IT Management  >   Systems Operations  >   Network Management  >  

Network Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Networkmonitor, Network Traffic Monitoring, Network Behavior Monitoring, Monitoring Network, Network Performance Monitoring
DEFINITION: Port mirroring, also known as a roving analysis port, is a method of monitoring network traffic that forwards a copy of each incoming and outgoing packet from one port of a network switch to another port where the packet can be studied. A network administrator uses port mirroring as a diagnostic tool or debugging feature, especially when fending off an attack. It enables the administrator to keep  … 
Definition continues below.
Network MonitoringWhite Papers (View All Report Types)
151 - 175 of 326 Matches Previous Page  | Next Page
Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 21 Aug 2013 | Published: 31 May 2013

IBM

It's Time to Address the Visibility Challenge Surrounding Applications
sponsored by Citrix
WHITE PAPER: Are you ready to solve the application visibility challenge? This resource outlines how a next-gen visibility solution provides the end-to-end visibility you need to win the battle.
Posted: 13 Aug 2013 | Published: 29 Mar 2013

Citrix

Avaya Aura Communication Manager Survivability Simplified
sponsored by Global Knowledge
WHITE PAPER: The Avaya Aura product line offers many opportunities for communications to survive failures of the IP network or the Avaya equipment. Here, we will focus on the Communication Manager Survivability explanation, implementation, verification, "good to know facts," and troubleshooting commands.
Posted: 25 Jul 2013 | Published: 25 Jun 2013

Global Knowledge

5 Backup Features to Ensure Accuracy, Eliminate Complexity and Streamline Auditing
sponsored by APTARE
WHITE PAPER: In this brief resource, you will discover how a storage backup manager eliminates the complexity and manual labor associated with SOX auditing by automatically collecting backup data in real time and storing it in a central web-based repository where administrators and auditors can access, analyze and record the information.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

APTARE

Avaya CS 1000: Defining Calling Line Identification Numbers
sponsored by Global Knowledge
WHITE PAPER: This white paper describes a two-part process used to define CLID information for both emergency and non-emergency calls. The first part involves defining the number(s) that will be sent to the called party. The second part of the process involves assigning the CLID entry to an analog telephone or to a key on a digital or IP telephone.
Posted: 14 Jun 2013 | Published: 16 May 2013

Global Knowledge

Overcoming Security Breaches and Minimizing the Impact
sponsored by Dell SecureWorks
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks

Simplify Complex Network Tasks With Custom Capabilities
sponsored by SearchSecurity.com
WHITE PAPER: The time to automate is the network – you ready? Discover how creating custom automation is crucial to not only facilitate the cloud but also increase visibility, lower costs, and reduce risks.
Posted: 23 May 2013 | Published: 23 May 2013

SearchSecurity.com

Voice over IP (VoIP) Growth and the Strain on Network Security
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Explore how VoIP can expose your organization to numerous risks and uncover why traditional firewalls often cannot thwart the many challenges VoIP presents.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

WatchGuard Technologies, Inc.

The Zen of Guaranteed Application Performance
sponsored by IPANEMA TECHNOLOGIES
WHITE PAPER: Application performance is business performance – yet eliminating frustration and providing app happiness can be a harrowing task. This resource outlines how to gain the control, visibility, and automated intelligence you need for your apps – and business – to be successful.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

IPANEMA TECHNOLOGIES

4 Questions to Ask When Evaluating Network Security Solutions
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.
Posted: 21 Aug 2013 | Published: 21 Aug 2013

WatchGuard Technologies, Inc.

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013

Infoblox

Disaster Preparedness for Core Network Services
sponsored by Infoblox
WHITE PAPER: This white paper will take a look at how failures can unexpectedly disrupt core network services and the applications that depend on them despite employing traditional approaches to providing redundant configurations. Read this white paper to learn how to minimize the effects of failures to ensure business continuity.
Posted: 15 Aug 2013 | Published: 31 Jan 2013

Infoblox

The Total Economic Impact of WANdisco SVN MultiSite
sponsored by WANdisco
WHITE PAPER: This Forrester Total Economic Impact™ report unveils how one solution provides LAN-speed collaboration between distributed teams, giving them the feeling that they're all working in the same room. View now to uncover how this solution helped one global software engineering company enjoy a 357% ROI with a payback period of less than two months.
Posted: 01 Aug 2013 | Published: 31 Jul 2013

WANdisco

Strategy guide to business protection for physician practices
sponsored by HP and Intel® Xeon® processors
WHITE PAPER: This white paper demonstrates how hospitals can manage risk and keep critical IT infrastructure up and running. Read now to learn how HIT leaders can ensure a high availability IT infrastructure that can improve service and protect their business.
Posted: 01 Aug 2013 | Published: 15 Nov 2012

HP and Intel® Xeon® processors

Enterasys Data Center Networking – Connectivity and Topology Design Guide
sponsored by Enterasys
WHITE PAPER: View key concepts that will help you build a data center fabric capable of meeting the needs of both organizations and users both today and in the future. View now to learn more!
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Enterasys

System z: Making great security even better
sponsored by IBM
WHITE PAPER: Adopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

Open SDN for Network Visibility: Simplifying large scale network monitoring systems with Big Tap
sponsored by Big Switch Networks
WHITE PAPER: Traditional performance monitoring and management tools do not scale to meet the needs of the modern network. Consult this solution guide today to learn how the right SDN application can simplify large network monitoring systems and lead to success.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

Big Switch Networks

Accelerate App Delivery, Improve App Performance, and Spur Innovation
sponsored by CA Technologies.
WHITE PAPER: Learn about a set of application performance management (APM) and capacity management solutions that together facilitate information sharing between your DevOps teams, in end leading to better app deployments, improved monitoring, lowered number of risks, and reduced repair times.
Posted: 28 Jun 2013 | Published: 31 Aug 2012

CA Technologies.

Cisco® ONE: The Value of Advanced Flow Control
sponsored by Cisco Systems, Inc.
WHITE PAPER: Discover how utilizing the advanced flow control capability in Cisco Open Network Environment (ONE) can help you overcome the complex monitoring challenges you are facing today.
Posted: 28 Jun 2013 | Published: 31 May 2013

Cisco Systems, Inc.

EMA Radar™ for Advanced Performance Analytics (APA) Use Cases: Q4 2012
sponsored by Hewlett-Packard Limited
WHITE PAPER: This EMA Radar Report details how a suite of advanced performance analytics (APA) solutions combines predictive analytics with a dynamic service model to provide an intelligent framework around alerts, help you achieve faster MTTR, proactively manage application performance, and much more.
Posted: 28 Jun 2013 | Published: 31 Dec 2012

Hewlett-Packard Limited

Cisco® ONE: Traffic Visualization and Control
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource explores how Cisco ONE's traffic visualization and control capability can help service providers visualize traffic end-to-end across the network and respond to unpredictable network capacity demands quickly, easily, and efficiently.
Posted: 26 Jun 2013 | Published: 30 Apr 2013

Cisco Systems, Inc.

The Dynamic DNS Infrastructure
sponsored by F5 Networks
WHITE PAPER: This resource details a full-proxy architecture for DNS that provides a complete solution for global, local, and cloud load balancing, helping you overcome all the growth and security challenges the DNS is facing.
Posted: 14 Jun 2013 | Published: 29 Jun 2012

F5 Networks

Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler
sponsored by Citrix
WHITE PAPER: Explore the details of an end-to-end mobility solution that simplifies mobile integration into the network and helps you overcome the top challenges enterprise mobility presents, from visibility and management to scalability and security.
Posted: 14 Jun 2013 | Published: 30 Apr 2013

Citrix

Ixia ControlTower Architecture
sponsored by Ixia
WHITE PAPER: As networks grow in size and complexity, the need for visibilty becomes even more essential. Consult this resource to learn more about how you can increase scale, flexible deployments and the need for application and security monitoring in the network.
Posted: 30 May 2013 | Published: 30 May 2013

Ixia

Infrastructure Agility Through Affinities
sponsored by Plexxi
WHITE PAPER: The way your applications take part in your infrastructure – and influence it – is crucial to business success. Unfortunately, this has been inherently complex and costly to achieve. Until now. View this white paper to learn how affinities can help you overcome these challenges.
Posted: 10 May 2013 | Published: 29 Mar 2013

Plexxi
151 - 175 of 326 Matches Previous Page    5 6 7 8 9 10    Next Page
 
NETWORK MONITORING DEFINITION (continued): …  close track of switch performance and alter it if necessary. Port mirroring can be managed locally or remotely.An administrator configures port mirroring by assigning a port from which to copy all packets and another port where those packets will be sent. A packet bound for or heading away from the first port will be forwarded onto the second port as well. The administrator places a protocol analyzer on the port receiving the mirrored data to monitor each segment separately. The analyzer captures and evaluates the data without affecting the client on the original port. The monitor port may … 
Network Monitoring definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement