IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available  … 
Definition continues below.
Network Management White Papers (View All Report Types)
176 - 200 of 1070 Matches Previous Page  |  Next Page
Building a Trust-Based Internet of Things
sponsored by Aruba Networks
WHITE PAPER: This white paper discusses the security you need to implement as the IoT pervades every part of the enterprise. Included within is a description of how the IoT is changing certain industries specifically, and what you'll need to do to secure your business.
Posted: 15 Feb 2016 | Published: 31 Dec 2015

Aruba Networks

How to Design a Network for Mobile Initiatives
sponsored by Aruba Networks
WHITE PAPER: This guide details how to design your network for mobile initiatives. Learn how to overcome the key challenges facing network administrators today in setting up and managing a modern infrastructure, including security and access control, defining network users, and more.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

Aruba Networks

A Case for Enterprise SDN: Making Your Network Programmable
sponsored by F5 Networks
WHITE PAPER: A software-defined network (SDN) can help you spend less time managing complexities. Access this infographic and discover the steps to a seamless integration between operations and the network.
Posted: 09 Feb 2016 | Published: 31 Mar 2014

F5 Networks

Video Everywhere: It's Time to Expand Your View on Visual Communications
sponsored by Dimension Data
WHITE PAPER: This short resource discusses how video communications, the new trend in visual communications and collaboration, has permeated enterprises to effectively allow users to connect to anything and everything, even from outside the boardroom.
Posted: 08 Feb 2016 | Published: 30 Jun 2015

Dimension Data

How to Overcome Distributed Network Security Risks
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper examines into how you can overcome the major network security risks facing distributed retail environments today. Learn how to build and maintain a secure network, protect cardholder data, and more.
Posted: 19 Jan 2016 | Published: 19 Jan 2016

WatchGuard Technologies, Inc.

Delivering Path Control Over Multiple Connections: The Foundation for Your Hybrid WAN
sponsored by Silver Peak
WHITE PAPER: This white paper reveals how you can begin the transition towards an SD-WAN deployment by incorporating path control.
Posted: 19 Jan 2016 | Published: 19 Jan 2016

Silver Peak

Top Tips for Managing a Remote Workforce
sponsored by LogicNow
WHITE PAPER: This whitepaper discusses some of the best ways to manage and protect your mobile workforce, such as setting up certain policies and key tools that can help.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

LogicNow

The 10 Essential Network Security Best Practices for 2016
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this infographic, you will discover the top 10 essential, expert-recommended security best practices for identifying issues in real time and addressing the majority of attacks anticipated in 2016. Access this graphic to bolster your network defenses and prepare for ransomware that targets Android devices and Mac laptops, and more.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

WatchGuard Technologies, Inc.

Market Guide for Software-Defined WAN
sponsored by Silver Peak
WHITE PAPER: This Gartner report analyzes the SD-WAN marketplace today, and gives recommendations for companies looking to purchase SD-WAN technology. Read on to learn more about the key findings of the report so that you can make the best decision for your networking needs.
Posted: 15 Dec 2015 | Published: 15 Dec 2015

Silver Peak

How to Assure Application Performance and QoS at Scale
sponsored by VMTurbo
WHITE PAPER: In this white paper, you will learn the benefits gained from incorporating network traffic and topology information in VM placement decisions—including increased application performance and enhanced QoS.
Posted: 03 Dec 2015 | Published: 03 Dec 2015

VMTurbo

How Software-Defined WAN Can Maximize VoIP Reliability and Performance
sponsored by Citrix
WHITE PAPER: This short paper provides an overview of how software-defined wide area network (SD-WAN) technology can improve your VoIP experience by ensuring quality connections even when individual MPLS and Internet links suffer from interruptions and unreliable performance.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

Citrix

What's New in Unified Communications
sponsored by Dell Software
WHITE PAPER: Whether you're motivated by curiosity or talking points, this guide will help you find the information you need to stay up-to-date on important features and enhancements in the unified communications market.
Posted: 18 Nov 2015 | Published: 18 Nov 2015

Dell Software

Readying your Infrastructure for the Internet of Things
sponsored by F5 Networks
WHITE PAPER: In this white paper you will discover how the IoT will impact our daily lives moving forward. Read on to learn how early adopters of IoT technology have seen benefits like enhanced customer service and improved use of field assets and devise a strategy to reap similar benefits in your organization.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

F5 Networks

Choosing a Network Architecture Provider
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper features tips on how to evaluate and select the right data center network architecture. Discover answers to three key questions.
Posted: 22 Oct 2015 | Published: 31 Dec 2014

Juniper Networks, Inc.

Understand The Anatomy of Attacks to Stay One Step Ahead
sponsored by OpenDNS
WHITE PAPER: In this white paper, learn the 7 (often repetitive) steps of a cybersecurity attack. View now to learn how to leverage DNS to gain east-west visibility into your network and stop hidden attacks before your data is compromised.
Posted: 08 Oct 2015 | Published: 02 Sep 2015

OpenDNS

Uncover Threats in Network Traffic: The Ultimate Guide to SSL Inspection
sponsored by A10 Networks
WHITE PAPER: Don't let hackers evade your network defenses through encrypted traffic. Access this resource and learn ways to gain insight into encrypted data by decrypting inbound and outbound SSL traffic.
Posted: 12 Feb 2016 | Published: 30 Oct 2015

A10 Networks

Are Sandboxes the Key to Network Security?
sponsored by Fortinet, Inc.
WHITE PAPER: This report by Forrester explores how sandboxes are becoming an essential part of a comprehensive network breach prevention, detection, and response strategy. Uncover their pros and cons, and learn best practices for picking a sandbox technology that can successfully protect your network.
Posted: 10 Feb 2016 | Published: 31 Oct 2015

Fortinet, Inc.

Compliant Calling: How Mobile Industry Regulations Influence Financial Services
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will discover how to enforce the highest standard of call compliance in your enterprise by ensuring mobile calls are recorded and under the control of network administrators. Access this white paper to understand how financial organizations are addressing the challenges of mobile call recording compliance.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

BlackBerry

Case Study: Save Money and Speed Application Performance
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Learn why failing to make necessary upgrades to slow application performance could threaten business success.
Posted: 25 Nov 2015 | Published: 25 Nov 2015

Riverbed Technology, Inc.

Privacy and Safety: How SSL Certificates Empower Your Business
sponsored by Symantec Website Security Solutions
WHITE PAPER: In this infographic, learn the 6 golden rules for selecting an SSL or TLS certificate as well as tips and best practices for simple implementation and management. Discover how to put your users' minds to rest with the right SSL.
Posted: 11 Nov 2015 | Published: 07 Oct 2015

Symantec Website Security Solutions

Superior Network Service Provisioning and Performance
sponsored by Cisco Systems, Inc and Citrix
WHITE PAPER: This whitepaper dives into one possible network solution that claims to deliver scalable network capabilities that can gracefully handle even the most demanding applications. Make wait time a thing of the past, and unleash your applications with the right infrastructure to support them.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

Cisco Systems, Inc and Citrix

Solidify Your Network Protection with Internal Segmentation Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper you will learn the ins and outs of deploying an ISFW. Learn how to protect your company from the latest advanced security threats and compartmentalize access to sensitive data and apps.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.

Internal Segmentation Firewall: Protecting Your Network from the Inside Out
sponsored by Fortinet, Inc.
WHITE PAPER: In this brief white paper, you will discover if an internal segmentation firewall is the best form of protection for your users and applications. Learn how to enforce more granular security with policy-based segmentation, and contain threats by user, device, and application.
Posted: 29 Oct 2015 | Published: 29 Oct 2015

Fortinet, Inc.

Secure Enterprise Applications on All Your Users' Mobile Devices
sponsored by VMware
WHITE PAPER: This white paper highlights a cloud service designed to help organizations leverage O365 on their mobile devices. Discover how to secure all company apps both cloud and on-premise and accelerate enterprise mobility.
Posted: 18 Sep 2015 | Published: 31 Jan 2014

VMware
176 - 200 of 1070 Matches Previous Page    6 7 8 9 10 11    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): … Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available in Windows Vista.In order for event forwarding to function, a service called Event Collector must be enabled on the local computer. This service creates subscriptions on remote computers and servers. Thereafter, the local computer is provided with details concerning events that take place on the remote machines. In this way, event forwarding allows an administrator to continuously collect and store information about events that occur throughout a network.
Network Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement