Data Activity Monitoring Gartner Magic Quadrant

Posted By admin On 09.10.19

Recently, analyst house released their 2019. Gartner defines Network Performance Monitoring and Diagnostics (NPMD) as tools that “leverage a combination of packet data, flow data and infrastructure metrics to provide historical, real-time and predictive views into the availability and performance of the network and the application traffic running on it.” NPMD programs collect integral information about a network’s performance and diagnose problems using a combination of AIOps functions and end-user experience analysis.

  1. Gartner Monitoring Magic Quadrant

Database activity monitoring (DAM, a.k.a Enterprise database auditing and Real-time protection) is a database security technology for monitoring and analyzing database activity that operates independently of the database management system (DBMS) and does not rely on any form of native (DBMS-resident) auditing or native logs such as trace or transaction logs. Moving from a Challenger to a Leader, Gartner praises TIBCO for being a “well-rounded and powerful analytics platform”: “In addition to having end-to-end development and deployment capabilities, TIBCO successfully addresses the underserved data science IoT analytics domain.

Typically, NPMD vendors provide either software or hardware appliances (sensors, switches, etc.).The Magic Quadrant lists 16 different NPMD vendors and highlights their offerings, their strong suits, and their weaknesses. At Solutions Review, we read the report, and pulled out everything that’s changed in the NPMD sector from. NPMD market developments and new criteriaGartner noted some major developments in the NPMD market, particularly in the buyers and development of the products. Their report notes a continuing divide between the types of customers that buy NPMD solutions. Gartner wrote that some customers focus solely on infrastructure monitoring, while others also include packet monitoring in their priorities. Gartner also discussed several technological innovations in the space, including an increasing use of AI and cloud-based monitoring.

Quadrant

These developments are something to note when considering the future of NPMDs.Because NPMD tools are evolving, Gartner made some changes to their evaluation criteria for NPMD solutions. First, they loosened data source support requirements. Now, NPMD tools only need to support at least two of the three major data sources: infrastructure metrics, flow, or packets.

Previously, applicable offerings had to support all three. Second, Gartner increased the minimum revenue requirements for consideration, citing differing market dynamics.

Gartner Monitoring Magic Quadrant

Which vendors are still here, and who’s gone?Gartner divides Magic Quadrants into four categories: Leaders, Challengers, Visionaries, and Niche Players. Chosen vendors are ranked on both their completeness of vision and their ability to execute. From this ranking, Gartner then places the vendor into one of the four categories.Last year, there were 22 vendors on the Magic Quadrant; this year, there were only 16. Two vendors were added this year: LogicMonitor and Broadcom. Seven vendors were dropped: CA Technologies (acquired by Broadcom), Corvil, Infovista, Ipswitch, Paessler, Savvius (acquired by LiveAction) and Statseeker.

It should be noted that all dropped vendors were listed as Honorable Mentions by Gartner, meaning they still come up in NPMD inquiries but no longer meet Gartner’s evaluation requirements. Analyzing the four categories LeadersLast year’s three Leaders – NetScout, Riverbed, and VIAVI – are still in the same quadrant this year.

However, Gartner moved ExtraHop from the Visionaries category to the Leaders segment. ExtraHop’s commitment to AIOps integration and improvement of visualizations helped Gartner label them as a Leader this year. ChallengersSolarWinds is the sole Challenger in this year’s Magic Quadrant, as CA Technologies (now Broadcom) moved to the Visionaries category. SolarWinds has focused on increased scalability over the past year, and they consolidated all their NPMD offerings into one tool – Network Automation Manager (NAM). VisionariesThe Visionaries category lost Cisco (moved to Niche Players) and Corvil (not listed), but gained Broadcom from the Challengers quadrant and AppNeta from the Niche Players.

The Broadcom acquisition of CA Technologies, completed in November, might have long-term effects that will change their position next year. Gartner cited AppNeta’s growth and sales performance over the past year. ColaSoft, LiveAction, and SevOne retained their Visionaries spot. Niche PlayersThe Niche Players quadrant saw the most changes this year.

Of last year’s Niche Players, only Accedian, ManageEngine, Micro Focus, and New H3C Group remain. LogicMonitor, a new vendor this year, was cited as being easy to use despite a roadmap that lags behind other solutions.

Cisco, previously a Visionary, has suffered from a lack of awareness by customers of their NPMD solutions, despite their solid financial situation and brand recognition.You can read the full Gartner Magic Quadrant report.Check us out on for the latest in NetMon news and developments!

This article needs additional citations for. Unsourced material may be challenged and removed.Find sources: – ( September 2017) Database activity monitoring (DAM, a.k.a Enterprise database auditing and Real-time protection ) is a technology for monitoring and analyzing database activity that operates independently of the (DBMS) and does not rely on any form of native (DBMS-resident) auditing or native logs such as trace or transaction logs. DAM is typically performed continuously and in real-time.Database activity monitoring and prevention (DAMP) is an extension to DAM that goes beyond monitoring and alerting to also block unauthorized activities.DAM helps businesses address mandates like the (PCI DSS), the (HIPAA), the (SOX), U.S. Government regulations such as NIST 800-53, and EU regulations.DAM is also an important technology for protecting sensitive databases from external attacks by cybercriminals. According to the 2009 Verizon Business’ Data Breach Investigations Report—based on data analyzed from Verizon Business’ caseload of 90 confirmed breaches involving 285 million compromised records during 2008—75 percent of all breached records came from compromised database servers.According to, “DAM provides privileged user and application access monitoring that is independent of native database logging and audit functions. It can function as a compensating control for privileged user separation-of-duties issues by monitoring administrator activity. The technology also improves database security by detecting unusual database read and update activity from the application layer.

Database event aggregation, correlation and reporting provide a database audit capability without the need to enable native database audit functions (which become resource-intensive as the level of auditing is increased).”According to a survey by the Independent Oracle User Group (IOUG), “Most organizations do not have mechanisms in place to prevent database administrators and other privileged database users from reading or tampering with sensitive information in financial, HR, or other business applications. Most are still unable to even detect such breaches or incidents.”refers to this category as “database auditing and real-time protection”. Contents.Common use cases for DAM Privileged User Monitoring: Monitoring privileged users (or ), such as (DBAs), developers, and outsourced personnel – who typically have unfettered access to corporate databases – is essential for protecting against both external and internal threats. Privileged user monitoring includes auditing all activities and transactions; identifying anomalous activities (such as viewing sensitive data, or creating new accounts with superuser privileges); and reconciling observed activities (such as adding or deleting tables) with authorized change requests.Since most organizations are already protected at the perimeter level, indeed a major concern lies with the need to monitor and protect from privileged users. There is a high correlation therefore between and the need to protect from the. This is a complex task as most privileged users are capable of using sophisticated techniques to attack the database - stored procedures, triggers, views and obfuscated traffic - attacks that may be difficult to detect using traditional methods.In addition, since targeted attacks frequently result in attackers gaining privileged user credentials, monitoring of privileged activities is also an effective way to identify compromised systems.As a result, auditors are now demanding monitoring of privileged users for security best practices as well as a wide range of regulations.