The New Stack Podcast

Defensive Strategies for Your Stack

Episode Summary

On today’s episode of The New Stack Makers, TC Currie is joined by Sean Armstrong, VP of Products at AppNeta, a SaaS company providing actionable, end-to-end network performance monitoring for their customers.   “The performance of your application,” Armstrong said, “is subject to how well the customer runs their own network & how well the internet between you and your customer is actually working. So you could get blamed for poor performance that’s completely outside of your control, and they use AppNeta to diagnose and troubleshoot those problems. ”With the explosion of SaaS companies and APIs providing building blocks for the modern IT stack, many if not most of its components are outside of their control.  In addition, with the rise of remote working, it’s likely your users are no longer in a central office.   Traditional monitoring is about making sure that your devices are healthy.  But you simply can’t do that when you don’t own the devices. “You need visibility after your firewall,” he said.

Episode Notes

On today’s episode of The New Stack Makers, TC Currie is joined by Sean Armstrong, VP of Products at AppNeta, a SaaS company providing actionable, end-to-end network performance monitoring for their customers.  

“The performance of your application,” Armstrong said, “is subject to how well the customer runs their own network & how well the internet between you and your customer is actually working. So you could get blamed for poor performance that’s completely outside of your control, and they use AppNeta to diagnose and troubleshoot those problems.

”With the explosion of SaaS companies and APIs providing building blocks for the modern IT stack, many if not most of its components are outside of their control.  In addition, with the rise of remote working, it’s likely your users are no longer in a central office.  

Traditional monitoring is about making sure that your devices are healthy.  But you simply can’t do that when you don’t own the devices. “You need visibility after your firewall,” he said.