What happens when you move to the public cloud?

What happens when you move to the public cloud?

What happens when you move to the public cloud?Cloud computing clearly offers some very attractive benefits for significant elements of an enterprises business

Many companies have made the move (generally in-part) to the public cloud; Moving major parts of their application stack to Amazon, Microsoft and others, reducing their in-house data centers, moving from a mainly capital expense to a mainly operation expense IT model. Most companies though have placed limits on what part of their business have moved to the public cloud, some choosing to engage in private and hybrid clouds where they can continue to host secure elements of their application stack in ways that are more controlled from a privacy and security point of view.

Having some of the application stack in the public cloud and some in private environments often leads to a fracturing of the way that the entire application stack can be monitored, with the public cloud elements using solutions that look mainly at java-based applications, and struggling to monitor legacy databases, applications, platforms and middleware. And the complexity of monitoring across demilitarized/security zones between private and public IT environments is often beyond the experience of recently hatched monitoring companies, and they don’t see the potential return on making this kind of a technology investment.

So many companies accept that their private and public IT environments will have separate tool-sets to monitor each of their components of the application stack. This leads to an increase in the complexity of monitoring the complete business application stack and can lead to a lower than optimal user experience and higher overall costs.

Because the different opex and capex models used by public cloud and in-house or virtual datacenter driven private and hybrid clouds lead to different IT teams, it can be hard sometimes to truly understand the overall impact of not having a single way of monitoring the entire business application, until an “event” takes place which provides absolute clarity.

Every business will at some point, have to deal with an event that spans the entire application stack.

This may be a user experience event, a regulatory compliance event or a security event. And without a single view of the entire business process each “silo” of technology will be able to point at the other silo’s and show that they are not the issue. This back and forth is not just expensive and time consuming, but a real risk to the viability of the business. And it’s after this type of an “event” that the executive team will look at what they can do to improve their command and control.

This is when we at Nastel often get a call, because we uniquely span the entire enterprise business application stack from public clouds, to private and hybrid clouds; from java apps to mainframe apps and databases, from middleware to platforms to infrastructure elements. Nastel provides a simple and consistent way of following a business transaction from user, through the entire stack and back to the user. Everything monitored on every system and presented as a consistent visual allowing the user experience to be the driving force of the discussion. Imagine that, you can see a business transaction flowing through the entire application stack from a technical or business perspective, look at groups of transactions by any criteria you choose. Predictively identify points of risk before they actually are noticeable by the user, even when they are the result of thousands of data points converging.

At Nastel it doesn’t matter what technology you use, if it forms part of your business, we know it’s important to monitor!



Nastel Technologies uses machine learning to detect anomalies, behavior and sentiment, accelerate decisions, satisfy customers, innovate continuously.  To answer business-centric questions and provide actionable guidance for decision-makers, Nastel’s AutoPilot® for Analytics fuses:

  • Advanced predictive anomaly detection, Bayesian Classification and other machine learning algorithms
  • Raw information handling and analytics speed
  • End-to-end business transaction tracking that spans technologies, tiers, and organizations
  • Intuitive, easy-to-use data visualizations and dashboards

If you would like to learn more, click here