IT Management  >   Systems Operations  >   Network Management  >  

Network Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Networkmonitor, Network Traffic Monitoring, Network Behavior Monitoring, Monitoring Network, Network Performance Monitoring
DEFINITION: Port mirroring, also known as a roving analysis port, is a method of monitoring network traffic that forwards a copy of each incoming and outgoing packet from one port of a network switch to another port where the packet can be studied. A network administrator uses port mirroring as a diagnostic tool or debugging feature, especially when fending off an attack. It enables the administrator to keep  … 
Definition continues below.
Network MonitoringWhite Papers (View All Report Types)
26 - 50 of 339 Matches Previous Page  | Next Page
How to Make Your Hybrid Cloud Transparent
sponsored by IBM
WHITE PAPER: This expert E-Guide highlights these options as well as new IT tools to help you take charge of the hybrid cloud.
Posted: 10 Jun 2014 | Published: 10 Jun 2014

IBM

OpenFlow-based SDN Data Center Interconnect
sponsored by NEC Corporation of America
WHITE PAPER: This white paper discusses the benefits of SDN and how it differs from your traditional networks. Read on to learn how delivering messages and other types of content to a variety of Web users has transformed into a simple process due to this flexible type of network.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

NEC Corporation of America

Case Study: How to Scale Operations and Boost Service Levels
sponsored by CA Technologies.
WHITE PAPER: This case study tells the story of one organization's partnership with a service provider that delivers significant improvements in performance and availability while also efficiently managing costs and business growth.
Posted: 05 Jun 2014 | Published: 30 Apr 2014

CA Technologies.

Achieve Peak Network Service Quality with Superior Visibility
sponsored by CA Technologies.
WHITE PAPER: This white paper goes into detail as to how CA Nimsoft Monitor provides complete network visibility and ensures that you achieve the highest levels of business service quality.
Posted: 04 Jun 2014 | Published: 28 Sep 2012

CA Technologies.

Are You Looking for a Way to End the Finger Pointing and Improve your Customers’ Experience?
sponsored by CA Technologies.
WHITE PAPER: This white paper explains the benefits of a monitoring solution that equips enterprise IT organizations and service providers with capabilities to dramatically improve service quality and reduce the costs and time of IT service delivery.
Posted: 04 Jun 2014 | Published: 30 Apr 2014

CA Technologies.

Customer Testimony: Effective Infrastructure Monitoring and Management
sponsored by CA Technologies.
WHITE PAPER: This white paper highlights infrastructure monitoring and management solutions and provides validation of these solutions based on actual customer experiences.
Posted: 04 Jun 2014 | Published: 31 Oct 2013

CA Technologies.

Support Any Data Center Environment with Unified Monitoring Architecture
sponsored by CA Technologies.
WHITE PAPER: This white paper gives a technical breakdown of the features and capabilities of CA Nimsoft Monitor, an IT monitoring tool built to support both traditional data centers and new virtualized and cloud environments.
Posted: 04 Jun 2014 | Published: 31 Mar 2014

CA Technologies.

Next-gen Application Delivery Controllers: An Intelligent Path to Active-Active Clusters
sponsored by Citrix
WHITE PAPER: This informative guide explores the role of these next-generation ADCs and provides insight on their effectiveness.
Posted: 09 May 2014 | Published: 09 May 2014

Citrix

Why Wait? 7 Principles to Improve Availability, Site Speed and User Experience
sponsored by Limelight Networks, Inc.
WHITE PAPER: Boosting application and Web performance is a top priority for all IT professionals, and in order to do that you must focus on your network performance and infrastructure. This guide highlights how to improve availability, site speed and user experience in 7 steps.
Posted: 01 May 2014 | Published: 01 May 2014

Limelight Networks, Inc.

Managing, Delivering and Optimizing Dynamic Content through a Third-Party Provider
sponsored by Limelight Networks, Inc.
WHITE PAPER: Did you know that 64% of organizations named growth in dynamic content as one of their top three challenges? This guide explores some frequently asked questions when it comes to delivering dynamic content over your network infrastructure.
Posted: 29 Apr 2014 | Published: 15 Mar 2014

Limelight Networks, Inc.

Visibility Fabric Architecture
sponsored by Gigamon
WHITE PAPER: This informative guide delivers valuable insight on a comprehensive visibility solution that provides dynamic visibility of your architecture.
Posted: 21 Apr 2014 | Published: 31 Mar 2014

Gigamon

Unified Visibility Fabric Architecture – A New Approach to Visibility
sponsored by Gigamon
WHITE PAPER: This guide explores a new strategy for network visibility enhancement and how it will revolutionize your existing infrastructure.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Gigamon

A Complete Analysis of Gigamon's Added Network Support
sponsored by Gigamon
WHITE PAPER: Read this informative whitepaper to learn more about the nuances of increased vendor support and how virtualization support can help you harmonize your disparate network environment into a more cohesive picture.
Posted: 17 Apr 2014 | Published: 31 Dec 2013

Gigamon

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

Planning a Private Enterprise Cloud?
sponsored by KEMP Technologies
WHITE PAPER: This informative whitepaper explores the role of SDN and load balancing when planning your private cloud.
Posted: 14 May 2014 | Published: 14 May 2014

KEMP Technologies

An Essential Guide to Application Delivery Controllers
sponsored by Citrix
WHITE PAPER: This guide explores a top-tier application delivery controller and how it can help your organization with web application delivery, load balancing and more.
Posted: 12 May 2014 | Published: 12 May 2014

Citrix

A Cohesive Approach to Addressing Advanced Targeted Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This resource features a 5-component threat prevention framework that takes existing technologies to the next level to better protect your vulnerable networks from today's advanced threats.
Posted: 09 May 2014 | Published: 09 May 2014

Fortinet, Inc.

The Fight for Full Network Visibility in a Dangerous World
sponsored by APCON, Inc.
WHITE PAPER: This white paper highlights critical features your network security strategies may be missing that are mandatory in today's advanced threat environment.
Posted: 09 May 2014 | Published: 09 May 2014

APCON, Inc.

The Differences Between End User Experience Management and APM
sponsored by Aternity
WHITE PAPER: This guide explores the benefits of application performance management can benefit your network and end-user experience.
Posted: 09 May 2014 | Published: 31 Dec 2013

Aternity

Is Your Network Traffic Invisible?
sponsored by GlobalScape
WHITE PAPER: This brief guide explores the importance of network monitoring and outlines the benefits of increased visibility.
Posted: 09 May 2014 | Published: 09 May 2014

GlobalScape

APCON INTELLAFLEX-36 Port 10G Time Stamping and Packet Slicing Blade
sponsored by APCON, Inc.
WHITE PAPER: This white paper highlights the challenges that data centers face when it comes to network monitoring. It also explains the performance capabilities and benefits of blade servers from APCON.
Posted: 07 May 2014 | Published: 28 Feb 2014

APCON, Inc.

Monitor Your Virtual Network to Maintain 100% Visibility
sponsored by APCON, Inc.
WHITE PAPER: This brief whitepaper explores a unique tool for monitoring your network and maintaining 100% visibility.
Posted: 07 May 2014 | Published: 07 May 2014

APCON, Inc.

Multi Stage Filtering
sponsored by APCON, Inc.
WHITE PAPER: This informative guide explores the current challenges networks face when it comes to increased traffic and how effective packet filtering can help you.
Posted: 07 May 2014 | Published: 07 May 2014

APCON, Inc.

Tolly Test Report: IBM Security Web Gateway Appliance
sponsored by IBM
WHITE PAPER: This white paper highlights the features and benefits of a security Web gateway appliance that successfully blocks potential Web application threats.
Posted: 05 May 2014 | Published: 25 Sep 2013

IBM

Definitive Guide to Next Generation Network Access Control
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This in-depth guide provides valuable insight on next-generation network access control and how it can help your network remain secure, while enhancing performance.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

ForeScout Technologies, Inc.
26 - 50 of 339 Matches Previous Page    1 2 3 4 5    Next Page
 
NETWORK MONITORING DEFINITION (continued): …  close track of switch performance and alter it if necessary. Port mirroring can be managed locally or remotely.An administrator configures port mirroring by assigning a port from which to copy all packets and another port where those packets will be sent. A packet bound for or heading away from the first port will be forwarded onto the second port as well. The administrator places a protocol analyzer on the port receiving the mirrored data to monitor each segment separately. The analyzer captures and evaluates the data without affecting the client on the original port. The monitor port may … 
Network Monitoring definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement