Comprehensive guide to desktop monitoring tools
A comprehensive collection of articles, videos and more, hand-picked by our editors
What are the most reliable Web app monitoring programs? What criteria should we use to compare them?
There's no simple answer to your question. What specifically are you looking to do? Perhaps you want to do one or more of the following:
- Monitor Web server resources (CPU/memory utilization, storage, etc.)
- Monitor Web application availability and responsiveness
- Detect anomalies such as security scans, hack attempts or denial-of-service attacks
- Track page loads, click-throughs, etc. for marketing purposes
There are tools that can do each of these functions, but I don't know if one might be able to do all of them. Try Nagios, CloudFlare or Google Analytics.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Before you get too far down the path of selecting a Web app monitoring tool, here are some things to consider:
- What do the stakeholders (i.e., executive management, marketing, you) ultimately want to get out of the tool?
- What level of detail and what type of reporting are expected?
- Is the platform on which your Web apps run a common one such as IIS or Apache? Do you have customized code? Is the application off the shelf, with no access to source code? That could make things a little more difficult to monitor.
- Do you have the budget for a commercial product, or are open source and free applications (such as Google) all you can afford?
Finally, ask prospective vendors to help. Tell them your situation and your expectations, and see if there's a match. Sales talk is cheap. Don't be afraid to ask tough questions and get references, ideally from companies that work in your field.
Related Q&A from Kevin Beaver
Android Oreo replaced the allow unknown sources setting with a new feature that enables users to selectively install unknown apps. Kevin Beaver ...continue reading
Several vulnerabilities were recently discovered in Android bootloaders via the BootStomp tool. Kevin Beaver explains how they work and what risk ...continue reading
Equifax's Apache Struts vulnerability was an example of a scan not being read correctly. Kevin Beaver explains vulnerability scans and how issues can...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.