Welcome!

News Feed Item

Boundary Surpasses 400% YoY Growth in Processing of Massive IT Operations Performance Analytics in the Cloud

Big Data Startup Now Analyzing up to 2 Trillion Metrics per Day, With Over 500 Billion From AWS

MOUNTAIN VIEW, CA -- (Marketwired) -- 01/28/14 -- Boundary is processing an average of 1.5 trillion application and infrastructure performance metrics per day on behalf of its clients and has computed occasional daily bursts of over 2 trillion metrics. The daily average represents a 400% year-over-year increase driven by the growing needs of customers to deliver high quality application performance, find problems faster and avoid unplanned downtime. The fastest growing segment of data processed by Boundary, with more than 500 billion metrics per day (a 600% growth), comes from Amazon Web Services (AWS) and reflects clients' expanded use of and confidence in the cloud infrastructure for transitioning legacy enterprise applications and building new ones when paired with the unparalleled visibility Boundary provides.

Increased use of Boundary is happening because CIOs are under pressure to provide consistently high uptime for internal and public-facing applications. That puts IT Operations professionals in the position of having to know how applications and infrastructure are performing at all times, and the impact of change to their environments. Modern environments are much more complex than their predecessors, raising the degree of difficulty for IT Operations. So, they send more and more data to Boundary, which ingests, correlates and analyzes performance information on a second-by-second basis, giving IT Operations staff as well as the CIO the confidence they need to expand their use of AWS and similar services.

Ninety-nine percent of the metrics collected by Boundary's service are used to maintain a current baseline for expected business application and network performance, giving its clients strong statistics on normal business service behavior. This level of granularity enables customers to pinpoint and in some cases predict moments of risk that could jeopardize service delivery. Boundary empowers clients with actionable data by delivering the following capabilities:

  • On-premise and cloud infrastructure network flow metrics offering insight on the communication latency between services indicating risks to applications. This single source offers organizations the only SaaS solution with per-second resolution and history to help optimize their cloud-based applications.
  • Cloud adoption with confidence by helping organizations move to AWS and similar services with the same visibility they would expect to have for their on-premise applications.
  • Real-time metrics calculated and streamed to customers including bits/second (in/out), packets/second (in/out), round-trip times, out of order packets/second, re-transmits/second, and more.
  • A real-time application topology map showing all the nodes a network traffic routes across an IT infrastructure, updated to accurately reflect the current upstream and downstream impacts.
  • SaaS based means that organizations do not need to spend significant resources on scoping, procuring, deploying and maintaining hardware. As a result, clients have visibility on the first day with little to no risk.

"Boundary's real-time network layer topology has allowed us to provide instantaneous operational value for our AWS implementations," says Allen Shacklock, lead cloud architect at Scripps Networks Interactive, owner of brands such as the Food Network, HGTV and the Travel Channel. "The benefit of using a SaaS provider to visualize traffic patterns and identify problem areas quickly allows for teams to proactively solve issues without taking on additional management tasks."

"Managing a system running on AWS that supports 5000 TPS from 20+ million users is not a simple task," says Charles Chan, head of engineering at Wattpad. "Boundary makes it easy by giving us insight into what is going on at the AWS network layer in real-time. Whether it is Nginx, Elasticsearch or Redis, Boundary is able to identify any change in traffic pattern going in or come out of any particular node. If there is anything happening to our system, we are able to isolate the node that is causing the issue almost instantaneously, which means we are able to avoid issues before the majority of our users see them."

"Boundary has become our go-to instrument for seeing into the clouds," says Matt Mankins, CTO at Fast Company. "Boundary helps us sleep soundly. In the middle of a winter snowstorm, we got reports from our monitoring service that our site wasn't responding. Was it the weather? Was it Amazon EC2? Boundary helped us disambiguate and create a narrative from its charts to answer, 'What's going on?' (An intermediate network had a connectivity issue. We can sleep!). I've used Boundary graphs to explain our cloud-based app on more than one occasion. It's a great way to illustrate how our technology stack interacts - both now and historically. People of all technical levels can use the Boundary interface to help tell a story about 'what's going on.'"

"We're 100 percent in the cloud, so we had no way of monitoring the physical network," says Adam D'Amico, director of technical operations at Okta. "Previously, we could see very coarse statistics, but now we have an aggregated view and we can see fine-grained aspects of how the network is functioning. With Boundary, we can now identify specific application service traffic volumes, such as MySQL traffic and overall AWS health, so we can proactively size our cloud instances and handle peak demand."

"We've completely disrupted the legacy IT Operations software model," says Gary Read, CEO and president at Boundary. "To start, we've removed the need and cost of scoping, procuring, deploying and managing hardware that would typically consume countless hours and other valuable resources. We're giving free trials to customers and they're typically seeing millions of metrics and optimizing their applications in the first week. Most of the time spent fixing an application or infrastructure problem is focused on finding the source, and that's exactly where Boundary helps customers."

About Boundary
Boundary allows customers to monitor their entire IT environments from a single point of control and is uniquely designed to deal with challenges stemming from modern, highly distributed applications. Boundary's best-in-class enterprise event management service centralizes and correlates events, alerts and notifications from any source, enabling Ops/DevOps professionals to quickly see the total picture. Event management data is enriched by Boundary's ability to provide a real-time, all-the-time snapshot of the logical application topology. Boundary is privately held, based in Mountain View, and backed by Lightspeed Venture Partners and Scale Venture Partners. For more information on Boundary visit us on the web at www.boundary.com or on www.twitter.com/boundary.

Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2504769

Boundary contact:
Kevin Wolf
TGPR
(650) 327-1641
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
SYS-CON Events announced today that eCube Systems, a leading provider of middleware modernization, integration, and management solutions, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. eCube Systems offers a family of middleware evolution products and services that maximize return on technology investment by leveraging existing technical equity to meet evolving business needs. ...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...