IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: FCAPS (fault-management, configuration, accounting, performance, and security) is an acronym for a categorical model of the working objectives of network management. There are five levels, called the fault-management level (F), the configuration level (C), the accounting level (A), the performance level (P), and the security level (S).At the F level, network problems are found and corrected. Potential  … 
Definition continues below.
Network Management Multimedia (View All Report Types)
1 - 25 of 171 Matches Previous Page  |  Next Page
Learn why NSS Labs Recommends NetScaler AppFirewall
sponsored by Citrix
WEBCAST: This exclusive webcast takes an in-depth look at application firewalls and includes a study of how one web application firewall (WAF) was able to toe the line and meet industry standards. Read on to learn more.
Posted: 28 Jan 2015 | Premiered: Jan 26, 2015

Citrix

How to Proactively Manage Your Entire Microsoft Lync Ecosystem with UC Diagnostics
sponsored by Nectar Corp
WEBCAST: This video takes a brief tour of a unified communications diagnostics platform while experts explain how it will provide you with the insight you need to manage your entire Lync ecosystem. View now to learn more.
Posted: 27 Jan 2015 | Premiered: Jan 27, 2015

Nectar Corp

A Rock-Solid Imaging and Printing Security Center
sponsored by Hewlett-Packard Limited
WEBCAST: This exclusive whebcast dives into some of the toughest challenges with print and imaging security.  Read on to learn more.
Posted: 27 Jan 2015 | Premiered: Jan 27, 2015

Hewlett-Packard Limited

A New Approach to DNS Security
sponsored by Cloudmark
VIDEO: This short video introduces a security platform that provides comprehensive protection of DNS networks, infrastructure, and traffic without the rigidity and cost of most network security solutions.
Posted: 27 Jan 2015 | Premiered: 27 Jan 2015

Cloudmark

Protecting Your Organization from DNS Security Threats
sponsored by Cloudmark
WEBCAST: This webinar provides a detailed look at common threats to DNS infrastructure, and how your enterprise can mitigate these threats.
Posted: 26 Jan 2015 | Premiered: Nov 13, 2014

Cloudmark

Cloud collaboration 101: Managing the Mobile Storm
sponsored by Telstra Global
VIDEO: This exclusive video explores a cloud collaboration solution that focuses on processes that deal with the individual over the enterprise with a consumption model that goes from system to service.
Posted: 09 Dec 2014 | Premiered: 03 Sep 2014

Telstra Global

Are You Fully Prepared for Shellshock?
sponsored by Dell Software
WEBCAST: Join this webinar for technical insight into Shellshock, and learn what you can do to protect networks and Linux-based devices from attacks.
Posted: 25 Nov 2014 | Premiered: Nov 25, 2014

Dell Software

Enable clients to communicate freely with UC & C
sponsored by Dimension Data
WEBCAST: This exclusive webcast shows you the basics of UC & C as well as key business drivers for new technology. View now to learn more.
Posted: 14 Nov 2014 | Premiered: Nov 14, 2014

Dimension Data

The Journey to Cloud
sponsored by Dimension Data
WEBCAST: This exclusive webcast takes an in-depth look at cloud communications and how they can best help your organization. View now to learn more.
Posted: 13 Nov 2014 | Premiered: Nov 13, 2014

Dimension Data

A UC Cloud Service that Does it All
sponsored by Dimension Data
WEBCAST: In this webcasts, learn the fundamentals of UC cloud services and discover the true value the cloud may have for your enterprise UC strategy.
Posted: 13 Nov 2014 | Premiered: Nov 13, 2014

Dimension Data

5 Must Haves For EMM (Webcast)
sponsored by Symantec Corporation
WEBCAST: This exclusive webcast takes an in-depth look at understanding the enterprise mobility management (EMM) market and offers 5 must-haves for an EMM solution.  Read on to learn more.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Symantec Corporation

Networking 101: The Challenge of Scale
sponsored by Extreme Networks
WEBCAST: This exclusive webcast takes an in-depth look at the challenges that come with scalability within the wireless networking. Read on to learn how simple, fast, and smart 802.11ac Wi-Fi exceeds these expectations.
Posted: 03 Nov 2014 | Premiered: Nov 3, 2014

Extreme Networks

Dell Higher Education Solutions Guide
sponsored by Dell, Inc. and Intel®
VIDEO: Accessing network data from remote locations anywhere is no longer a luxury, but an expectation. End-users expect to not only have the same experience from the network in a mobile setting, but also expect a fast and secure connection.
Posted: 14 Oct 2014 | Premiered: 22 Sep 2014

Dell, Inc. and Intel®

Why Automation is a Business Imperative for Today's MSPs
sponsored by N-able Technologies
VIDEO: Access this video to learn about the common barriers to automation. You'll also get tips on how you can overcome them.
Posted: 22 Sep 2014 | Premiered: 11 Mar 2014

N-able Technologies

Software Trial: Virtual Network Management Appliance
sponsored by ExtraHop
SOFTWARE DOWNLOAD: Amid all of the disruption from cloud computing, virtualization, and mobility in the past decade, wire data has been a constant. By mining this data, one can gain complete cross-tier insight to drive greater efficiency and IT visibility. Click here to download a virtual appliance for wire data analytics.
Posted: 11 Sep 2014 | Premiered: 11 Sep 2014

ExtraHop

Drive a New Open Networking Environment
sponsored by Dell, Inc.
VIDEO: Access this brief video to learn how you can speed innovation by implementing standards-based networking equipment, operating systems, and applications based on your unique requirements.
Posted: 11 Sep 2014 | Premiered: 11 Sep 2014

Dell, Inc.

Mitigate Mobiltiy Risks with Simple Management Platform
sponsored by Fiberlink
WEBCAST: Worforce mobility has a lot of great benefits, but there are plenty of pitfalls to go along with it.  Security risks, regulatory compliance and support on multiple platforms are just a few things that make it hard for businesses to deploy.
Posted: 29 Aug 2014 | Premiered: Aug 29, 2014

Fiberlink

Key Insights for Mobile Device Management
sponsored by Fiberlink
WEBCAST: Plenty of organizations like schools and governments rely on iOS devices everyday, but not all can manage them.  However, with the right tools iPhone, iPad and iPod touch devices can be linked seamlessly to the corporate network.
Posted: 29 Aug 2014 | Premiered: Aug 29, 2014

Fiberlink

Mobile Management and Security Essentials
sponsored by Fiberlink
WEBCAST: Smartphones and applications were at first targeted to the consumer - games, videos, and other entertainment flooded the app market.  However, these devices were quickly adopted by businesses to help further advance processes.
Posted: 29 Aug 2014 | Premiered: Aug 29, 2014

Fiberlink

Unified Windows Device Management
sponsored by Fiberlink
WEBCAST: Each entireprise is unique, so you need a flexible yet simple platform to manage your mobile environment. Enterprise IT is in the middle of a shift in how they provide support and do business, and enterprise management needs to do the same.
Posted: 29 Aug 2014 | Premiered: Aug 29, 2014

Fiberlink

Next-Generation Firewalls Classroom
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: Discover the NGFW tools currently available and the demands enterprises are placing on vendors to supply the tools they need to protect their assets in an increasingly vulnerable world.
Posted: 20 Jun 2014 | Premiered: 20 Jun 2014

SearchNetworking.com

How to Use TCO to Build a Business Case for Unified Communications
sponsored by ShoreTel
WEBCAST: Historically, IT investments were made simply in the interest of increasing competitiveness and with little insight into the hard, fact-based financial case.
Posted: 13 Aug 2014 | Premiered: Aug 13, 2014

ShoreTel

Business Communications for Dummies
sponsored by ShoreTel
WEBCAST: Learn how to leverage the power of pure IP, to provide your organization with a brilliantly simple unified communications suite that will drive collaboration and enhance productivity. With ShoreTel, end users take control of all their communication methods (voice, video, IM) – regardless of location (office, home, Starbucks, Tahiti).
Posted: 13 Aug 2014 | Premiered: Aug 13, 2014

ShoreTel

NetScaler: Visibility
sponsored by Citrix
WEBCAST: This informative resource explores one company's top-tier visibility platform and outlines how it can enhance your virtual desktop environment.
Posted: 23 Jun 2014 | Premiered: Jan 28, 2014

Citrix

Next-Level Citrix Networking Solutions for your Virtual Desktop
sponsored by Citrix
WEBCAST: This informative resource explores one company's top-tier virtual desktop tool and how the right networking tool can enhance your productivity.
Posted: 23 Jun 2014 | Premiered: Jul 25, 2011

Citrix
1 - 25 of 171 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): …  future problems are identified, and steps are taken to prevent them from occurring or recurring. In this way, the network is kept operational, and downtime is minimized.At the C level, network operation is monitored and controlled. Hardware and programming changes, including the addition of new equipment and programs, modification of existing systems, and removal of obsolete systems and programs, are coordinated. An inventory of equipment and programs is kept and updated regularly.The A level, which might also be called the allocation level, is devoted to distributing resources optimally and fairly … 
Network Management definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement