Why Are Enterprises Slow To Adopt Observability?

Modern enterprises depend upon being reliable, effective, and frictionless - especially in providing end-to-end digital services. However, increasing complexity means the demands on IT departments to keep their systems functioning without interruption get tougher with each passing day. 

Many in the IT engine room are eyeing observability tools as a solution. Not only are these designed to achieve optimal performance, compliance, and resilience in digital environments, but they also provide visibility across entire networks, infrastructures, systems, applications, and databases. 

In other words, observability encompasses more than just a simple monitoring tool. By using cross-domain data correlation, machine learning, and AIOps, observability provides the actionable business insights needed to identify and fix issues in real time.

For those who have embraced this approach, the results speak for themselves. According to SolarWinds 2023 IT Trends Report, almost all (96%) of those who had adopted observability tools recorded improved customer service. Seven in ten (71%) said they could innovate faster, while the same number said they could reduce the average time taken to solve issues.

Strong Headwinds: What Are the Barriers to Adopting Observability?

With such a seemingly strong case for observability, why are so many enterprises yet to embrace it? Especially when, according to SolarWinds’ own research, outages and other downtime can cost organisations $13.7M (£11M) a year. 

In truth, many are still in the early stages of their observability journey. And while plenty of leaders possess the drive to make the necessary changes, strong headwinds can hinder progress. In some cases, a ‘cultural resistance' to change can dismiss the need for a new approach. IT leaders may prefer to stick with what they know rather than try an unfamiliar tool. 

It could be down to a lack of communication, concerns over resources, or a need for more skills and training.

And it goes without saying that as soon as you start discussing the automation of tasks, talk inevitably turns to concerns about whether such a decision is a precursor to job losses.

Then there is the technology itself. There are numerous observability solutions available. And while choice is normally a good thing, in this case, the sheer volume of options can make things overwhelming.

On their own, any one of these issues can impede the timely adoption of observability. Combined, it’s easy for IT departments to be paralysed by indecision. Faced with such challenges, sometimes the easiest path is to delay. 

What’s clear is that there are plenty of reasons why enterprises are holding back. More than seven in ten (72%) reported that the accelerating pace of technological change - including apps and networks - was problematic, with 58% citing the growing complexity of modern applications.

A similar number said that observability blind spots in today’s modern networks - including cloud, tunnels, and databases - also made life difficult. At the same time, just over half (52%) said that insufficient observability budgets were an ’extremely challenging’ obstacle.

Significant Rewards: What Are the Benefits of Observability?

And yet, for those who overcome ‘decision paralysis,’ the rewards are significant. Such solutions lead to greater automation, reduced tool sprawl, and the 20/20 vision afforded by comprehensive single-pane-of-glass visibility.

According to the survey, enterprises that adopted observability saw a 233% improvement in the auto-escalation of IT service management (ITSM) or help desk tickets. They also recorded a 213% increase in performance for the auto-remediation of simple alerts. In fact, they saw improvement across the board in a way that not only fosters transparency and collaboration but also encourages a culture of ongoing review.

The message is clear. By accelerating insights, improving data integrity and resilience, implementing automation, and reducing human error - all while supporting data privacy regulations - observability can play a crucial role in guaranteeing the effective delivery of digital services in an era of mounting IT complexity. 

Rob Johnson is VP and Global Head of Solutions Engineering at SolarWinds

Image: John Barkiple 

You Migh Also Read: 

Under A Watchful Eye - Unified Observability:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Shielding Your Teen's Digital Footprint
Beware Of Online Fraud When Booking Your Summer Holiday »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA) is a non-profit organization dedicated to leading a diversified research agenda in the field of cyber conflict.

Exida

Exida

Exida is a leading product certification and knowledge company specializing in industrial automation system safety, security, and availability.

Verint Systems

Verint Systems

Verint is a leader in CX automation. The world’s most iconic brands rely on our open platform and team of AI-powered bots to create tangible AI business outcomes, now.

Coro Cybersecurity

Coro Cybersecurity

Coro (formerly Coronet) empowers organizations to protect against malware, ransomware, phishing, and botnets - across devices, users, and cloud applications.

Graphus

Graphus

Graphus provides a simple, powerful, automated solution that eliminates 99% of social engineering and spear phishing attacks against G Suite business Gmail users.

Cryptsoft

Cryptsoft

Cryptsoft provides key management and security software development toolkits based around open standards such as OASIS KMIP and PKCS#11.

FifthDomain

FifthDomain

We are a specialist cyber security education and training company tackling the global cyber security skills shortage.

Activu

Activu

Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations including network security.

Fluid Attacks

Fluid Attacks

Fluid Attacks specialize in red team operations as well as technology development that continuously enhance our security testing services.

QuSecure

QuSecure

QuSecure provides a software-driven security architecture that overlays your current infrastructure and provides next-generation security to protect your entire network from quantum threats.

Spyderbat

Spyderbat

Spyderbat ATI closes the manual investigation gap between detection and response by instantly presenting causally connected threat activity to security analysts at the onset of an investigation.

Recon InfoSec

Recon InfoSec

The Recon InfoSec team includes analysts, architects, engineers, intrusion specialists, penetration testers, and operations experts.

443ID

443ID

443ID brings OSINT data to Identity Security professionals on any digital platform.

GoPlus Security

GoPlus Security

GoPlus is working as the "security infrastructure" for web3, by providing open, permissionless, user-driven Security Services.

GoTo

GoTo

At GoTo we help people and businesses to connect and collaborate simply and securely – from anywhere. We’re the trusted partner for companies of all sizes.

Health Sector Cybersecurity Coordination Center (HC3)

Health Sector Cybersecurity Coordination Center (HC3)

HC3 was created by the US Department of Health and Human Services to aid in the protection of vital, controlled, healthcare-related information.