IT Management  >   Systems Operations  >   Network Management  >  

Network Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Networkmonitor, Network Traffic Monitoring, Network Behavior Monitoring, Monitoring Network, Network Performance Monitoring
DEFINITION: Port mirroring, also known as a roving analysis port, is a method of monitoring network traffic that forwards a copy of each incoming and outgoing packet from one port of a network switch to another port where the packet can be studied. A network administrator uses port mirroring as a diagnostic tool or debugging feature, especially when fending off an attack. It enables the administrator to keep  … 
Definition continues below.
Network MonitoringWhite Papers (View All Report Types)
26 - 50 of 333 Matches Previous Page  | Next Page
LogRhythm's Security Intelligence Platform
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm's Security Intelligence Platform, which combines enterprise-class SIEM, Log Management, File Integrity Monitoring, and Machine Analytics with Host and Network Forensics to provide profound visibility into threats and risks to which organizations are otherwise blind.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

How to Optimise Existing Network Capacity and Make a Case for More Bandwidth
sponsored by Fluke Networks
WHITE PAPER: This white paper provides five principles for effective capacity planning, discusses the limitations of traditional approaches to capacity planning, and proposes burst utilization as a solution.
Posted: 25 Jul 2014 | Published: 25 Jul 2014

Fluke Networks

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by IBM
WHITE PAPER: This highly informative white paper from Gartner objectively evaluates a variety of SIEM technologies on a number of critical dimensions, including market responsiveness, customer experience, and pricing.
Posted: 24 Jul 2014 | Published: 25 Jun 2014

IBM

Unified Threat Management Guide
sponsored by Sophos, Inc.
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 02 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Viewing Application Performance from the End-User Perspective
sponsored by Fluke Networks
WHITE PAPER: This resource introduces Application-Aware Network Performance Management, which quickly identifies the root cause of performance issues within a complex application environment.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Fluke Networks

A Cohesive Approach to Addressing Advanced Targeted Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This resource features a 5-component threat prevention framework that takes existing technologies to the next level to better protect your vulnerable networks from today's advanced threats.
Posted: 09 May 2014 | Published: 09 May 2014

Fortinet, Inc.

5 reasons why end user experience management is not APM
sponsored by Aternity
WHITE PAPER: This guide explores the benefits of application performance management can benefit your network and end-user experience.
Posted: 09 May 2014 | Published: 31 Dec 2013

Aternity

Next-gen Application Delivery Controllers: An Intelligent Path to Active-Active Clusters
sponsored by Citrix
WHITE PAPER: This informative guide explores the role of these next-generation ADCs and provides insight on their effectiveness.
Posted: 09 May 2014 | Published: 09 May 2014

Citrix

The Path to Network Performance Nirvana
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This exclusive infographic will show you why you need to enable better visibility into your network performance.
Posted: 31 Jul 2014 | Published: 12 Jun 2013

Riverbed Technology, Inc.

Riverbed Advances Visibility into Virtual Data Centers
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This exclusive whitepaper looks at an upgraded tool that can enhance your visibility into your network.
Posted: 31 Jul 2014 | Published: 12 Jul 2012

Riverbed Technology, Inc.

A Data Center Fabric is Critical to a Next-Generation Data Center
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative whitepaper explores the need for a data center fabric in your next-generation data center.
Posted: 23 Jun 2014 | Published: 31 Jan 2014

Cisco Systems, Inc.

Five Secrets of Highly Effective Data Centers
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative whitepaper explores five secrets of highly effective data centers.
Posted: 23 Jun 2014 | Published: 23 Jun 2014

Cisco Systems, Inc.

Unified Monitoring: A Business Perspective
sponsored by CA Technologies.
WHITE PAPER: In the past few years, the enterprise computing landscape has changed dramatically. These changes are rendering legacy monitoring tools, which have their roots in the computing environments of a decade or more ago, virtually useless. This paper explores today's computing trends and their monitoring implications for businesses.
Posted: 19 Jun 2014 | Published: 31 Dec 2013

CA Technologies.

Big Five in Overdrive- Are State and Local Networks Ready?
sponsored by Brocade
WHITE PAPER: This informative whitepaper explores state and local governments - asking the question, are their networks ready for the "Big Five of IT."
Posted: 18 Jun 2014 | Published: 10 Feb 2014

Brocade

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

OpenFlow-based SDN Data Center Interconnect
sponsored by NEC Corporation of America
WHITE PAPER: This white paper discusses the benefits of SDN and how it differs from your traditional networks. Read on to learn how delivering messages and other types of content to a variety of Web users has transformed into a simple process due to this flexible type of network.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

NEC Corporation of America

Scale Operations and Boost Service Levels While Keeping Cost and Growth In Mind
sponsored by CA Technologies.
WHITE PAPER: This case study tells the story of one organization's partnership with a service provider that delivers significant improvements in performance and availability while also efficiently managing costs and business growth.
Posted: 05 Jun 2014 | Published: 30 Apr 2014

CA Technologies.

Gain Visibility With a Network Monitoring Solution
sponsored by CA Technologies.
WHITE PAPER: This white paper goes into detail as to how CA Nimsoft Monitor provides complete network visibility and ensures that you achieve the highest levels of business service quality.
Posted: 04 Jun 2014 | Published: 28 Sep 2012

CA Technologies.

IT Managers: It's Time to Overcome Infrastructure Challenges
sponsored by CA Technologies.
WHITE PAPER: This white paper highlights infrastructure monitoring and management solutions and provides validation of these solutions based on actual customer experiences.
Posted: 04 Jun 2014 | Published: 31 Oct 2013

CA Technologies.

Manage Critical IT Resources with a Durable IT Management Platform
sponsored by CA Technologies.
WHITE PAPER: This white paper gives a technical breakdown of the features and capabilities of CA Nimsoft Monitor, an IT monitoring tool built to support both traditional data centers and new virtualized and cloud environments.
Posted: 04 Jun 2014 | Published: 31 Mar 2014

CA Technologies.

Planning a Private Enterprise Cloud?
sponsored by KEMP Technologies
WHITE PAPER: This informative whitepaper explores the role of SDN and load balancing when planning your private cloud.
Posted: 14 May 2014 | Published: 14 May 2014

KEMP Technologies

An Essential Guide to Application Delivery Controllers
sponsored by Citrix
WHITE PAPER: This guide explores a top-tier application delivery controller and how it can help your organization with web application delivery, load balancing and more.
Posted: 12 May 2014 | Published: 12 May 2014

Citrix

The Fight for Full Network Visibility in a Dangerous World
sponsored by APCON, Inc.
WHITE PAPER: This white paper highlights critical features your network security strategies may be missing that are mandatory in today's advanced threat environment.
Posted: 09 May 2014 | Published: 09 May 2014

APCON, Inc.

Is Your Network Traffic Invisible?
sponsored by GlobalScape
WHITE PAPER: This brief guide explores the importance of network monitoring and outlines the benefits of increased visibility.
Posted: 09 May 2014 | Published: 09 May 2014

GlobalScape

APCON INTELLAFLEX-36 Port 10G Time Stamping and Packet Slicing Blade
sponsored by APCON, Inc.
WHITE PAPER: This white paper highlights the challenges that data centers face when it comes to network monitoring. It also explains the performance capabilities and benefits of blade servers from APCON.
Posted: 07 May 2014 | Published: 28 Feb 2014

APCON, Inc.
26 - 50 of 333 Matches Previous Page    1 2 3 4 5    Next Page
 
NETWORK MONITORING DEFINITION (continued): …  close track of switch performance and alter it if necessary. Port mirroring can be managed locally or remotely.An administrator configures port mirroring by assigning a port from which to copy all packets and another port where those packets will be sent. A packet bound for or heading away from the first port will be forwarded onto the second port as well. The administrator places a protocol analyzer on the port receiving the mirrored data to monitor each segment separately. The analyzer captures and evaluates the data without affecting the client on the original port. The monitor port may … 
Network Monitoring definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement