IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: FCAPS (fault-management, configuration, accounting, performance, and security) is an acronym for a categorical model of the working objectives of network management. There are five levels, called the fault-management level (F), the configuration level (C), the accounting level (A), the performance level (P), and the security level (S).At the F level, network problems are found and corrected. Potential  … 
Definition continues below.
Network Management White Papers (View All Report Types)
101 - 125 of 1036 Matches Previous Page  |  Next Page
Security and Privacy on the Encrypted Network
sponsored by Blue Coat Systems
WHITE PAPER: Explore this white paper to learn how decryption is a necessary tool in network security and monitoring.
Posted: 16 Apr 2015 | Published: 20 Jan 2015

Blue Coat Systems

Network Encryption and its Impact on Enterprise Security
sponsored by Blue Coat Systems
WHITE PAPER: In this research report, discover just how complicated SSL/TLS decryption and inspection methodologies have become and learn why you should make encrypted traffic management a near-term priority to address sophisticated SSL cyber threats.
Posted: 15 Apr 2015 | Published: 27 Feb 2015

Blue Coat Systems

Best Practices in BYOD
sponsored by BlackBerry
WHITE PAPER: Access this white paper now to discover the 7 best practices for choosing the right BYOD solution for your organization.
Posted: 15 Apr 2015 | Published: 26 Dec 2014

BlackBerry

Meet BYOD Challenges
sponsored by SHI International Corporation
WHITE PAPER: In this white paper, discover one potential BYOD solution that delivers an access-agnostic approach which leverages a universal security and compliancy policy across all devices, while also reducing the IT burden with an easy-to-use self-registration process.
Posted: 14 Apr 2015 | Published: 28 Mar 2014

SHI International Corporation

5 Key Design Principles for Security Professionals
sponsored by Gigamon
WHITE PAPER: In this white paper, discover 5 key design principles for security professionals looking to better protect their networks from the latest generation of cyber criminals.
Posted: 14 Apr 2015 | Published: 26 Sep 2014

Gigamon

Leveraging Traffic Visibility and IPS for Comprehensive Continuous Monitoring
sponsored by Gigamon
WHITE PAPER: In this white paper, you will discover one powerful solution that can leverage traffic visibility and an intrusion protection system for continuous monitoring of the network.
Posted: 14 Apr 2015 | Published: 26 Dec 2014

Gigamon

Enabling Comprehensive Visibility and Real-Time Threat Protection
sponsored by Gigamon
WHITE PAPER: This white paper explains how one potential security solution is capable of providing comprehensive visibility, protecting you from malware and more.
Posted: 13 Apr 2015 | Published: 25 Jul 2014

Gigamon

Case Study How the University of Wisconsin-Madison Achieved Large-Scale Data Center Monitoring
sponsored by Gigamon
WHITE PAPER: In this white paper, you'll discover how the University of Wisconsin-Madison was able to adapt its WAN design to accommodate the increasing volume of data without sacrificing the high level of security the research facilities required.
Posted: 13 Apr 2015 | Published: 26 Sep 2014

Gigamon

Case Study: How University of Glasgow Scaled its Intrusion Detection System to Support 30,000 Users
sponsored by Gigamon
WHITE PAPER: In this white paper, you'll discover how one IDS infrastructure solution helped the IT professionals at the University of Glasgow upgrade their limited network for easier monitoring and increased protection.
Posted: 13 Apr 2015 | Published: 27 Jun 2014

Gigamon

The Next Generation of Business Communications
sponsored by SHI International Corporation
WHITE PAPER: In this white paper, you'll discover one potential UC&C solution that can enhance collaboration while reducing communication, travel and real estate costs.
Posted: 09 Apr 2015 | Published: 25 Apr 2014

SHI International Corporation

Busting myths about mobility: Why tablets are more than just companion devices
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This exclusive white paper takes an in-depth look at BYOD and mobile device management, exposing common myths about mobility and much more. Read on to learn more.
Posted: 06 Apr 2015 | Published: 26 Nov 2014

Dell, Inc. and Intel®

Solve the Dropbox Problem with Enterprise Content Connectors
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn how to provide a secure IT sanctioned and monitored approach to allowing access to Dropbox.
Posted: 06 Apr 2015 | Published: 20 Mar 2015

Accellion, Inc.

Efficient Cloud Connectivity Ensures Optimal Cloud Connection
sponsored by Level 3 Communications, Inc.
WHITE PAPER: This white paper explains the attraction to the cloud, and why many enterprises are now migrating their internal data center infrastructure and business applications to public and private clouds.
Posted: 03 Apr 2015 | Published: 31 Dec 2014

Level 3 Communications, Inc.

Attack Mitigation Service
sponsored by Radware
WHITE PAPER: This comprehensive white paper provides an in-depth explanation of all of the latest cyber threats and explains the benefits of one potential cyber security solution.
Posted: 02 Apr 2015 | Published: 02 Apr 2015

Radware

3 Questions to ask Endpoint Security Vendors
sponsored by Great Bay
WHITE PAPER: Access this white paper now to discover how you can put your endpoint security vendor to the test by asking 3 key questions.
Posted: 02 Apr 2015 | Published: 02 Apr 2015

Great Bay

5 Keys to Unlock an Easy Network Access Control Implementation
sponsored by Great Bay
WHITE PAPER: In this white paper, you'll discover the 5 keys to unlocking easier NAC implementation.
Posted: 02 Apr 2015 | Published: 02 Apr 2015

Great Bay

How to Drive Your Cloud Strategy with Private Network Solutions
sponsored by Level 3 Communications, Inc.
WHITE PAPER: This white paper highlights cloud challenges, bridging clouds and networks together, the shared responsibility of security, and more.
Posted: 01 Apr 2015 | Published: 01 Apr 2015

Level 3 Communications, Inc.

8 Ways Better Endpoint Visibility Can Knock Out Network Headaches
sponsored by Great Bay
WHITE PAPER: In this white paper, you'll learn how to streamline multiple IT initiatives with an endpoint profiling approach.
Posted: 01 Apr 2015 | Published: 01 Apr 2015

Great Bay

Is Your Network Truly Secure? A Solution to Full Network Visibility and Protection
sponsored by Great Bay
WHITE PAPER: This white paper explains how one company was able to implement a simple solution to increase their network visibility and improve network security.
Posted: 01 Apr 2015 | Published: 01 Apr 2015

Great Bay

Unruly NAC agents? Unveil a superior foundation for network security instead
sponsored by Great Bay
WHITE PAPER: In this white paper, you'll learn why enterprises agonize over NAC deployments and you'll discover a new approach to full network security.
Posted: 31 Mar 2015 | Published: 31 Mar 2015

Great Bay

What's really on your network?
sponsored by Great Bay
WHITE PAPER: Access this white paper now to learn 5 tips for securing your network from rogue devices.
Posted: 31 Mar 2015 | Published: 31 Mar 2015

Great Bay

The Enterprise Mobile Security Technology Buyer's Guide
sponsored by Dropbox for Business
WHITE PAPER: In this research report, Forrester Research, Inc., defines the use cases, business value, and outlook for the 14 technologies at the heart of mobile security.
Posted: 30 Mar 2015 | Published: 13 Dec 2013

Dropbox for Business

The Shifting Role of IT Balancing Corporate Needs and Employee Expectations
sponsored by Dropbox for Business
WHITE PAPER: In this white paper, you'll learn what you need to do to effectively secure your enterprise data in this world of BYOA movements.
Posted: 30 Mar 2015 | Published: 28 Mar 2014

Dropbox for Business

Hybrid Cloud Places New Demands on the Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this analyst report, discover what changes IT decision-makers had to make to their networks, and how smart IT teams choose the right cloud network.
Posted: 28 Mar 2015 | Published: 30 Apr 2014

Juniper Networks, Inc.

Readiness, Benefits, and Barriers: An SDN Progress Report
sponsored by Juniper Networks, Inc.
WHITE PAPER: This report gives you an inside look at how IT leaders in the United States feel about the rise of SDN.
Posted: 27 Mar 2015 | Published: 28 Nov 2014

Juniper Networks, Inc.
101 - 125 of 1036 Matches Previous Page    3 4 5 6 7 8    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): …  future problems are identified, and steps are taken to prevent them from occurring or recurring. In this way, the network is kept operational, and downtime is minimized.At the C level, network operation is monitored and controlled. Hardware and programming changes, including the addition of new equipment and programs, modification of existing systems, and removal of obsolete systems and programs, are coordinated. An inventory of equipment and programs is kept and updated regularly.The A level, which might also be called the allocation level, is devoted to distributing resources optimally and fairly … 
Network Management definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement