Welcome!

News Feed Item

Boundary Releases Major Product Upgrades That Help Customers Find Problems 75% Faster

Boundary Helps IT Operations Find Issues and Prevent Outages by Speeding Up Root Cause Analysis

MOUNTAIN VIEW, CA -- (Marketwired) -- 02/26/14 -- Boundary announces major upgrades to its cloud-based consolidated IT operations monitoring software. Boundary's latest capabilities include a vastly improved user experience, customized event dashboards, and faster deployments of Boundary meters. Boundary also has extended meter coverage and capabilities to better handle denial of service attacks and support three new operating systems: Fedora 14, OS-X and openSUSE.

Boundary's latest product announcement comes on the heels of a major milestone that the company's service reached in January: processing an average of 1.5 trillion application and infrastructure performance metrics per day on behalf of clients, a 400% year-over-year increase.

Boundary's newly released capabilities for consolidated IT operations monitoring and event management are summarized here:

New UI & Contextual Navigation
Based on customer feedback, user experience analysis and streamlined workflow research, Boundary has developed a new UI that vastly reduces the time needed to identify and resolve performance problems. A redesigned vertical navigation bar improves screen space utilization and contextual filters help users quickly navigate from problem notification (event view) to impact analysis (topology view) to detailed diagnostics (streams view) in a matter of seconds -- a 75% efficiency improvement from the previous version of Boundary and a massive advantage compared to the time similar activities take using legacy on-premise tools.

Customized Event Dashboards
Boundary now lets end-users easily create customized event dashboards that provide a "single pane of glass" showing which systems are generating the most events. For example, you can see how many events are coming from New Relic, Chef, Nagios and other monitoring tools in one view. Event dashboards can include detailed information such as how many AWS events are being generated by specific AWS API calls.

Faster Deployments
Boundary has significantly accelerated deployments of meters. By eliminating the need for user input on initial installation, companies can more easily use automated change management tools such as Chef and Puppet to deploy and manage the Boundary meter on Windows machines. Boundary also introduced the capability to deploy the same meter using install parameters referencing appropriate tags as well as the ability to install the meter in multiple locations at once such as Test, Staging and Production. These enhancements reduce IT deployment time while adding increased automation. Finally, on servers with many thousands of simultaneous connections running on Linux systems, the meter now starts many times faster on heavily loaded servers.

Resiliency Support
Boundary has improved local filtering which prioritizes application traffic in the meter. For example, if a meter cannot connect to the Boundary service the customer now has the option of storing the flows locally at the client and then streaming them once connectivity is back. This is especially useful when guarantees and SLA's are relevant.

Decreased Memory Usage and Improved Buffering
Boundary has improved free memory cache efficiency, resulting in memory now being yielded to the OS more aggressively resulting in a 50% reduction in average memory usage. Improved IPFIX data buffering prevents a large build-up of data to be transmitted, reducing memory utilization in high-traffic scenarios. This also improves the meter's handling of Denial of Service (DoS) scenarios by 60% as Boundary has reduced the meter's memory utilization to avoid contributing to the traffic load and risk of server crashes.

"Traditional IT monitoring systems are not keeping pace with the highly-distributed and highly dynamic nature of IT environments today, which are dependent upon hundreds of services, applications and hybrid networks. Boundary's solution continues to push the needle by analyzing more data from more places faster, integrating disparate tools for a comprehensive view and having a low impact on IT resources in the process," says Bernd Harzog, Performance and Capacity Management Analyst for The Virtualization Practice.

"Outbrain's global content discovery platform depends upon hundreds of services and data sources, which makes the task of tracking interactions between components a massive undertaking," says Shai Peretz, SVP Operations & IT at Outbrain. "Yet doing so is critical due to our highly-distributed infrastructure. We rely upon Boundary to uncover and track anomalies in data flows and to optimize load balancing and configurations. Boundary gives us better visibility across the entire environment, which makes it easier to fix problems when they come up."

"This is our most significant product announcement to date, and is in direct response to the complex needs of our customers who are hosting applications across the cloud and on-premise. They need to maintain high reliability and uptime while keeping infrastructure costs as low as possible," says Gary Read, CEO of Boundary. "They also need their applications and services to perform amid security threats and network unpredictability. The latest version of Boundary is well-equipped to help IT organizations to more easily navigate these issues and help them find problems faster than ever before."

Coming Soon
Boundary is also announcing limited availability for enhanced event collaboration features. Unlike traditional event consoles, the Boundary collaboration view allows IT operations staff to share information directly from within the event console, so that they don't lose the context of the issue. All information is automatically captured and stored for future reference. Boundary will also soon release the capability to set up advanced notification rules specifying whom should be notified when specific conditions occur. Employees will be able to receive notifications via email, voice, or SMS. Customers can also use their own proprietary notification systems such as PagerDuty.

About Boundary
Boundary allows customers to monitor their entire IT environments from a single point of control and is uniquely designed to deal with challenges stemming from modern, highly distributed applications. Boundary's best-in-class centralized IT operations monitoring and enterprise event management services centralize and correlate events, alerts and notifications from any source, enabling Ops/DevOps professionals to quickly see the total picture. Event management data is enriched by Boundary's ability to provide a real-time, all-the-time snapshot of the logical application topology. Boundary is privately held, based in Mountain View, and backed by Lightspeed Venture Partners and Scale Venture Partners. For more information on Boundary visit us on the web at www.boundary.com or on www.twitter.com/boundary.

Boundary contact:

Kevin Wolf
TGPR
(650) 327-1641
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
SYS-CON Events announced today that SD Times | BZ Media has been named “Media Sponsor” of SYS-CON's 20th International Cloud Expo, which will take place on June 6–8, 2017, at the Javits Center in New York City, NY. BZ Media LLC is a high-tech media company that produces technical conferences and expositions, and publishes a magazine, newsletters and websites in the software development, SharePoint, mobile development and commercial UAV markets.
SYS-CON Events announced today that Cloudistics, an on-premises cloud computing company, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Cloudistics delivers a complete public cloud experience with composable on-premises infrastructures to medium and large enterprises. Its software-defined technology natively converges network, storage, compute, virtualization, and management into a ...
Historically, some banking activities such as trading have been relying heavily on analytics and cutting edge algorithmic tools. The coming of age of powerful data analytics solutions combined with the development of intelligent algorithms have created new opportunities for financial institutions. In his session at 20th Cloud Expo, Sebastien Meunier, Head of Digital for North America at Chappuis Halder & Co., will discuss how these tools can be leveraged to develop a lasting competitive advanta...
Building custom add-ons does not need to be limited to the ideas you see on a marketplace. In his session at 20th Cloud Expo, Sukhbir Dhillon, CEO and founder of Addteq, will go over some adventures they faced in developing integrations using Atlassian SDK and other technologies/platforms and how it has enabled development teams to experiment with newer paradigms like Serverless and newer features of Atlassian SDKs. In this presentation, you will be taken on a journey of Add-On and Integration ...
Now that the world has connected “things,” we need to build these devices as truly intelligent in order to create instantaneous and precise results. This means you have to do as much of the processing at the point of entry as you can: at the edge. The killer use cases for IoT are becoming manifest through AI engines on edge devices. An autonomous car has this dual edge/cloud analytics model, producing precise, real-time results. In his session at @ThingsExpo, John Crupi, Vice President and Eng...
There are 66 million network cameras capturing terabytes of data. How did factories in Japan improve physical security at the facilities and improve employee productivity? Edge Computing reduces possible kilobytes of data collected per second to only a few kilobytes of data transmitted to the public cloud every day. Data is aggregated and analyzed close to sensors so only intelligent results need to be transmitted to the cloud. Non-essential data is recycled to optimize storage.
"I think that everyone recognizes that for IoT to really realize its full potential and value that it is about creating ecosystems and marketplaces and that no single vendor is able to support what is required," explained Esmeralda Swartz, VP, Marketing Enterprise and Cloud at Ericsson, in this SYS-CON.tv interview at @ThingsExpo, held June 7-9, 2016, at the Javits Center in New York City, NY.
As businesses adopt functionalities in cloud computing, it’s imperative that IT operations consistently ensure cloud systems work correctly – all of the time, and to their best capabilities. In his session at @BigDataExpo, Bernd Harzog, CEO and founder of OpsDataStore, will present an industry answer to the common question, “Are you running IT operations as efficiently and as cost effectively as you need to?” He will expound on the industry issues he frequently came up against as an analyst, and...
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem" ...
After more than five years of DevOps, definitions are evolving, boundaries are expanding, ‘unicorns’ are no longer rare, enterprises are on board, and pundits are moving on. Can we now look at an evolution of DevOps? Should we? Is the foundation of DevOps ‘done’, or is there still too much left to do? What is mature, and what is still missing? What does the next 5 years of DevOps look like? In this Power Panel at DevOps Summit, moderated by DevOps Summit Conference Chair Andi Mann, panelists l...
In their Live Hack” presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, provided the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems. This “Live Hack” used open source attack tools that are free and available for download by anybody. Attendees learned where to find and how to operate these tools for the purpose of testing their own IT infrastructure. The...
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
The modern software development landscape consists of best practices and tools that allow teams to deliver software in a near-continuous manner. By adopting a culture of automation, measurement and sharing, the time to ship code has been greatly reduced, allowing for shorter release cycles and quicker feedback from customers and users. Still, with all of these tools and methods, how can teams stay on top of what is taking place across their infrastructure and codebase? Hopping between services a...
Virtualization over the past years has become a key strategy for IT to acquire multi-tenancy, increase utilization, develop elasticity and improve security. And virtual machines (VMs) are quickly becoming a main vehicle for developing and deploying applications. The introduction of containers seems to be bringing another and perhaps overlapped solution for achieving the same above-mentioned benefits. Are a container and a virtual machine fundamentally the same or different? And how? Is one techn...