world’s data breaches.
NETSCOUT Crack the Case: Clues for Solving Cloud-Based App Performance8
SOLVE THE CASE
SUSPECT 1
SUSPECT 4
SUSPECT 2
EXPLORE
SUSPECT 3
Leverage NETSCOUT’s Arbor security solutions-which create “smart
data” from TCP/IP traffic directly, and profile it against an updated
feed of hundreds of known malicious or negligent packet behaviors.
NETSCOUT’s customers are supported by a unique threat analysis
research infrastructure called ATLAS, as well as NETSCOUT’s ATLAS
Security Engineering & Response Team (ASERT), world-class security
researchers and analysts. Visit the blog to stay up to date on the latest
security news.
READ BLOG
Enterprises will always need perimeter security from the IaaS provider,
with intrusion detection, load balancing and strong authorization
controls. But in a hybrid IT model, you also need network level
perception of malicious data types and behaviors. For instance, the
NETSCOUT Atlas security suite can create “smart data” from TCP/IP
traffic directly, and profile it against an updated feed of hundreds of
known malicious or negligent packet behaviors.
NETSCOUT Crack the Case: Clues for Solving Cloud-Based App Performance9
A Lack of Appropriate
Security Visibility?
SUSPECT 3
Clues to Solve the Case
NETSCOUT Expert Tip
SUSPECT 1
SUSPECT 4
SUSPECT 2
EXPLORE
SUSPECT 3
The UI or Network
Response Time?
SUSPECT 4
APM (application performance management) tools have
evolved with the cloud to measure performance at the
user interface and even responsiveness at the service
composition layer. This would work fine if your entire
application was a self-contained island.
Even if AWS is hosting most of the application environment,
and files and images are served rapidly from a CDN, any
significant on going business interest always has some
systems of record, apps and data in an on-premises or
managed data center, and user sessions will need to share
data with external services.
NETSCOUT Crack the Case: Clues for Solving Cloud-Based App Performance10
SOLVE THE CASE
SUSPECT 3
SUSPECT 1
SUSPECT 2
EXPLORE
SUSPECT 4
In order to assure application performance, DEV OPS teams migrating
workloads to AWS need real-time system-level feedback. Armed
with this information, DevOps teams optimize the performance of
applications that were either refactored or lifted-and-shifted to the
cloud, and assured a consistent outstanding customer experience.
Read how NETSCOUT’s Application Performance Management
for AWS goes beyond traditional north-south traffic views, to now
provide deep insights into traffic across AWS.
READ NOW
Seek comprehensive visibility into the interdependencies and
network traffic happening across the network of the entire Hybrid
IT environment, in order to track down any culprits that would never
appear in a standard APM tool.
NETSCOUT Crack the Case: Clues for Solving Cloud-Based App Performance11
The UI or Network
Response Time?
SUSPECT 4
NETSCOUT Expert Tip
Clues to Solve the Case
SUSPECT 3
SUSPECT 1
SUSPECT 2
EXPLORE
SUSPECT 4
An Application is
an Entire Network
How NETSCOUT Can Help
You can’t catch a suspect you can’t see. There are already
many good solutions for diagnosing integration, performance
and security issues on the market for applications that run
on cloud-based services like AWS.
What the clue performance sleuths often miss is that
a modern hybrid IT application actually crosses several
organizational borders of responsibility, and its entire
network is much broader and amorphous in deployment
than its cloud footprint in AWS belies.
User expectations for a fast, functional and flexible
experience has never been higher. Time to eliminate those
borders and shine a light on whole-network visibility.
NETSCOUT for AWS enables more informed business
decisions by removing the barriers associated with mining
high-volume wire data in the AWS cloud. NETSCOUT
accomplishes this by enabling real-time analyses of all
data traversing the AWS infrastructure and on-premise
data centers across large enterprises. Enterprise data
hidden within dynamic cloud workloads transforms into
timely and valuable insights.
Learn more about Hybrid Cloud Visibilty
and Monitoring Solutions from NETSCOUT
NETSCOUT SYSTEMS, INC.®
(NASDAQ: NTCT) delivers multi-purpose, real-time visibility,
troubleshooting and protection wherever your technology infrastructure and business
applications reside. NETSCOUT Smart Data gives technology and business teams the next-
generation level of visibility to see the full range of performance, availability and security
risks, earlier and with more precision, to resolve problems faster. That’s why the world’s most
demanding government, enterprise and service provider organizations rely on NETSCOUT
solutions to assure and protect the digital services which advance our connected world.
Visit www.netscout.com or follow @NETSCOUT on Twitter, Facebook, or LinkedIn.
© 2019 NETSCOUT SYSTEMS, INC. All rights reserved. NETSCOUT, and the NETSCOUT logo are registered
trademarks of NETSCOUT SYSTEMS, INC., and/or its subsidiaries and/or affiliates in the USA and/or other
countries. All other brands and product names and registered and unregistered trademarks are the sole
property of their respective owners.
CONTACT US

More Related Content

PDF
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
PDF
F5 Networks: The Internet of Things - Ready Infrastructure
PPTX
Zscaler mondi webinar
PDF
Cisco's 2016 Annual Security report
PDF
Introduction to Cloud Security
PPTX
Cyber Priority - Judson Walker
PPTX
Rethinking Cybersecurity for the Digital Transformation Era
PPTX
Three ways-zero-trust-security-redefines-partner-access-v8
NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine
F5 Networks: The Internet of Things - Ready Infrastructure
Zscaler mondi webinar
Cisco's 2016 Annual Security report
Introduction to Cloud Security
Cyber Priority - Judson Walker
Rethinking Cybersecurity for the Digital Transformation Era
Three ways-zero-trust-security-redefines-partner-access-v8

What's hot (20)

PDF
What is SASE
PDF
John Merline - How make your cloud SASE
PPTX
The evolution of IT in a cloud world
PDF
Cisco connect winnipeg 2018 unlocking business value with network programma...
PPTX
Rethinking Cybersecurity for the Digital Transformation Era
PDF
How to deal with the impact of digital transformation on networks
PDF
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
PDF
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
PPTX
NEXTGEN Cyber Security 2021
PPTX
Secure Data Sharing in OpenShift Environments
PPTX
The secure, direct to-internet branch
PDF
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
PDF
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
PDF
Cisco Connect 2018 Philippines - introducing cisco dna assurance
PDF
Cybersecurity | Meta Networks: Software defined perimeter platform
PPTX
SASE Future Proof sdwan 20 Sep2020 v2.1 BA
PDF
How Zero Trust Makes the Mission Simple & Secure
PDF
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
PDF
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
PPTX
Faster, simpler, more secure remote access to apps in aws
What is SASE
John Merline - How make your cloud SASE
The evolution of IT in a cloud world
Cisco connect winnipeg 2018 unlocking business value with network programma...
Rethinking Cybersecurity for the Digital Transformation Era
How to deal with the impact of digital transformation on networks
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
NEXTGEN Cyber Security 2021
Secure Data Sharing in OpenShift Environments
The secure, direct to-internet branch
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
Cisco Connect 2018 Philippines - introducing cisco dna assurance
Cybersecurity | Meta Networks: Software defined perimeter platform
SASE Future Proof sdwan 20 Sep2020 v2.1 BA
How Zero Trust Makes the Mission Simple & Secure
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Faster, simpler, more secure remote access to apps in aws
Ad

Similar to Clues for Solving Cloud-Based App Performance (20)

PDF
Migrating to cloud-native_app_architectures_pivotal
PDF
Migrating_to_Cloud-Native_App_Architectures_Pivotal (2)
PDF
Migrating_to_Cloud-Native_App_Architectures_Pivotal (2)
PDF
Migrating_to_Cloud-Native_App_Architectures_Pivotal
PDF
Overcoming the five hybrid cloud adoption challenges
PDF
Reactive Architecture
PDF
SPLUNK_empower-engineers-with-unified-observability.pdf
PDF
The F5 Networks Application Services Reference Architecture (White Paper)
DOCX
IT 8003 Cloud ComputingFor this activi.docx
PDF
Governance in the age of cloud
PDF
DEVSECOPS ON CLOUD STORAGE SECURITY
PDF
How to modernize legacy application infrastructure?
PDF
A New Approach to Continuous Monitoring in the Cloud
PPTX
what-full-stack-observability-requires-today.pptx
DOCX
Winds of change from vender lock in to the meta cloud
PDF
7 Essential Steps to Cloud Adoption.pdf
PDF
ACIC Rome & Veritas: High-Availability and Disaster Recovery Scenarios
PDF
10 tips for enterprise cloud migration
PPT
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
PDF
Data center terminology photostory
Migrating to cloud-native_app_architectures_pivotal
Migrating_to_Cloud-Native_App_Architectures_Pivotal (2)
Migrating_to_Cloud-Native_App_Architectures_Pivotal (2)
Migrating_to_Cloud-Native_App_Architectures_Pivotal
Overcoming the five hybrid cloud adoption challenges
Reactive Architecture
SPLUNK_empower-engineers-with-unified-observability.pdf
The F5 Networks Application Services Reference Architecture (White Paper)
IT 8003 Cloud ComputingFor this activi.docx
Governance in the age of cloud
DEVSECOPS ON CLOUD STORAGE SECURITY
How to modernize legacy application infrastructure?
A New Approach to Continuous Monitoring in the Cloud
what-full-stack-observability-requires-today.pptx
Winds of change from vender lock in to the meta cloud
7 Essential Steps to Cloud Adoption.pdf
ACIC Rome & Veritas: High-Availability and Disaster Recovery Scenarios
10 tips for enterprise cloud migration
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
Data center terminology photostory
Ad

More from NETSCOUT (14)

PDF
There's No Such Thing As "Downtime" In a Hospital
PDF
DDoS Attacks in 2020 & Best Practices in Defense
PDF
6 Key Findings Security Findings for Service Providers
PDF
RF Propagation Modelling for 5G RAN Planning and Design
PDF
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
PDF
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
PDF
nGeniusPULSE Quick Look
PDF
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
PDF
Hybrid Cloud - Digital Transformatiom
PDF
Digital Transformation starts with Service Assurance
PDF
Deceptive Speed: How to Fix Fast, Unstable Wi-Fi
PDF
Planning for a Digital Future
PPTX
How to Select a Security Visibility Solution
PPTX
Enterprise Networks: No Tool Left Behind
There's No Such Thing As "Downtime" In a Hospital
DDoS Attacks in 2020 & Best Practices in Defense
6 Key Findings Security Findings for Service Providers
RF Propagation Modelling for 5G RAN Planning and Design
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
nGeniusPULSE Quick Look
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
Hybrid Cloud - Digital Transformatiom
Digital Transformation starts with Service Assurance
Deceptive Speed: How to Fix Fast, Unstable Wi-Fi
Planning for a Digital Future
How to Select a Security Visibility Solution
Enterprise Networks: No Tool Left Behind

Clues for Solving Cloud-Based App Performance

  • 1. CRACK THE CASE Clues for Solving Cloud-Based App Performance Based on the Intellyx whitepaper Nabbing Performance Suspects in AWS Cloud-Based Apps Through Visibility by Principal Analyst, John English.
  • 2. NETSCOUT Crack the Case: Clues for Solving Cloud-Based App Performance2 You don’t have to be an expert performance engineering sleuth to notice when a site or app you are using seems ‘out of breath.’ The delay may cost you a few extra seconds of load time after a click, or it may manifest itself as the endlessly spinning ‘disk of death.’ The causes of these interruptions may seem a mystery, but the results are well known. In a retail setting, users can start to lose enthusiasm and abandon their carts within 2–5 seconds of lag time. For a banking or insurance company, a compromised network can be a board level issue. And if your company uses SaaS or cloud-based software for work, you will definitely experience work delays and missed deadlines due to a procrastinating business system. Companies undergoing a digital transformation increasingly move parts of their applicationsand data to a hybrid IT infrastructure, which includes cloud services like AWS, to gain the benefits of elastic scaling and dynamic flexibility. But that doesn’t address several mysterious performance and security problems. Let’s investigate and find out what clues we can track with greater visibility. Jason “JE” English is Principal Analyst and CMO at Intellyx. Drawing on expertise in designing, marketing and selling enterprise software and services, he is focused on covering how agile collaboration between customers, partners and employees accelerates innovation. ABOUT THE AUTHOR
  • 3. A Lack of Appropriate Security Visibility? The UI or Network Response Time? AWS Itself? SUSPECT 3 SUSPECT 4 SUSPECT 2 EXPLORE EXPLORE EXPLORE What are the usual suspects affecting performance of AWS cloud-based apps? The Development Process? SUSPECT 1 EXPLORE NETSCOUT Crack the Case: Clues for Solving Cloud-Based App Performance3
  • 4. The Development Process? SUSPECT 1 New development patterns are emerging, as companies seek to become more responsive to customer demand. The Agile Revolution accelerated development, but also brought fragmentation, especially within large enterprises. Scaling causes uncertainty when semiautonomous teams may provision their own labs and meet business requirements on independent iterative cycles. Getting beyond yesterday’s waterfall approaches and requirement tracking tools leads to newer project approaches and a portfolio of open and proprietary toolsets to support them. This creates borders to visibility between teams, departments and partners as to what is really being promoted to production. NETSCOUT Crack the Case: Clues for Solving Cloud-Based App Performance4 SOLVE THE CASE SUSPECT 3 SUSPECT 1 SUSPECT 4 SUSPECT 1 SUSPECT 2 EXPLORE
  • 5. NETSCOUT Crack the Case: Clues for Solving Cloud-Based App Performance5 With the right tools and the right reorganization of IT personnel, DevSecOps teams can deliver high performance and secure application functionality to deliver an exceptional customer experience that is continually improving. Follow the “Roadmap to DevSecOps” and learn how Visibility without Borders™ drives business performance. READ NOW The Development Process? SUSPECT 1 Look for patterns of interdependency at every detected deployment to see if there are upstream or downstream release impacts that can ultimately hamper user experience. Clues to Solve the Case NETSCOUT Expert Tip SUSPECT 3 SUSPECT 4 SUSPECT 2 EXPLORE SUSPECT 1
  • 6. AWS Itself? SUSPECT 2 Whether you are running applications entirely on, or, more likely, using them as one part of your hybrid IT strategy, you can’t simply fault the cloud. AWS is taking performance tuning as far as they possibly can, beyond what any company would be able to do by itself, given the massive traffic and storage load they are subject to on a daily basis. Still, the devil is in the details. AWS may host applications and data in different geo regions, which often talk to outside app services and data sources. Since even the fastest fiber can’t carry data faster than light, even data moving within the cloud provider can get held up for large cumulative amounts of time as it is routed around the world. There may be potential for network flow improvement here. 6 SOLVE THE CASE NETSCOUT Crack the Case: Clues for Solving Cloud-Based App Performance SUSPECT 3 SUSPECT 1 SUSPECT 4 SUSPECT 2 EXPLORE
  • 7. Having the same level of visibility in data centers as well as public cloud is key to being confident in the quality of application and network performance and security. But the solution has to provide IT a single pane view of metrics in order to cut time to resolve problems—pin pointing the source and not simply ruling out areas. Learn how this large manufacturing company gained the visibility they needed to operate efficiently before, during and after their critical hybrid cloud deployments. READ NOW Ensure packet-level tracing across a networked transaction, and don’t just settle for round-trip response time as an indicator. Try to break down the ‘stops’ in each transaction as a performance budget and look for variations across sessions. 7 AWS Itself? SUSPECT 2 Clues to Solve the Case NETSCOUT Expert Tip SUSPECT 3 SUSPECT 1 SUSPECT 4 SUSPECT 2 EXPLOREEXPLORE NETSCOUT Crack the Case: Clues for Solving Cloud-Based App Performance
  • 8. A Lack of Appropriate Security Visibility? SUSPECT 3 Many applications do a great job of solving for the “known knowns” of perimeter security: preventing and detecting unauthorized access attempts and DDoS attacks seeking to knock down the front door. But what do you do when the ‘front door’ is potentially renewed and changing as dynamic application instances are added? Every new service integration and API can introduce new data sources to your app, which may execute actions within applications. Add in feeds from 5G networks, mobile and IoT devices, and the attack surface grows exponentially. And what about internal employee misuse of the network? Perfectly authorized users that are responsible for almost half of the world’s data breaches. NETSCOUT Crack the Case: Clues for Solving Cloud-Based App Performance8 SOLVE THE CASE SUSPECT 1 SUSPECT 4 SUSPECT 2 EXPLORE SUSPECT 3
  • 9. Leverage NETSCOUT’s Arbor security solutions-which create “smart data” from TCP/IP traffic directly, and profile it against an updated feed of hundreds of known malicious or negligent packet behaviors. NETSCOUT’s customers are supported by a unique threat analysis research infrastructure called ATLAS, as well as NETSCOUT’s ATLAS Security Engineering & Response Team (ASERT), world-class security researchers and analysts. Visit the blog to stay up to date on the latest security news. READ BLOG Enterprises will always need perimeter security from the IaaS provider, with intrusion detection, load balancing and strong authorization controls. But in a hybrid IT model, you also need network level perception of malicious data types and behaviors. For instance, the NETSCOUT Atlas security suite can create “smart data” from TCP/IP traffic directly, and profile it against an updated feed of hundreds of known malicious or negligent packet behaviors. NETSCOUT Crack the Case: Clues for Solving Cloud-Based App Performance9 A Lack of Appropriate Security Visibility? SUSPECT 3 Clues to Solve the Case NETSCOUT Expert Tip SUSPECT 1 SUSPECT 4 SUSPECT 2 EXPLORE SUSPECT 3
  • 10. The UI or Network Response Time? SUSPECT 4 APM (application performance management) tools have evolved with the cloud to measure performance at the user interface and even responsiveness at the service composition layer. This would work fine if your entire application was a self-contained island. Even if AWS is hosting most of the application environment, and files and images are served rapidly from a CDN, any significant on going business interest always has some systems of record, apps and data in an on-premises or managed data center, and user sessions will need to share data with external services. NETSCOUT Crack the Case: Clues for Solving Cloud-Based App Performance10 SOLVE THE CASE SUSPECT 3 SUSPECT 1 SUSPECT 2 EXPLORE SUSPECT 4
  • 11. In order to assure application performance, DEV OPS teams migrating workloads to AWS need real-time system-level feedback. Armed with this information, DevOps teams optimize the performance of applications that were either refactored or lifted-and-shifted to the cloud, and assured a consistent outstanding customer experience. Read how NETSCOUT’s Application Performance Management for AWS goes beyond traditional north-south traffic views, to now provide deep insights into traffic across AWS. READ NOW Seek comprehensive visibility into the interdependencies and network traffic happening across the network of the entire Hybrid IT environment, in order to track down any culprits that would never appear in a standard APM tool. NETSCOUT Crack the Case: Clues for Solving Cloud-Based App Performance11 The UI or Network Response Time? SUSPECT 4 NETSCOUT Expert Tip Clues to Solve the Case SUSPECT 3 SUSPECT 1 SUSPECT 2 EXPLORE SUSPECT 4
  • 12. An Application is an Entire Network How NETSCOUT Can Help You can’t catch a suspect you can’t see. There are already many good solutions for diagnosing integration, performance and security issues on the market for applications that run on cloud-based services like AWS. What the clue performance sleuths often miss is that a modern hybrid IT application actually crosses several organizational borders of responsibility, and its entire network is much broader and amorphous in deployment than its cloud footprint in AWS belies. User expectations for a fast, functional and flexible experience has never been higher. Time to eliminate those borders and shine a light on whole-network visibility. NETSCOUT for AWS enables more informed business decisions by removing the barriers associated with mining high-volume wire data in the AWS cloud. NETSCOUT accomplishes this by enabling real-time analyses of all data traversing the AWS infrastructure and on-premise data centers across large enterprises. Enterprise data hidden within dynamic cloud workloads transforms into timely and valuable insights. Learn more about Hybrid Cloud Visibilty and Monitoring Solutions from NETSCOUT NETSCOUT SYSTEMS, INC.® (NASDAQ: NTCT) delivers multi-purpose, real-time visibility, troubleshooting and protection wherever your technology infrastructure and business applications reside. NETSCOUT Smart Data gives technology and business teams the next- generation level of visibility to see the full range of performance, availability and security risks, earlier and with more precision, to resolve problems faster. That’s why the world’s most demanding government, enterprise and service provider organizations rely on NETSCOUT solutions to assure and protect the digital services which advance our connected world. Visit www.netscout.com or follow @NETSCOUT on Twitter, Facebook, or LinkedIn. © 2019 NETSCOUT SYSTEMS, INC. All rights reserved. NETSCOUT, and the NETSCOUT logo are registered trademarks of NETSCOUT SYSTEMS, INC., and/or its subsidiaries and/or affiliates in the USA and/or other countries. All other brands and product names and registered and unregistered trademarks are the sole property of their respective owners. CONTACT US