IT Management  >   Systems Operations  >   Network Management  >  

Network Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Networkmonitor, Network Traffic Monitoring, Network Behavior Monitoring, Monitoring Network, Network Performance Monitoring
DEFINITION: Port mirroring, also known as a roving analysis port, is a method of monitoring network traffic that forwards a copy of each incoming and outgoing packet from one port of a network switch to another port where the packet can be studied. A network administrator uses port mirroring as a diagnostic tool or debugging feature, especially when fending off an attack. It enables the administrator to keep  … 
Definition continues below.
Network MonitoringWhite Papers (View All Report Types)
1 - 25 of 333 Matches Previous Page  | Next Page
Avoid Network Outages—Automated Network Management Comes to the Rescue
sponsored by IBM
WHITE PAPER: In this white paper, discover a network management solution that delivers greater visibility, control and automation over the network infrastructure to help prevent the occurrence of costly network outages.
Posted: 09 Dec 2014 | Published: 30 Nov 2012

IBM

Three Ways to Achieve Fast and Affordable IT in an Always-On World
sponsored by VMware
WHITE PAPER: This white paper explores a way to handle data center challenges head on. Read on to learn how one solution gives you 3 essential capabilities for the era of the always-on business: enhanced performance monitoring, optimized capacity utilization, and simplified data backup and replication.
Posted: 05 Dec 2014 | Published: 31 Aug 2014

VMware

Vectra X-Series Deployment Guide
sponsored by Vectra Networks
WHITE PAPER: This deployment guide gives a brief overview of the deployment preparation, installation, and configuration of a Vectra X-series platform, which detects malware and cyber attacks at any phase.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

Vectra Networks

Assuring Web Performance Levels With Next Generation ADCs
sponsored by Radware
WHITE PAPER: This white paper highlights a next-generation ADC solution that is designed to provide SLA assurance and improvement, enabling application performance management.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Radware

24/7 Visibility into Advanced Malware on Networks and Endpoints
sponsored by Tenable Network Security
WHITE PAPER: This white paper argues that containing the massive-scale security breaches that many high-profile organizations are experiencing requires a holistic approach that addresses vulnerabilities and threats at the network and system levels, and leverages threat intelligence to accurately identify attacks in progress.
Posted: 12 Nov 2014 | Published: 24 Oct 2014

Tenable Network Security

How Tenable Optimized Vulnerability Management for Crosskey Banking Solutions
sponsored by Tenable Network Security
WHITE PAPER: This white paper describes how Crosskey Banking Solutions worked with Tenable Network Security to reduce risk and ensure PCI DSS compliance.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Tenable Network Security

Close the Gaps Left By Traditional Vulnerability Management Through Continuous Monitoring
sponsored by Tenable Network Security
WHITE PAPER: This white paper explores the results of a recent Forrester study of 180 security leaders on the current state and effectiveness of vulnerability management.
Posted: 12 Nov 2014 | Published: 28 Feb 2014

Tenable Network Security

Prevent Security Breaches with Continuous Monitoring
sponsored by Tenable Network Security
WHITE PAPER: This white paper discusses why defensive security products alone can't fully protect your enterprise from the types of security breaches that have made headlines in recent years, and proposes continuous monitoring as a potential solution.
Posted: 12 Nov 2014 | Published: 25 Jul 2014

Tenable Network Security

Predicting Attack Paths Within Your Networks
sponsored by Tenable Network Security
WHITE PAPER: This white paper describes how one company's advanced security solutions can be leveraged to identify systems within your networks that are vulnerable to exploitation.
Posted: 12 Nov 2014 | Published: 23 Oct 2014

Tenable Network Security

Select the Best Fit Network Management System (NMS) For Your Business
sponsored by SolarWinds, Inc.
WHITE PAPER: In this white paper, learn how to choose the best network management solution with the right set of features that matches your requirement.
Posted: 10 Nov 2014 | Published: 31 Dec 2013

SolarWinds, Inc.

Pinpoint Bandwidth Issues With 3 Simple Steps
sponsored by SolarWinds, Inc.
WHITE PAPER: This white paper identifies three components of network performance to address when you get a demand for more bandwidth.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

SolarWinds, Inc.

The Top 5 Security Challenges of Higher Education
sponsored by Tenable Network Security
WHITE PAPER: This informative white paper discusses how in addition to the same IT security challenges as commercial enterprises, universities face a number of difficulties that are entirely unique to higher education.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Tenable Network Security

A Strategic Guide to Data Center Transformation for Performance and Agility
sponsored by Gigamon
WHITE PAPER: Check out this white paper to get a guide to improving the performance and agility of your data center despite the disruptive forces of virtualization. You'll learn how you can enable seamless, real-time adjustment of monitoring and security best practices in a transformed agile, virtual data center environment.
Posted: 23 Oct 2014 | Published: 31 Aug 2014

Gigamon

Enhanced Monitoring for VMware Infrastructure
sponsored by Gigamon
WHITE PAPER: Access this white paper to learn how you can deliver enhanced monitoring for your VMware infrastructure. You'll learn how this solution delivers pervasive visibility for monitoring, analysis, and security tools into the virtual environment and private cloud.
Posted: 23 Oct 2014 | Published: 30 Jun 2014

Gigamon

Network Monitoring for Virtual Server Environments
sponsored by Gigamon
WHITE PAPER: Access this white paper to learn to learn about a virtual fabric node that expands pervasive visibility for monitoring, analysis, and security tools into the virtual environment and private cloud. Read on to learn how this solution allows you to, gain visibility into VM traffic, delegate change control without risking availability, and more.
Posted: 23 Oct 2014 | Published: 30 Jun 2014

Gigamon

What You Really Want From Infrastructure Management
sponsored by CA Technologies.
WHITE PAPER: This white paper examines how you can leverage a single system that can monitor everything in your IT operations environment. Read on to learn how you can leverage an architecture that delivers end-to-end visibility across the IT operations environment.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

CA Technologies.

Why Most Organizations Miss User Response Monitoring—And What To Do About It
sponsored by CA Technologies.
WHITE PAPER: Access this guide to examine the challenges of user response monitoring. You'll also get tips to overcome these challenges and start to get a real handle on your infrastructure performance and how it impacts your users' experience.
Posted: 06 Oct 2014 | Published: 30 Sep 2012

CA Technologies.

Probleu Builds a Winning MSP Business with N-Able by Solarwinds
sponsored by N-able Technologies
WHITE PAPER: Access this case study to learn how this MSP eventually chose to leverage the IT channel's #1 RMM and MSP service automation platform.
Posted: 22 Sep 2014 | Published: 19 Sep 2014

N-able Technologies

MY IT Reboots RMM Automation with N-Able by Solarwinds
sponsored by N-able Technologies
WHITE PAPER: Check out this white paper to learn how a top-tier MSP that meets the IT needs of small to midsized businesses was able to leverage a new RMM platform. You'll learn the top 10 reasons more MSPs are choosing this solution.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

N-able Technologies

Bluewave Computing Realizes Million-Dollar Productivity Gains with N-Able Technologies
sponsored by N-able Technologies
WHITE PAPER: Access this case study to learn how one organization was able to upgrade their service automation platform and deliver benefits in terms of improved productivity, efficiency, and customer retention.
Posted: 16 Sep 2014 | Published: 16 Sep 2014

N-able Technologies

Guarding Against a Data Breach
sponsored by Hewlett-Packard Company
WHITE PAPER: In this informative white paper, discover how modern enterprises should respond to growing security threats while balancing economic and organizational concerns.
Posted: 22 Aug 2014 | Published: 31 Jan 2012

Hewlett-Packard Company

Enabling Ubiquitous Visibility in Virtualized Enterprises
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper discusses the lack of visibility in the context of monitoring and troubleshooting end-to-end application performance and introduces one company's network performance management solution.
Posted: 04 Aug 2014 | Published: 31 Dec 2012

Riverbed Technology, Inc.

How to Make Apps Run More Efficiently in the Age of the Cloud
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper details many of the issues that applications operations staff currently face; explains the requirements that today's applications operations groups have for an application performance management solution; and lists a number of suggestions for organizations currently choosing between APM solutions.
Posted: 01 Aug 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.

10 Ways for Developers to Benefit from Application Performance Management Solutions
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper covers ten key strategies for developers looking to improve the quality and performance of their software through application management (APM) solutions.
Posted: 01 Aug 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.

Comparison Guide: Riverbed SteelCentral vs. Fluke Networks
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper explains the primary functions under the "performance management" umbrella, from network mapping to end-user experience, and describes one company's approach to tackling all of the use cases and demands of IT in this arena.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

Riverbed Technology, Inc.
1 - 25 of 333 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK MONITORING DEFINITION (continued): …  close track of switch performance and alter it if necessary. Port mirroring can be managed locally or remotely.An administrator configures port mirroring by assigning a port from which to copy all packets and another port where those packets will be sent. A packet bound for or heading away from the first port will be forwarded onto the second port as well. The administrator places a protocol analyzer on the port receiving the mirrored data to monitor each segment separately. The analyzer captures and evaluates the data without affecting the client on the original port. The monitor port may … 
Network Monitoring definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement