IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: FCAPS (fault-management, configuration, accounting, performance, and security) is an acronym for a categorical model of the working objectives of network management. There are five levels, called the fault-management level (F), the configuration level (C), the accounting level (A), the performance level (P), and the security level (S).At the F level, network problems are found and corrected. Potential  … 
Definition continues below.
Network Management White Papers (View All Report Types)
1 - 25 of 961 Matches Previous Page  |  Next Page
How to Stay Connected in a World Booming With Data and Innovation
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource highlights the importance of staying connected within the business world, and particularly focuses on the Asia-Pacific region.
Posted: 30 Jan 2015 | Published: 26 Nov 2014

Cisco Systems, Inc.

5 steps to simplify APM for business-wide results
sponsored by IBM
WHITE PAPER: Find out how you can simplify your APM strategy in just 5 steps and overcome common challenges.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

IBM

Leverage the Network Infrastructure for Competitive Success
sponsored by Cisco Systems, Inc.
WHITE PAPER: This IDC report examines the opportunity midmarket firms have in leveraging network infrastructure for competitive success in the new cloud and mobility era. Inside, learn how midmarket firms can improve their competitive position by providing more efficient access to advanced productivity resources.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Cisco Systems, Inc.

DDoS Attack Mitigation Technologies Demystified
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive whitepaper dives into the technologies used traditionally to detect and mitigate DDoS attacks, and how they evolved to the stands they're at today. Read on to learn more.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

Fortinet, Inc.

Enterprises Reveal Significant Room for Improvement In Their Security Defenses
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource explores the results of a survey that depicts that lack of confidence that organizations have in their security defenses, and also presents an approach to detecting malware to prevent it from spreading throughout the network.
Posted: 27 Jan 2015 | Published: 01 Feb 2015

Hewlett-Packard Company

The Zero Trust Model Of Information Security
sponsored by Zscaler
WHITE PAPER: This white paper introduces the Zero Trust Model of information security, which eliminates the idea of trusted and untrusted networks in favor of viewing all network traffic as untrusted.
Posted: 27 Jan 2015 | Published: 22 Oct 2014

Zscaler

Sharpen your device, data and document security
sponsored by Hewlett-Packard Limited
WHITE PAPER: This exclusive white paper dives into some of the toughest challenges with data security.  Read on to learn more.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Hewlett-Packard Limited

Enhancing Business Value with an Optimised Wireless Network
sponsored by Hewlett-Packard Limited
WHITE PAPER: This exclusive white paper takes an in-depth look at one holistic, end-to-end network portfolio that was able to deliver a rock-solid wireless experience to end users. Read on to learn more.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

Hewlett-Packard Limited

Improving Wireless Connectivity for Your Users
sponsored by Hewlett-Packard Limited
WHITE PAPER: This exclusive white paper takes an in-depth look at improving the wireless experience your end-users expect while also keeping the pros in IT security happy. Read on to learn more.
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Hewlett-Packard Limited

How to Prepare Your Network for IEEE 802.11ac
sponsored by Hewlett-Packard Limited
WHITE PAPER: This exclusive white paper discusses the history that led to the IEEE 802.11ac standard and the considerations you need to weigh before you decide to deploy it. This new WLAN technology is being introduced in the market in two waves. Read on to learn more.
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Hewlett-Packard Limited

ADCs for SaaS That Are Scalable, Adaptable, Affordable & Simple
sponsored by Array Networks
WHITE PAPER: Check out this white paper to discover the attributes of a SaaS optimized ADC and how these attributes link to the requirements of DevOps and infrastructure teams tasked with operationalizing SaaS applications.
Posted: 22 Jan 2015 | Published: 01 Jul 2014

Array Networks

Comcast Ethernet V. Dark Fiber: The Dark Side of Dark Fiber
sponsored by Comcast
WHITE PAPER: This white paper investigates the dark side of dark fibers used for networking, and may not be the best solution to meet your business needs.
Posted: 21 Jan 2015 | Published: 21 Jan 2015

Comcast

Mobile from an Enterprise Perspective
sponsored by IBM
WHITE PAPER: Becoming a mobile enterprise is about re-imagining your business around constantly connected customers and employees. This exclusive white paper takes an in-depth look at key challenges with mobility.  Read on to learn more.
Posted: 21 Jan 2015 | Published: 21 Jan 2015

IBM

A Sensible Guide to Latency Management
sponsored by Comcast
WHITE PAPER: Check out this white paper to uncover the story behind latency—complete with the causes, effects, and its components.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

Comcast

Converged Management Platforms for Lync Environments: A Powerful Collaboration
sponsored by Nectar Corp
WHITE PAPER: This exclusive white paper dives into the powerful collaboration between Converged Management Platforms (CMP) and Microsoft Lync environments. Read on to learn more.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

Nectar Corp

Protecting Users from Firesheep and other Sidejacking Attacks with SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the Firesheep Wi-Fi attack tool and other sidejacking attacks with SSL and explains how to avoid these attacks.
Posted: 15 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Protecting DNS Infrastructure: An Internet Utility That Demands New Security Solutions
sponsored by Cloudmark
WHITE PAPER: This exclusive white paper details key factors about the DNS threat landscape and offers a look at different security risks and types of attacks hackers are using to disrupt the network today. Read on to learn more.
Posted: 13 Jan 2015 | Published: 13 Jan 2015

Cloudmark

Enterprise Mobility-as-a-Service
sponsored by Dimension Data
WHITE PAPER: This exclusive white paper dives into Enterprise Mobility-as-a-Service (EMaaS) and explains the benefits that come along with this new option. Read on to learn more.
Posted: 12 Jan 2015 | Published: 12 Jan 2015

Dimension Data

Infographic: Data Traffic Security is a Mess
sponsored by Certes Networks
WHITE PAPER: This infographic visually displays the sobering results of a recent survey on what are IT decision makers doing to secure and segment their sensitive data traffic.
Posted: 09 Jan 2015 | Published: 09 Jan 2015

Certes Networks

A Smarter Approach to Network Encryption
sponsored by Certes Networks
WHITE PAPER: This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.
Posted: 09 Jan 2015 | Published: 16 Dec 2014

Certes Networks

Get Your Facts Straight About HP ProLiant Gen9 Servers
sponsored by Hewlett-Packard Company
WHITE PAPER: View this informative resource to discover how this specific line of HP servers promises the lowest cost, fastest time, and highest value of IT service delivery.
Posted: 06 Jan 2015 | Published: 01 Dec 2014

Hewlett-Packard Company

Smooth Operator: The Benefits of Software-defined Networking
sponsored by Fluke Networks
WHITE PAPER: This exclusive white paper takes an in-depth look at SDN and the key challenges that come along with it. Read on to learn more.
Posted: 02 Jan 2015 | Published: 02 Jan 2015

Fluke Networks

Citrix NetScaler- A Foundation for Next-Generation Datacenter Security
sponsored by Citrix
WHITE PAPER: This exclusive white paper takes an in-depth look at traditional security concerns, plus a look at new security models that are paving the way today. Read on to learn more.
Posted: 02 Jan 2015 | Published: 02 Jan 2015

Citrix

The Active Advantage: Why Networking Leaders Are Embracing ADC Clustering
sponsored by Citrix
WHITE PAPER: This white paper highlights a new option for ADCs, and is also the first appliance to support active-active clustering.
Posted: 31 Dec 2014 | Published: 31 Dec 2014

Citrix

Long-Distance IT: Driving Efficiency in Remote Offices
sponsored by Citrix
WHITE PAPER: This exclusive white paper takes an in-depth look at increasing the efficiency of IT in remote offices. Read on to learn more.
Posted: 02 Jan 2015 | Published: 02 Jan 2015

Citrix
1 - 25 of 961 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): …  future problems are identified, and steps are taken to prevent them from occurring or recurring. In this way, the network is kept operational, and downtime is minimized.At the C level, network operation is monitored and controlled. Hardware and programming changes, including the addition of new equipment and programs, modification of existing systems, and removal of obsolete systems and programs, are coordinated. An inventory of equipment and programs is kept and updated regularly.The A level, which might also be called the allocation level, is devoted to distributing resources optimally and fairly … 
Network Management definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement