This content is part of the Essential Guide: How to achieve application performance improvement in ops

application monitoring and management (AMM)

Contributor(s): Matthew Haughn

Application monitoring and management is the administrative area and associated tools involved with overseeing the operation of business software and ensuring that it functions and performs as expected.

Application monitoring is often conducted by application performance management (APM) software integrated with the monitored application. The software records statistics like transaction times, system response, transaction volume and back end infrastructure health and sends them to the administrator of the program. The administrator typically explores the data in an APM dashboard to evaluate the performance of the application overall as well as the performance of its components.

AMM explores application performance from a number of perspectives:

  • How efficient is a given application in terms of its use of compute, memory and storage resources? Is response time acceptable?
  • What is the behavior of traffic flows between the user and application front tier and between application tiers and application components?
  • How is the performance of the application desktop client?

Monitoring the application identifies shortcomings and inconsistencies, allowing them to be isolated and corrected. The process should also detect whether the problem is in the architecture and provisioning of the application, in the network between users and apps or on the client side.

This was last updated in September 2016

Continue Reading About application monitoring and management (AMM)

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Which APM software is your company likely to choose?


File Extensions and File Formats

Powered by:


  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...