IT Management  >   Systems Operations  >   Network Management  >  

Network Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Networkmonitor, Network Traffic Monitoring, Network Behavior Monitoring, Monitoring Network, Network Performance Monitoring
DEFINITION: Port mirroring, also known as a roving analysis port, is a method of monitoring network traffic that forwards a copy of each incoming and outgoing packet from one port of a network switch to another port where the packet can be studied. A network administrator uses port mirroring as a diagnostic tool or debugging feature, especially when fending off an attack. It enables the administrator to keep  … 
Definition continues below.
Network Monitoring White Papers (View All Report Types)
26 - 50 of 327 Matches Previous Page  |  Next Page
Distilling Alert Noise to Find Real Problems
sponsored by Prelert
WHITE PAPER: Read this brief article to discover how anomaly detection programs can lower your rates of false positives and make security management much more efficient.
Posted: 24 Mar 2015 | Published: 04 Mar 2015

Prelert

7 Ways to Find Rogue Users
sponsored by Prelert
WHITE PAPER: This article gives you seven foolproof steps towards setting up insider security with less disruption and better accuracy.
Posted: 23 Mar 2015 | Published: 03 Apr 2014

Prelert

Case Study: Catching Virtual Thieves
sponsored by Prelert
WHITE PAPER: In this brief case study, discover a crime on intellectual property that came very close to slipping through the cracks.
Posted: 23 Mar 2015 | Published: 16 Jan 2015

Prelert

Selecting a Next-Generation Firewall: Top 10 Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to uncover how a next-gen firewall closes network gaps and explore the top 10 considerations for platform evaluation.
Posted: 17 Mar 2015 | Published: 12 Feb 2014

Cisco Systems, Inc.

Eliminating Security Weak Points with Next-Gen NAC
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: Access this white paper to learn how next-gen network access control (NAC) empowers you to define, implement, and enforce granular access policies for connecting endpoints based on user identity, role, device, location, and other factors.
Posted: 23 Feb 2015 | Published: 04 Dec 2014

ForeScout Technologies, Inc.

Definitive Guide to Next-Gen NAC
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: View this thorough white paper to learn how to manage security risks and eliminate rogue users, devices, and applications through next-gen network access control (NAC). Read on now to:
Posted: 23 Feb 2015 | Published: 05 Nov 2014

ForeScout Technologies, Inc.

Protecting Users from Firesheep and other Sidejacking Attacks with SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the Firesheep Wi-Fi attack tool and other sidejacking attacks with SSL and explains how to avoid these attacks.
Posted: 15 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

A Smarter Approach to Network Encryption
sponsored by Certes Networks
WHITE PAPER: This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.
Posted: 09 Jan 2015 | Published: 16 Dec 2014

Certes Networks

Failover Strategies on the Cisco UCS B Series Chassis
sponsored by Global Knowledge
WHITE PAPER: This white paper discusses how Cisco's popular and powerful Unified Computing Solution is driven by the flexibility and agility of the hardware failover options and Service Profiles.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

Probleu Builds a Winning MSP Business with N-Able by Solarwinds
sponsored by Solarwinds N-able
WHITE PAPER: Access this case study to learn how this MSP eventually chose to leverage the IT channel's #1 RMM and MSP service automation platform.
Posted: 22 Sep 2014 | Published: 19 Sep 2014

Solarwinds N-able

MY IT Reboots RMM Automation with N-Able by Solarwinds
sponsored by Solarwinds N-able
WHITE PAPER: Check out this white paper to learn how a top-tier MSP that meets the IT needs of small to midsized businesses was able to leverage a new RMM platform. You'll learn the top 10 reasons more MSPs are choosing this solution.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Solarwinds N-able

Bluewave Computing Realizes Million-Dollar Productivity Gains with N-Able Technologies
sponsored by Solarwinds N-able
WHITE PAPER: Access this case study to learn how one organization was able to upgrade their service automation platform and deliver benefits in terms of improved productivity, efficiency, and customer retention.
Posted: 16 Sep 2014 | Published: 16 Sep 2014

Solarwinds N-able

Gartner Magic Quadrant for Enterprise Backup Software and Integrated Appliances
sponsored by Asigra
WHITE PAPER: Enterprise backup is among the oldest, most-performed tasks for IT professionals. Gartner provides analysis and evaluation of the leading providers that offer a range of traditional to innovative recovery capabilities.
Posted: 11 Aug 2014 | Published: 16 Jun 2014

Asigra

Ensuring the Availability of Your IBM Tivoli Monitoring Infrastructure
sponsored by Global Knowledge
WHITE PAPER: This white paper addresses four different components of the Tivoli monitoring infrastructure for creating a high availability environment while providing redundancy and failover capacity.
Posted: 04 Aug 2014 | Published: 08 Jul 2014

Global Knowledge

LogRhythm's Security Intelligence Platform
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm's Security Intelligence Platform, which combines enterprise-class SIEM, Log Management, File Integrity Monitoring, and Machine Analytics with Host and Network Forensics to provide profound visibility into threats and risks to which organizations are otherwise blind.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Application Performance Management Is Critical To Business Success
sponsored by IBM
WHITE PAPER: Access this Application Performance Management Forrester Consulting study, which offers insight into the benefits and challenges with today's IT monitoring solutions as well as the types of monitoring features that will help meet application performance and availability expectations.
Posted: 09 Jul 2014 | Published: 28 Feb 2014

IBM

Leverage the Network Infrastructure for Competitive Success
sponsored by Cisco Systems, Inc.
WHITE PAPER: This IDC report examines the opportunity midmarket firms have in leveraging network infrastructure for competitive success in the new cloud and mobility era. Inside, learn how midmarket firms can improve their competitive position by providing more efficient access to advanced productivity resources.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Cisco Systems, Inc.

Enabling Ubiquitous Visibility in Virtualized Enterprises
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper discusses the lack of visibility in the context of monitoring and troubleshooting end-to-end application performance and introduces one company's network performance management solution.
Posted: 04 Aug 2014 | Published: 31 Dec 2012

Riverbed Technology, Inc.

How to Make Apps Run More Efficiently in the Age of the Cloud
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper details many of the issues that applications operations staff currently face; explains the requirements that today's applications operations groups have for an application performance management solution; and lists a number of suggestions for organizations currently choosing between APM solutions.
Posted: 01 Aug 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.

10 Ways for Developers to Benefit from Application Performance Management Solutions
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper covers ten key strategies for developers looking to improve the quality and performance of their software through application management (APM) solutions.
Posted: 01 Aug 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.

Comparison Guide: Riverbed SteelCentral vs. Fluke Networks
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper explains the primary functions under the "performance management" umbrella, from network mapping to end-user experience, and describes one company's approach to tackling all of the use cases and demands of IT in this arena.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

Riverbed Technology, Inc.

The Path to Network Performance Nirvana
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This exclusive infographic will show you why you need to enable better visibility into your network performance.
Posted: 31 Jul 2014 | Published: 12 Jun 2013

Riverbed Technology, Inc.

Riverbed Advances Visibility into Virtual Data Centers
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This exclusive whitepaper looks at an upgraded tool that can enhance your visibility into your network.
Posted: 31 Jul 2014 | Published: 12 Jul 2012

Riverbed Technology, Inc.

Unified Threat Management Guide
sponsored by Sophos, Inc.
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 02 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Unified Monitoring: A Business Perspective
sponsored by CA Technologies.
WHITE PAPER: In the past few years, the enterprise computing landscape has changed dramatically. These changes are rendering legacy monitoring tools, which have their roots in the computing environments of a decade or more ago, virtually useless. This paper explores today's computing trends and their monitoring implications for businesses.
Posted: 19 Jun 2014 | Published: 31 Dec 2013

CA Technologies.
26 - 50 of 327 Matches Previous Page    1 2 3 4 5    Next Page
 
NETWORK MONITORING DEFINITION (continued): …  close track of switch performance and alter it if necessary. Port mirroring can be managed locally or remotely.An administrator configures port mirroring by assigning a port from which to copy all packets and another port where those packets will be sent. A packet bound for or heading away from the first port will be forwarded onto the second port as well. The administrator places a protocol analyzer on the port receiving the mirrored data to monitor each segment separately. The analyzer captures and evaluates the data without affecting the client on the original port. The monitor port may … 
Network Monitoring definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement