SHARE
Facebook X Pinterest WhatsApp

Why IT Monitoring Tools Are Not Stopping Outages

Dec 29, 2016

Why IT Monitoring Tools Are Not Stopping Outages

Why IT Monitoring Tools Are Not Stopping OutagesWhy IT Monitoring Tools Are Not Stopping Outages

Network complexities result in a growing number of outages, with human error playing a role. And using ineffective network monitoring tools makes things worse.

Bumpy TransitionBumpy Transition

74% of the tech professionals surveyed said network changes lead to outage or performance issues at least several times a year, and 12% said this happens several times a week.

DowntimeDowntime

79% said it takes at least an hour to resolve a networking issue, and 19% said it takes no less than six hours to do so.

Blind EyeBlind Eye

66% of the respondents said that existing network monitoring solutions predict less than half of all network performance issues or outages.

Employee InputEmployee Input

60% said that users report at least a quarter of all network outages or service interruptions, with 16% indicating that these users report no less than 75% of the interruptions.

Slow BurnSlow Burn

For 64% of user-discovered network problems, at least an hour passes before a user reports it. In 22% of cases, this process takes at least six hours.

Hands-On ProcessHands-On Process

69% said their network team uses manual checks (such as inspecting configurations) to verify that the network is functioning as needed, and 57% said their team monitors live traffic and events for anomalies after every change.

Complex ChallengeComplex Challenge

59% of the respondents said the growing complexity of networks is leading to more outages.

People ProblemPeople Problem

45% said human error causes frequent, most or all network outages.

Questioning ComplianceQuestioning Compliance

76% of the respondents said their company has to fulfill network compliance requirements, and 25% expressed doubt that their network is compliant.

Safe and SoundSafe and Sound

59% reported that network security and segmentation are properly implemented throughout their company’s network.

Recommended for you...

5 Tips For Fostering Enterprise Network Security
Shannon Flynn
Jun 15, 2022
What is Serverless Computing?
Aminu Abdullahi
Apr 29, 2022
Advantages and Disadvantages of Serverless Computing
Drew Robb
Apr 26, 2022
What are Microservices?
Shelby Hiter
Apr 6, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.