Managing application sprawl

clock • 2 min read
Managing application sprawl
Image:

Managing application sprawl

The tangle of modern applications and digital services needs observability by design

Application sprawl is a modern business curse. It's the inevitable result of the difficulty (or perhaps impossibility) of rolling out digital services in an orderly fashion. There's always something that needs doing yesterday, and something else that is going to take years to launch. Individual departments make their own software choices, and these options don't always meet in the middle. Then there are legacy applications which must be kept for licensing or contractual reasons, or because there's nothing that can really replace them, and these must coexist alongside the new and shiny. Inevitably there are workarounds, compromises and duplication - and security holes too.

Managing this application sprawl is time-consuming and complex. As digital services are deployed in a constant cycle of ‘develop, operate, analyse', they must be managed and secured across their lifecycle. Therefore, it's no surprise that organisations across almost all industries are seeking more visibility into their operations and the way the various solutions interact, for better performance and enhanced security.

The most capable digital service management tools are device-, location- and OS-agnostic - working across on-prem and multi-cloud environments to provide a consolidated picture of an organisation's applications, how they are performing, and whether they are secure.

Join us on 7th December for a special web seminar in which we reveal our bespoke research findings in this area and explores how companies are approaching digital service management and security throughout the software development lifecycle.

We'll also be touching on current opinion around issues such as open-source software, containerisation, cloud native infrastructure and cloud migration, all of which add options but sometimes at the cost of complexity. How can we extract the positives while minimising the sprawl? Given the presence of legacy how far can observability be retrofitted?

The webinar Observability by design: How application observability empowers digital service management and security success takes place at 3 pm GMT on 07 December. Register today.

 

 

More on Threats and Risks

The exploit means anyone can potentially locate secret military bases by uploading fake running data - underscoring the importance of IoT protection and security

Strava fitness app used to spy on Israeli military officials

The flaw has also exposed the locations of a number of sensitive sites in the country.

clock 21 June 2022 • 3 min read
Hertzbleed vulnerabiity in AMD and Intel CPUs could leak cryptographic keys

Hertzbleed vulnerabiity in AMD and Intel CPUs could leak cryptographic keys

Intel says an attack probably wouldn't work outside a lab environment

John Leonard
clock 16 June 2022 • 2 min read
Ransomware gang deploys BlackCat to attack hotel and creates searchable website of hacked data

Ransomware gang deploys BlackCat to attack hotel and creates searchable website of hacked data

Cyber-criminal groups have recently ramped up their use of Ransomware-as-a-Service (RaaS) BlackCat/ALPHA-V, first identified by security researchers in November 2021, and upped the ante by publishing the hacked data on a dedicated website.

clock 15 June 2022 • 1 min read