IT Management  >   Systems Operations  >   Network Management  >  

Network Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Networkmonitor, Network Traffic Monitoring, Network Behavior Monitoring, Monitoring Network, Network Performance Monitoring
DEFINITION: Netstat is a common command line TCP/IP networking utility available in most versions of Windows, Linux, UNIX and other operating systems. Netstat provides information and statistics about protocols in use and current TCP/IP network connections. (The name derives from the words network and statistics.)The Windows help screen (analogous to a Linux or UNIX man page) for netstat reads as follows:Displays  … 
Definition continues below.
Network Monitoring White Papers (View All Report Types)
1 - 25 of 352 Matches Previous Page  |  Next Page
Managed DNS Evaluation Guide: Understanding What Matters Most When Selecting Managed DNS
sponsored by Dyn
WHITE PAPER: This guide explains how a cloud-based DNS service can help you improve business results and provides guidelines for choosing a managed DNS service provider.
Posted: 17 Jan 2017 | Published: 30 Nov 2016

Dyn

Competitive Battlecard: Brocade + Ruckus vs. Cisco
sponsored by Brocade
WHITE PAPER: In this white paper, discover a detailed comparison of top vendors Brocade and Ruckus Wireless and Cisco. Learn which provider can help your clients deliver great user experience, reduce operational costs, and improve business outcomes by simplifying and securing wired and wireless networks end-to-end.
Posted: 17 Jan 2017 | Published: 31 Dec 2015

Brocade

Competitive Battlecard: Brocade + Ruckus vs. Cisco
sponsored by Brocade
WHITE PAPER: In this white paper, discover a detailed comparison of top vendors Brocade and Ruckus Wireless and Cisco. Learn which provider can help you deliver great user experience, reduce operational costs, and improve business outcomes by simplifying and securing wired and wireless networks end-to-end.
Posted: 17 Jan 2017 | Published: 31 Dec 2015

Brocade

Best Practices to Scale Your UBI Program: Avoiding the Top 7 Telematics Connectivity Mistakes
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how to properly scale your IoT connected business through greater device management and connectivity. Gain a deeper understanding of your organization through the IoT and telematics-based services, and discover seven mistakes in telematics to avoid.
Posted: 03 Jan 2017 | Published: 31 Dec 2014

Cisco Systems, Inc.

Real IoT: Success Factors and Best Practices
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn 7 success factors and a solid playbook of best practices to ensure your organizations is prepared to reap the benefits and ROI of the Internet of Things.
Posted: 29 Dec 2016 | Published: 30 Nov 2016

Cisco Systems, Inc.

Capitalizing on The Internet of Things
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how transform a product business into a service business, the core benefits and challenges of IoT, as well as 5 fundamentals to consider when evaluating how your company can best leverage the internet of things.
Posted: 29 Dec 2016 | Published: 29 Dec 2016

Cisco Systems, Inc.

How to Solve the Top IT Issues at Remote Locations
sponsored by AppNeta
WHITE PAPER: There many new tools, like real-time collaboration, cloud computing and VPNs that'll keep distributed IT environments more connected. Discover top 5 issues to look out for when setting up a remote IT environment and how to keep it under IT's control.
Posted: 27 Dec 2016 | Published: 30 Nov 2016

AppNeta

The Operational and Business Benefits of VMware vRealize Operations
sponsored by Blue Medora
WHITE PAPER: Discover the results of an independent study into VMware's vRealize Operations, an IT management tool, specifically highlighting the ROI delivered to users.
Posted: 19 Dec 2016 | Published: 30 Sep 2014

Blue Medora

Leveraging Big Data For IT Operations Analytics
sponsored by Blue Medora
WHITE PAPER: In this resource, learn how network monitoring tools that unify operational analytics onto as few platforms as possible can help you transform mountains of data into a useful story for data center staff and the C-suite alike.
Posted: 19 Dec 2016 | Published: 30 Sep 2016

Blue Medora

3 Steps To A Comprehensive View of IT Operations
sponsored by Blue Medora
WHITE PAPER: In this white paper, learn the 3 steps to a comprehensive view of IT operations in virtualized and cloud environments. Gain the visibility into your physical and virtual infrastructure for root cause analysis, predictive analytics, and overall infrastructure management.
Posted: 19 Dec 2016 | Published: 29 Jul 2016

Blue Medora

How to Achieve IT Agility: A Survival Guide for IT Decision Makers
sponsored by Brocade
WHITE PAPER: In the rapidly changing world of IT, companies need to remain agile. The best way to do that—and thrive, not just survive—is to evolve the network to support those applications. Access this survival guide and explore ways to align your infrastructure with modern business needs.
Posted: 12 Dec 2016 | Published: 12 Dec 2016

Brocade

Setting a New Standard for Network Efficiency with Ethernet Fabric Multilayer, Multipathing Capabilities
sponsored by Brocade
WHITE PAPER: Learn how to address key challenges in scaling out data center networks – keeping capital and operating costs linear while improving information mobility and application performance.
Posted: 06 Dec 2016 | Published: 06 Dec 2016

Brocade

Top Three Gaping Holes in Your Data Security
sponsored by Globalscape
WHITE PAPER: Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Globalscape

At-Risk Data in the Cloud: 3 Strategies to Stop the Data Bleed
sponsored by Absolute
WHITE PAPER: Learn about each type of insider threat and discover strategies to mitigate their impact on your organization. Visibility through routine scans to discover sensitive data in cloud-sync folders can help IT move from paranoia or a false sense of security to peace of mind.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Absolute

The Top 3 Monitoring Challenges IT Faces
sponsored by AppNeta
WHITE PAPER: IT's visibility into applications both in-house and in the cloud is more important and more difficult than ever. Discover the top 3 monitoring challenges facing IT teams today and how to overcome them.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

AppNeta

The Packet Train Difference
sponsored by AppNeta
WHITE PAPER: Get an in-depth look at packet train dispersion technology and how it delivers an accurate measure of network performance. You'll learn key benefits of packet train dispersion analysis, how it works, and more.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

AppNeta

A New Approach to Network Monitoring
sponsored by AppNeta
WHITE PAPER: End-user application experience monitoring has become more difficult due to cloud computing. This white paper details the challenges presented by cloud applications and an entirely new way to assess, monitor, troubleshoot and report on network performance from the perspective of applications that run on the network.
Posted: 16 Sep 2016 | Published: 30 Jun 2016

AppNeta

Why Now Is the Time to Re-Architect the Enterprise Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: IT professionals continue to embrace new technologies, but are they thinking about the infrastructure across which they're to delivering these technologies? Learn how to re-architect the enterprise network and data center infrastructure, in light of the momentum towards cloud, mobility, bandwidth-hungry apps, and advanced security threats.
Posted: 09 Sep 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

How a School District Swiftly Detects and Remediates Internal and External Threats
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how the Council Rock School District approached their massive network security blind spot and reduced their threat reaction time from months to detect and resolve to mere minutes. Discover what did and what did not work for them, how they also improved their capacity planning, and more.
Posted: 07 Sep 2016 | Published: 07 Sep 2016

Cisco Systems, Inc.

Networking: You Can't Protect What You Can't See
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn what types of attacker activity are most common and how better visibility helps you identify suspicious network behaviors. Also uncover the "suspicious seven": the top questionable activities that every security team needs to be able to see.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

Cisco Systems, Inc.

Citrix NetScaler: A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: Denial of service (DoS) attacks are on the rise after years of relative dormancy. In that time they have evolved and are honed in on attacking the different networking layers. Discover how DoS attacks have evolved and how to approach DoS protection at each layer of your network.
Posted: 13 Jun 2016 | Published: 30 Jan 2015

Citrix

Addressing NIST and DOD Requirements for Mobile Device Management (MDM)
sponsored by IBM MaaS360
WHITE PAPER: Mobile device management (MDM) is critical as these devices can create vulnerabilities in network security. Two major technology institutions are determining MDM requirements for government agencies. Read on for a breakdown of the best MDM practices.
Posted: 20 May 2016 | Published: 30 Dec 2015

IBM MaaS360

Workplace Mobility, Consumerization, and Cloud Drive End-user Computing Transformation
sponsored by VMware
WHITE PAPER: To combat the rising complexity of desktop environments, you need to think about implementing hybrid consumption models. Read this white paper that details how the next generation of desktop architectures is taking mobility into account and how IT strategies are shifting from managing devices to managing users.
Posted: 20 May 2016 | Published: 29 Jan 2016

VMware

Laptop Management for Windows
sponsored by IBM MaaS360
WHITE PAPER: Discover how to protect your enterprise laptops, desktops, ultrabooks, and tablets from a single screen. Read on to learn key benefits a solution can provide such as pushing software to devices independent of their location, lock devices remotely, demonstrate compliance for audits, and more.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

IBM MaaS360

QRadar SIEM
sponsored by IBM
WHITE PAPER: Protecting today's complex networks against malicious activities is a never-ending task. Learn how you can boost threat protection and compliance by developing security intelligence.
Posted: 15 Jun 2016 | Published: 20 Dec 2013

IBM
1 - 25 of 352 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK MONITORING DEFINITION (continued): …  protocol statistics and current TCP/IP network connections.NETSTAT -a -b -e -n -o -p proto -r -s -v interval -a Displays all connections and listening ports. -b Displays the executable involved in creating each connection or listening port. In some cases well-known executables host multiple independent components, and in these cases the sequence of components involved in creating the connection or listening port is displayed. In this case the executable name is in [] at the bottom, … 
Network Monitoring definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement