IT Management  >   Systems Operations  >   Network Management  >  

Network Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Networkmonitor, Network Traffic Monitoring, Network Behavior Monitoring, Monitoring Network, Network Performance Monitoring
DEFINITION: Netstat is a common command line TCP/IP networking utility available in most versions of Windows, Linux, UNIX and other operating systems. Netstat provides information and statistics about protocols in use and current TCP/IP network connections. (The name derives from the words network and statistics.)The Windows help screen (analogous to a Linux or UNIX man page) for netstat reads as follows:Displays  … 
Definition continues below.
Network Monitoring White Papers (View All Report Types)
1 - 25 of 381 Matches Previous Page  |  Next Page
Addressing NIST and DOD Requirements for Mobile Device Management (MDM)
sponsored by IBM MaaS360
WHITE PAPER: Mobile device management (MDM) is critical as these devices can create vulnerabilities in network security. Two major technology institutions are determining MDM requirements for government agencies. Read on for a breakdown of the best MDM practices.
Posted: 20 May 2016 | Published: 30 Dec 2015

IBM MaaS360

Workplace Mobility, Consumerization, and Cloud Drive End-user Computing Transformation
sponsored by VMware
WHITE PAPER: The presence of mobility in the workplace is going to continue its steady rise and we need to ensure this continues to benefit the enterprise. Read on to learn about how end-users are the driving force in an ongoing mobility transformation and what this means for the future of mobility in the workplace.
Posted: 20 May 2016 | Published: 29 Jan 2016

VMware

How SDN, the Cloud, and Better App Performance Contribute to Customer Satisfaction
sponsored by Nuage Networks
WHITE PAPER: A typical network simply cannot meet today's demands in retail. Learn how cloud computing, software-defined networking, and application performance management better support the omnichannel customer experience while reducing costs and complexities.
Posted: 19 May 2016 | Published: 19 May 2016

Nuage Networks

Tackling Workplace Mobility
sponsored by VMware
WHITE PAPER: 84% of employees use a mobile device during their work day. As mobility takes over the workplace, problems with security, compliance, and cost begin to pop up. Learn more about the mobile takeover and find a solution that tackles these challenges.
Posted: 18 May 2016 | Published: 29 Apr 2016

VMware

Application Awareness: The Critical Enabler in Virtualized Networks
sponsored by Ipoque
WHITE PAPER: Application awareness delivers information about traffic patterns and user behavior, quite important for SDN and network function virtualization. Discover the key role of application awareness in providing essential network intelligence that enables more efficient routing of applications and vital analytics to drive new NFV/SDN service deployments.
Posted: 17 May 2016 | Published: 29 Apr 2016

Ipoque

Getting your IT Infrastructure Ready for the Digital Workplace
sponsored by Aruba Networks
WHITE PAPER: This white paper presents the IT challenges of supporting a digital workforce, and how to overcome those challenges to deliver tangible advantages to your organization in the form of lower operational costs, improved employee satisfaction, and a better customer experience.
Posted: 06 May 2016 | Published: 06 May 2016

Aruba Networks

DDoS Attack Analysis
sponsored by Thousandeyes
WHITE PAPER: ThousandEyes highlights the impact of an ongoing DDoS attack, provides visibility into the effectiveness of the mitigation and provides insight into the strategies of DDoS mitigation vendors.
Posted: 06 May 2016 | Published: 06 May 2016

Thousandeyes

Expertise from Authorized Professional Services Providers, Available On-Demand
sponsored by Juniper Networks, Inc.
WHITE PAPER: Do you have a network project but no expertise on staff? Access this brochure to find available services for your network that are simple and fast, from posting your project to instant connection with the perfect partner and/or service provider that best suits your project goals and budget.
Posted: 02 May 2016 | Published: 02 May 2016

Juniper Networks, Inc.

Mobile Security Checklist: Plan for Security and Compliance
sponsored by Sierraware
WHITE PAPER: BYOD is becoming the norm in today's business landscape and it is a major security threat. Access this white paper to learn about internet exploits, insider abuse, regulatory compliance and a checklist of steps you can take to ensure secure mobile networking.
Posted: 13 Apr 2016 | Published: 01 Apr 2016

Sierraware

Comprehensive Network Security Building Blocks
sponsored by PEER 1
WHITE PAPER: To protect your network, users and data, you need to build the foundation for robust security to withstand today's attacks. Access this white paper now and find out how to boost the efficiency of your network perimeter and remote access security, application security, regulatory compliance, and more.
Posted: 05 Apr 2016 | Published: 09 Mar 2016

PEER 1

Pervasive Security Enabled by Next Generation Monitoring Fabric
sponsored by Big Switch Networks
WHITE PAPER: As organizations become more reliant on their networks for critical functions, hackers are honing their focus on networks to increase the effectiveness of their attacks. Access this white paper to learn how to best protect your network.
Posted: 05 Apr 2016 | Published: 29 Dec 2015

Big Switch Networks

4 Ways Hackers Break into Your Network – And How to Stop Them
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: Despite heavy investments, networks are still seeing successful attacks. Access this white paper to learn about four fatal failures of network security and the actions you can take to fortify your defenses.
Posted: 29 Mar 2016 | Published: 27 Jan 2016

ForeScout Technologies, Inc.

The IOT Impact: Networks Face Their Biggest Challenge Yet
sponsored by Ixia
WHITE PAPER: Connected cars are just the first mainstream area IOT has forged ahead, but that and other internet-enabled machinery are causing major upheaval in businesses as they look to protect their network and mitigate the risks associated with IOT. Inside, we review some of the concerns and how to protect against them.
Posted: 25 Mar 2016 | Published: 24 Feb 2016

Ixia

Meeting the Mobility Demands of an Evolving Workforce
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Choosing the right mobile device for employees requires an understanding of user needs, preferences, job functions and degree of mobility. Access this white paper to see a breakdown of requirements for the different employees you'll need to accommodate in your organization.
Posted: 22 Mar 2016 | Published: 31 Aug 2014

Dell, Inc. and Intel®

Overcoming Virtual Blind Spots
sponsored by Ixia
WHITE PAPER: Visibility into your network is the only chance you have at mitigating advanced and hidden threats. To overcome east-west traffic blind spots, network security strategies must include virtual tapping into the production virtual network.
Posted: 21 Mar 2016 | Published: 24 Feb 2016

Ixia

How to Get the Most From Your Global WAN
sponsored by MASERGY
WHITE PAPER: In this white paper, examine areas of technical leadership you'll want your global WAN supplier to possess. Plus, uncover 4 questions you should ask when negotiating your global WAN contract.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

MASERGY

Forget Network Defense - Focus on Offense
sponsored by Ixia
WHITE PAPER: This white paper explains why your network security strategy needs to include testing and training to make sure a product or service is protected before launch. Read on to learn more about an offensive security strategy and what it needs to contain.
Posted: 18 Mar 2016 | Published: 02 Mar 2016

Ixia

App Performance Optimizations in a Cloud-Centric World
sponsored by Dyn
WHITE PAPER: This comprehensive e-book digs into the opportunities and risks of cloud-based networking for achieving optimal app performance. Learn tactics for effectively using the cloud, and boosting data center networking performance, as well.
Posted: 15 Mar 2016 | Published: 15 Mar 2016

Dyn

The Enterprise Guide to Managed Services
sponsored by Comcast
WHITE PAPER: Your network is slated to fall victim to BYOD initiatives. Your WAN will need an upgrade, and now it's decision time. This white paper invites you to explore several considerations before you employ network managed services. Access now to examine what managed services are, how they work, and who benefits from them.
Posted: 15 Mar 2016 | Published: 15 Mar 2016

Comcast

Avoiding the Hidden Costs of Performance Monitoring Tools
sponsored by SevOne
WHITE PAPER: This white paper discusses the 7 sources of hidden costs of performance monitoring tools and discusses ways that you can avoid them.
Posted: 02 Mar 2016 | Published: 31 Dec 2015

SevOne

4 Best Practices for Monitoring Cloud Infrastructure You Don't Own
sponsored by SevOne
WHITE PAPER: This white paper examines several use cases for monitoring hybrid cloud infrastructures and best practices for ensuring delivery of network applications and services in the cloud. Access now to explore the expanding list of IT operations taking place on infrastructure you don't own.
Posted: 01 Mar 2016 | Published: 31 Dec 2015

SevOne

Internal Segmentation Firewall: Security Where You Need It, When You Need It
sponsored by Fortinet, Inc.
WHITE PAPER: While an edge firewall can do a great job of protecting the network perimeter, it can't help with internal attacks after a breach occurs. This resource describes how an internal segmentation firewall architecture protects network segments from malicious code that makes its way into the internal network.
Posted: 01 Mar 2016 | Published: 25 Jan 2016

Fortinet, Inc.

Why the Era of Perimeter-Only Security Is Over
sponsored by Fortinet, Inc.
WHITE PAPER: With today's increasingly sophisticated attacks, it's inevitable that some threats will penetrate the enterprise network's perimeter. Access this resource to discover how an internal segmentation firewall can strengthen your enterprise's overall security posture.
Posted: 01 Mar 2016 | Published: 05 Feb 2016

Fortinet, Inc.

Security From the Inside Out: New Breach Defense Strategies
sponsored by Fortinet, Inc.
WHITE PAPER: This resource explains why the traditional perimeter firewall isn't enough and describes how internal segmentation firewalls can help your network react to today's advanced threats. Read on to discover what you need to look for when deciding on an internal segmentation firewall solution.
Posted: 01 Mar 2016 | Published: 01 Mar 2016

Fortinet, Inc.

10 Metrics to Monitor in the LTE Network
sponsored by SevOne
WHITE PAPER: This white paper discusses the 10 metrics that you can monitor and collect in your LTE environment to ensure efficient delivery of services to your customers.
Posted: 29 Feb 2016 | Published: 29 Feb 2016

SevOne
1 - 25 of 381 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK MONITORING DEFINITION (continued): …  protocol statistics and current TCP/IP network connections.NETSTAT -a -b -e -n -o -p proto -r -s -v interval -a Displays all connections and listening ports. -b Displays the executable involved in creating each connection or listening port. In some cases well-known executables host multiple independent components, and in these cases the sequence of components involved in creating the connection or listening port is displayed. In this case the executable name is in [] at the bottom, … 
Network Monitoring definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement