Comprehensive software reviews to make better IT decisions
Stackify Changes Pricing Model for Retrace
Stackify has changed the pricing model for its APM tool, Retrace. This change in pricing is in line with usage-based shifts in technology along with changing architectures.
Earlier this year, software vendor Stackify began phasing in a new pricing model for Retrace, its application performance monitoring (APM) tool.
Unlike most traditional APM tools, such as Dynatrace and AppDynamics, which tend to be more focused on the needs of infrastructure and operations teams, Retrace is an APM tool marketed primarily to developers as a way to improve performance and quality of their code.
Retrace is a Software as a Service (SaaS) solution. Users install the Retrace agent on their physical or virtual machines to collect log data, errors, and exceptions. These agents send the data to Retrace, where it is centralized for analysis and reporting to generate actionable insights. Retrace users can log in through their browser to analyze performance using the graphical user interface (GUI).
In its older pricing model, Stackify charged Retrace users in a very traditional way: based on the number of agents deployed across their infrastructure. Each physical or virtual machine would require an agent for visibility into the performance of applications running on that box.
In the new model, Retrace will no longer be priced per agent, but instead based on the number of traces, number of logs, and log retention period that customers use, as detailed on Retrace’s pricing page.
This change from an agent-based to a trace- and log-based pricing model is in line with other changes Info-Tech has observed in enterprise IT, both in technology usage and in changing architectures.
As is evident in the rise of cloud services such as AWS Lambda and Elasticsearch, many organizations have become more comfortable with paying according to usage-based models such as queries or API calls rather than other arbitrary elements such as the number of users of an application.
The old agent-based model posed a number of problems – for instance, organizations that run larger numbers of smaller instances in the cloud to use for horizontal scaling end up paying more in licensing than if they were to vertically scale their cloud instances by increasing the CPU and memory of the individual instances.
Some users might be inclined to try to save money on licensing by packing multiple applications onto a single machine – something that was common back in the days of physical servers on premises but was quickly abandoned with the rise of virtualization allowing for improved segmentation of applications and services and simplified administration of the VMs.
In short, a per-agent model means that a customer running the same workloads and using Retrace for the same use cases might pay vastly different fees depending on the customer’s underlying architecture. And this doesn’t even address the added complexities of the agent-based model if the organization is running applications in containers.
Abandoning the agent-based model in favor of a usage-based model makes a good deal of sense for Stackify’s customers. Indeed, in a briefing with Info-Tech, Stackify representatives noted that this change was driven by comments that customers had, as well as by Stackify’s mission to make the solution more widely available by making it more affordable for individual developers.
Want to Know More?
Q headlines a bevy of announcements at AWS re:Invent 2023 in Las Vegas that shed more light on the cloud service provider’s AI strategy and where its differentiation from other vendors lies.
This note outlines some tips and tricks that you should be aware of when embarking on the installation and configuration of a Kubernetes cluster. Such an endeavor should only be attempted if the need for an enterprise-grade container orchestration solution is required.
It’s simply not enough today to pit your traditional application security toolkit against today’s advanced threats, especially those attacks that target APIs or mobile platforms. Bolstering your CI/CD pipeline by introducing more advanced and accurate SAST, SCA, IAST, and DAST will most certainly improve your security posture, but the journey does not end there. There are attacks and use cases that need careful consideration for how you approach security. Appdome believes it has those unknown challenges addressed and can significantly improve your application security program with very little effort from your development and security team, a welcome change from solutions that required a good bit of work to introduce problem-free into your code base four years ago.
This post provides a review of Zoom’s 2023 conference, Zoomtopia 2023. Core aspects covered include what major product releases and upgrades Zoom announced at Zoomtopia 2023, and what these announcements mean for Zoom’s market positioning in 2024.
Contact center as a service (CCaaS) enterprise providers are steamrollering ahead with embedding generative AI functionality in their platforms – whether organizations are prepared for it or not. In this post, I explore a positive outlook for how generative AI can be used to enhance organizations' customer experience capabilities while generating ROI. This includes: 1. Listing the major use cases for generative AI in the contact center. 2. Discussing how we might calculate ROI from utilizing generative AI in the contact center. 3. Considering what organizations can do to prepare for CCaaS vendors’ release of generative AI functionality.
In June 2023, I decided to remove the password on my primary email account as well as the one used to log-in to all of my devices. Did I wait too long? Am I too optimistic this will work without issue? Are there kinks that still need to be worked out? I recently attended Identiverse 2023 and got a FIDO2 hardware token intending at some point in the future to go passwordless. Why wait though? I was pumped up with all the passkey and passwordless sessions I attended and was eager to try this out and share my experience.
If you’re in the market for a password manager or are interested in secrets management, Bitwarden has a powerful platform for you. This unified platform is delivered via a thoughtful and intuitive UI, which Bitwarden Password Manager users will recognize. Bitwarden ranks as top of the Leader Quadrant in SoftwareReviews under the Password Management category, and the company believes its optimized, wide-range passwordless solution set will address most organizations’ needs.
Next-generation firewalls were smarter than previous firewalls, able to deeply analyze traffic and integrate with complementary security solutions. Today our needs are more complex, however, with a 742% increase in software supply chain attacks over the past three years. Sonatype Nexus Firewall has been paying attention and claims its firewall product is smarter about these attacks.
Have you ever thought of what else you could do to take your security operations center (SOC) to the next level and focus on prevention? Look no further – external attack surface management (EASM) was a popular managed service and topic of discussion at Rivest–Shamir–Adleman (RSA) Conference 2023, named after a popular public-key cryptosystem.