IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available  … 
Definition continues below.
Network Management White Papers (View All Report Types)
1 - 25 of 931 Matches Previous Page  |  Next Page
Uncover Threats in Network Traffic: The Ultimate Guide to SSL Inspection
sponsored by A10 Networks
WHITE PAPER: Don't let hackers evade your network defenses through encrypted traffic. Access this resource and learn ways to gain insight into encrypted data by decrypting inbound and outbound SSL traffic.
Posted: 12 Feb 2016 | Published: 30 Oct 2015

A10 Networks

OS Deployment "What Ifs" to Watch Out For
sponsored by Microsoft
WHITE PAPER: Simplifying the OS deployment process and automating the migration of existing settings and applications is a dream come true for IT. Access this technical guide and learn how to turn this dream into a reality by uncovering key deployment considerations.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

Microsoft

Moving Beyond Collaboration: Engagement is Driving Productivity and Innovation
sponsored by SPS Commerce, Inc.
WHITE PAPER: This white paper discusses how to make sure that your collaboration solution is adequately engaging your employees and helping them provide maximum value.
Posted: 11 Feb 2016 | Published: 31 Dec 2015


Must Haves for Communication Solution
sponsored by SPS Commerce, Inc.
WHITE PAPER: This paper discusses an end-to-end communications environment that reduces infrastructure complexity while meeting business requirements. Access now to see the 8 key things you need to consider for a communications solution.
Posted: 11 Feb 2016 | Published: 31 Dec 2015


Sandbox Technology: Building an Effective Breach Detection and Response Strategy
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the use of sandboxes in conjunction with established security infrastructure for threat and data breach protection. Read on to learn the best practices for choosing a sandbox solution that will be successful in protecting your networks and infrastructures.
Posted: 10 Feb 2016 | Published: 31 Oct 2015

Fortinet, Inc.

OS Upgrades and Updates Made Easy
sponsored by Microsoft
WHITE PAPER: In this resource, you'll get an overview of how you can implement and deploy operating system updates, as well as how to maintain enrolled systems. Access now and learn ways to exercise control over how devices are updated and reduce device management costs.
Posted: 10 Feb 2016 | Published: 10 Feb 2016

Microsoft

A Case for Enterprise SDN: Making Your Network Programmable
sponsored by F5 Networks
WHITE PAPER: A software-defined network (SDN) can help you spend less time managing complexities. Access this infographic and discover the steps to a seamless integration between operations and the network.
Posted: 09 Feb 2016 | Published: 31 Mar 2014

F5 Networks

Video Everywhere – It's Time to Expand Your View on Visual Communications
sponsored by Cisco
WHITE PAPER: This short resource discusses how video communications has permeated enterprises to the point where costs are low and individuals can each operate the technology from their workstations and mobile devices.
Posted: 08 Feb 2016 | Published: 30 Jun 2015

Cisco

Effective Mobile Strategies for Business
sponsored by Microsoft
WHITE PAPER: In this guide, you'll find mobile strategies that work for BYOD and corporate device scenarios. Discover ways to help users improve their productivity and protect against security threats.
Posted: 04 Feb 2016 | Published: 27 Nov 2015

Microsoft

What Can UC/Video Monitoring & Management Do For You?
sponsored by SPS Commerce, Inc.
WHITE PAPER: This paper discusses the specific enterprise benefits that you can attain by adopting top-notch voice and video collaboration systems.
Posted: 04 Feb 2016 | Published: 31 Dec 2014


The Alternative to a Flood of Nagios Alerts
sponsored by Big Panda
WHITE PAPER: This short white paper discusses how an alert correlation strategy can reduce the number of alerts you receive without sacrificing crucial network information.
Posted: 03 Feb 2016 | Published: 03 Feb 2016

Big Panda

Top Challenges and Best Practices for Virtualizing Citrix XenApp On VMware Vsphere
sponsored by eG Innovations, Inc.
WHITE PAPER: In this white paper, you will discover how a virtualized platform can offer maximum reliability, performance and scalability. Continue reading to discover five recommendations for fine-tuning your software applications.
Posted: 02 Feb 2016 | Published: 02 Feb 2016

eG Innovations, Inc.

2016 WAN Crystal Ball
sponsored by Silver Peak
WHITE PAPER: Which new trends and technologies will be game-changing in 2016? What benefits will these new concepts bring and what challenges will you have to tackle? These are just some of the questions addressed in this eBook as Silver Peak shares the predictions for the New Year and looks at the trends that are expected to go mainstream in 2016.
Posted: 01 Feb 2016 | Published: 01 Feb 2016

Silver Peak

VersaStack Solutions Based on Cisco UCS Integrated Infrastructure and IBM Storage Systems
sponsored by Ingram Micro
WHITE PAPER: This paper discusses the highlights of one infrastructure solution that focuses on replacing the disparate layers of computing, network, and storage resources with a single integrated strategy.
Posted: 21 Jan 2016 | Published: 31 Dec 2015

Ingram Micro

How to Overcome Distributed Network Security Risks
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper examines into how you can overcome the major network security risks facing distributed retail environments today. Learn how to build and maintain a secure network, protect cardholder data, and more.
Posted: 19 Jan 2016 | Published: 19 Jan 2016

WatchGuard Technologies, Inc.

Delivering Path Control Over Multiple Connections: The Foundation for Your Hybrid WAN
sponsored by Silver Peak
WHITE PAPER: This white paper reveals how you can begin the transition towards an SD-WAN deployment by incorporating path control.
Posted: 19 Jan 2016 | Published: 19 Jan 2016

Silver Peak

Top Tips for Managing a Remote Workforce
sponsored by LogicNow
WHITE PAPER: This whitepaper discusses some of the best ways to manage and protect your mobile workforce, such as setting up certain policies and key tools that can help.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

LogicNow

Compliant Calling: How Mobile Industry Regulations Influence Financial Services
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will discover how to enforce the highest standard of call compliance in your enterprise by ensuring mobile calls are recorded and under the control of network administrators. Access this white paper to understand how financial organizations are addressing the challenges of mobile call recording compliance.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

BlackBerry

Is Your Network Safe? Identifying Most Overlooked Endpoint of Them All
sponsored by HP Limited
WHITE PAPER: In this white paper, you will highlight the most critical vulnerabilities that network-connected printers pose. Read on now to enforce user authentication, admin passwords, and printer feature restriction for your network-connected endpoints.
Posted: 12 Jan 2016 | Published: 31 Jan 2015

HP Limited

The 10 Essential Network Security Best Practices for 2016
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this infographic, you will discover the top 10 essential, expert-recommended security best practices for identifying issues in real time and addressing the majority of attacks anticipated in 2016. Access this graphic to bolster your network defenses and prepare for ransomware that targets Android devices and Mac laptops, and more.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

WatchGuard Technologies, Inc.

How to Overcome Application Performance Pitfalls
sponsored by CA Technologies
WHITE PAPER: This white paper examines the top changes and challenges in application performance management to help your enterprise overcome them. Get access now to learn how APM is evolving rapidly and how to solve perennial APM issues.
Posted: 08 Jan 2016 | Published: 08 Jan 2016

CA Technologies

Is Your Network Ready for Hosted PBX?
sponsored by XO Communications
WHITE PAPER: This resource identifies 10 critical questions you need to ask hosted VoIP service providers to make sure they are willing to work with you to determine your state of cloud readiness and prepare your network for hosted communications.
Posted: 31 Dec 2015 | Published: 31 Dec 2015

XO Communications

9 reasons your Company Needs an ADC
sponsored by Citrix
WHITE PAPER: This white paper discusses how the right Application Delivery Controller (ADC) can solve your top data center and cloud architecture challenges. Uncover 9 ways an ADC can help.
Posted: 31 Dec 2015 | Published: 31 Dec 2014

Citrix

VersaStack Solutions Based on Cisco UCS Integrated Infrastructure and IBM Storage Systems
sponsored by Cisco Systems, Inc.
WHITE PAPER: This paper discusses the highlights of one infrastructure solution that focuses on replacing the disparate layers of computing, network, and storage resources with a single integrated strategy.
Posted: 29 Dec 2015 | Published: 29 Dec 2015

Cisco Systems, Inc.

SecurityCenter Continuous View and the Australian Signals Directorate's Strategies to Mitigate Targeted Cyber Intrusions
sponsored by Tenable Network Security
WHITE PAPER: This resource demonstrates how one product can enhance your endeavors to make government recommended changes to your networks in the name of security.
Posted: 29 Dec 2015 | Published: 03 Sep 2014

Tenable Network Security
1 - 25 of 931 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): … Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available in Windows Vista.In order for event forwarding to function, a service called Event Collector must be enabled on the local computer. This service creates subscriptions on remote computers and servers. Thereafter, the local computer is provided with details concerning events that take place on the remote machines. In this way, event forwarding allows an administrator to continuously collect and store information about events that occur throughout a network.
Network Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement