- Automated simulation of end user access &transactions.
- Tracking of real end user transactions with deep analyzing of packets.
- Accurate calculation of application availability & performance like time response to the end users
- Accurate calculation of SLA breaches.
- Linking gathered data from different sources to business service hierarchy.