IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available  … 
Definition continues below.
Network Management White Papers (View All Report Types)
101 - 125 of 1004 Matches Previous Page  |  Next Page
Overcoming Challenges to Optimizing Cloud-Native App Delivery
sponsored by A10 Networks
WHITE PAPER: Learn to overcome the roadblocks of application-centric organizations by moving toward cloud-based environments and accelerating the adoption of cloud-native application architectures.
Posted: 09 Feb 2017 | Published: 09 Feb 2017

A10 Networks

Not all SD-WANs are Created Equal: Performance Matters
sponsored by Silver Peak
WHITE PAPER: Learn how to evaluate high performance SD-WANs to ensure you're picking the right one for your enterprise.
Posted: 09 Feb 2017 | Published: 30 Sep 2016

Silver Peak

Upcoming SD-WAN Trends
sponsored by Silver Peak
WHITE PAPER: If you're thinking about adopting a SD-WAN at your enterprise, then it's best if you have a solid grasp on the upcoming trends that will soon impact it. Learn the hottest, upcoming SD-WAN trends from David Hughes, founder and CEO of Silver Peak.
Posted: 09 Feb 2017 | Published: 30 Dec 2016

Silver Peak

5 Questions to Help You Find the Right Unified Monitoring Solution
sponsored by Paessler
WHITE PAPER: A high-performing IT infrastructure is a necessity in today's hypercompetitive, always-on world. And a network monitoring solution is an essential part of that. But one size does not fit all. Discover 5 questions to help you choose a monitoring solution that's right for your company.
Posted: 26 Jan 2017 | Published: 31 Mar 2015

Paessler

Automate Zero Trust Policy and Enforcement
sponsored by FireMon
WHITE PAPER: In October 2016, Forrester Consulting evaluated enterprise firewall management and configuration auditing approaches. Discover Forrester's findings in this resource that highlight the importance of implementing firewall management and configuration auditing solutions sooner rather than later.
Posted: 25 Jan 2017 | Published: 30 Dec 2016

FireMon

Why Performance Matters When Building Your New SD-WAN
sponsored by Silver Peak
WHITE PAPER: As enterprise IT considers ways to improve WAN functionality and service levels while lowering costs, the interest in SD-WANs has dramatically increased. But not all SD-WANs are created equal. Learn how to evaluate high performance SD-WANs to ensure you're picking the right one for your enterprise.
Posted: 24 Jan 2017 | Published: 30 Nov 2016

Silver Peak

Upcoming SD-WAN Trends
sponsored by Silver Peak
WHITE PAPER: If you're thinking about adopting a SD-WAN at your enterprise, then it's best if you have a solid grasp on the upcoming trends that will soon impact it. Learn the hottest, upcoming SD-WAN trends from David Hughes, founder and CEO of Silver Peak.
Posted: 24 Jan 2017 | Published: 30 Dec 2016

Silver Peak

Case Study: St. Luke's Health Network Builds for Growth
sponsored by AppNeta
WHITE PAPER: In this white paper learn how a fast growing healthcare system in Pennsylvania utilized a performance monitoring tool to provide reliable application performance to application owners with no technical background.
Posted: 28 Dec 2016 | Published: 28 Dec 2016

AppNeta

Beyond the Trial: Taking OpenStack into Production
sponsored by Nokia
WHITE PAPER: This resource aims to improve your implementation of OpenStack as you transition from a trial phase into full production. By taking the steps detailed inside you can move to a production level and prepare for the next stage: utilizing the cloud for its agility and resilience.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

Nokia

Beyond the Trial: Fulfilling OpenStack’s Promise of Dynamism
sponsored by Nokia
WHITE PAPER: Once you have employed OpenStack, the next step is to harness the dynamism that's inherent in virtualization and cloud computing models. This white paper details the 3 essential steps to take to fully leverage the benefits of the cloud virtual network in an OpenStack environment.
Posted: 01 Dec 2016 | Published: 31 Oct 2016

Nokia

The Case for Modern Network Security Operations
sponsored by Forcepoint
WHITE PAPER: In this ESG white paper, examine how network security operations are completely fraught with challenges that need to be met in order for your organization to effectively protect itself.
Posted: 16 Nov 2016 | Published: 30 Sep 2016

Forcepoint

Side-by-Side Comparison: Hardware – vs. Software-Centric Networks
sponsored by VMware
WHITE PAPER: If you still use a hardware-centric network, you know that provisioning a network into production is a time-consuming process. It doesn't have to be that way. This infographic provides a side-by-side comparison of hardware- vs. software-centric networks, so you can learn how much time and money you could be saving by virtualizing your network.
Posted: 01 Nov 2016 | Published: 31 May 2016

VMware

Agility Matters: Extending the Benefits of Virtualization to the Network
sponsored by VMware
WHITE PAPER: This white paper explains how network virtualization is able to meet today's network demands by automating traditionally manual IT processes. Learn how network virtualization can enable greater agility at your business by accessing now.
Posted: 01 Nov 2016 | Published: 31 May 2016

VMware

Don't Box-In Your Career: Build Your Expertise In Network Virtualization
sponsored by VMware
WHITE PAPER: Making network virtualization a core competence will soon be a necessary addition to your professional skills as an enterprise network manager or architect. Access this white paper to learn how new credentials in network virtualization will make you incredibly valuable in your organization and put you ahead of your peers.
Posted: 31 Oct 2016 | Published: 31 Aug 2016

VMware

Encourage Business Users To Have Even Higher Expectations For Network Velocity And Agility
sponsored by VMware
WHITE PAPER: Physical networks are certainly more powerful and intelligent than they were in the past, but they still lack agility, security, and flexibility. You can't afford to be constrained by those limits. This white paper explains how you can meet demands and even anticipate them with the speed of change that network virtualization provides.
Posted: 31 Oct 2016 | Published: 31 Aug 2016

VMware

How Companies Are Putting IT Automation to Work
sponsored by VMware
WHITE PAPER: This white paper includes 3 case studies that reflects how each company was able to remedy their data center challenges by way of IT automation with network virtualization. Learn how IT automation can enable greater agility and consistency without breaking the bank.
Posted: 26 Oct 2016 | Published: 30 Jun 2016

VMware

Evaluating Inline Security Fabric: Key Considerations
sponsored by Ixia
WHITE PAPER: To address the issues with inline security monitoring, many organizations are deploying a resilient security fabric. Learn more about high-performing security fabrics that protect network availability and increase the inspection of traffic entering and leaving your network.
Posted: 09 Feb 2017 | Published: 30 Dec 2016

Ixia

Plan Your Firewall Migration to Increase Security Resilience
sponsored by Ixia
WHITE PAPER: This paper examines best practices for maximizing uptime and achieving high availability during a firewall migration.
Posted: 09 Feb 2017 | Published: 30 Dec 2016

Ixia

5 Ways to Maximize the Value of Security & Monitoring Tools
sponsored by Ixia
WHITE PAPER: ROI is an important factor for evaluating the value of your network security infrastructure. In this white paper, learn how you can start eliminating visibility and security blind spots and extend the life of your monitoring tools.
Posted: 08 Feb 2017 | Published: 30 Dec 2016

Ixia

Fast Breach Mitigation Without Network Disruption
sponsored by Ixia
WHITE PAPER: With network breaches unfolding with growing frequency, your ability to quickly mitigate a crisis begins with knowing where it occurred, and what data was compromised. Discover how to capture the critical data you need to respond more rapidly to emerging situations.
Posted: 08 Feb 2017 | Published: 30 Dec 2016

Ixia

Do You Trust Your Network Security?
sponsored by Ixia
WHITE PAPER: Protecting your network requires a deeper strategy than simply buying security inspection tools, integrating them, and expecting them to comprehensively inspect all of your traffic. Learn how to test your network elements before you go live in order to provide your organization the confidence that your network can survive an attack.
Posted: 06 Feb 2017 | Published: 30 Dec 2016

Ixia

The Operational and Business Benefits of VMware vRealize Operations
sponsored by Blue Medora
WHITE PAPER: Discover the results of an independent study into VMware's vRealize Operations, an IT management tool, specifically highlighting the ROI delivered to users.
Posted: 19 Dec 2016 | Published: 30 Sep 2014

Blue Medora

Leveraging Big Data For IT Operations Analytics
sponsored by Blue Medora
WHITE PAPER: In this resource, learn how network monitoring tools that unify operational analytics onto as few platforms as possible can help you transform mountains of data into a useful story for data center staff and the C-suite alike.
Posted: 19 Dec 2016 | Published: 30 Sep 2016

Blue Medora

3 Steps To A Comprehensive View of IT Operations
sponsored by Blue Medora
WHITE PAPER: In this white paper, learn the 3 steps to a comprehensive view of IT operations in virtualized and cloud environments. Gain the visibility into your physical and virtual infrastructure for root cause analysis, predictive analytics, and overall infrastructure management.
Posted: 19 Dec 2016 | Published: 29 Jul 2016

Blue Medora

Top Three Gaping Holes in Your Data Security
sponsored by Globalscape
WHITE PAPER: Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Globalscape
101 - 125 of 1004 Matches Previous Page    3 4 5 6 7 8    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): … Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available in Windows Vista.In order for event forwarding to function, a service called Event Collector must be enabled on the local computer. This service creates subscriptions on remote computers and servers. Thereafter, the local computer is provided with details concerning events that take place on the remote machines. In this way, event forwarding allows an administrator to continuously collect and store information about events that occur throughout a network.
Network Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement