News

10:45 AM
Connect Directly
RSS
E-Mail
50%
50%

Sentry Insurance Boosts Performance with Application Monitoring Solution

Adopting a comprehensive application performance management tool removes administration bottlenecks and results in immediate application and system performance improvements at Sentry Insurance.

Ironically, sophisticated IT management tools can create bottlenecks for the very problems they're designed to solve. Such was the case for Sentry Insurance when an outage and subsequent slowdown affected a critical customer-facing application in spring 2010. "Although a resolution team worked on it for several months, intermittent errors still remained," recalls Jeff Sanner, director of application services for the Stevens Point, Wis.-based insurer.

Consequently, Sentry ($11 billion in total assets) began searching for a better way to manage application performance. "We wanted a tool that would help identify potential issues proactively and assist with pinpointing what ... was causing the issue," explains Shad Struble, senior technical architect for Sentry. "And we hoped for a tool that could drill down into the code level to identify issue contributors."

During April and May 2010, Sentry researched options and developed a short list of five vendors. A month later, two finalists were asked to perform back-to-back proofs of concept onsite.

"We supplied two production situations for the POC. One included the intermittent errors we were never able to resolve," Struble recounts. "Then, during its four-day POC, dynaTrace [Waltham, Mass.] was able to help locate the issue, pinpoint the problematic code and enable Sentry to initiate a trouble ticket with the responsible third-party vendor," Struble continues, declining to identify the vendor.

After inking a contract with dynaTrace in September, Sentry delayed implementation a month to take advantage of a new release of the software and allow senior developers to receive dynaTrace training. Meanwhile, to obtain the scale needed for an enterprise dynaTrace deployment, Sentry established a small dedicated server farm, some of it virtualized, using commodity hardware.

That environment includes a dedicated Microsoft SQL Server database to maximize information gathered during troubleshooting, Struble notes. "We're very interested in collecting fine-grained, long-term performance data to facilitate capacity and resource planning," he says.

A Good Problem to Have

If there was a challenge during the implementation, Struble suggests, it was a good problem to have: too much under the hood. "Because the dynaTrace solution does so much more than just business application monitoring, we're evaluating all of our tools, including dynaTrace, to determine what types of monitoring should be done by which tool," he explains.

By March 2011 Sentry completed the integration of the dynaTrace software with all critical production systems, resulting in immediate performance improvements, according to Sanner. "One of our policy administration systems involves 50 servers," he relates. "During the first quarter, our highest-activity season, the dynaTrace monitoring dashboards allowed us to identify servers and transactions that were having an issue, take them out of production and, within minutes, resolve the issue -- all without any impact to users."

Other benefits include holistic monitoring of server utilization, transaction rates and transaction response times. Overall, Struble adds, Sentry's IT department has greatly improved its ability to meet previously unattainable service-level agreements. "Root cause analysis for issues occurring in complex, many-tiered systems used to require many days and many teams," he comments. "Now it can often be accomplished with the click of a button."

Sentry plans to roll out and integrate dynaTrace across its various production, development and testing systems. Plans also call for developing more-sophisticated SLAs and creating advanced dashboards for senior management, Sanner says. "In IT we've minimized emergency drills and we're addressing issues before they occur in our production environments," he reports. "Best of all, our customers are more productive because there's less downtime and applications are more responsive."

Anne Rawland Gabriel is a technology writer and marketing communications consultant based in the Minneapolis/St. Paul metro area. Among other projects, she's a regular contributor to UBM Tech's Bank Systems & Technology, Insurance & Technology and Wall Street & Technology ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This is a secure windows pc.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.