IT Management  >   Systems Operations  >   Network Management  >  

Network Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Networkmonitor, Network Traffic Monitoring, Network Behavior Monitoring, Monitoring Network, Network Performance Monitoring
DEFINITION: Netstat is a common command line TCP/IP networking utility available in most versions of Windows, Linux, UNIX and other operating systems. Netstat provides information and statistics about protocols in use and current TCP/IP network connections. (The name derives from the words network and statistics.)The Windows help screen (analogous to a Linux or UNIX man page) for netstat reads as follows:Displays  … 
Definition continues below.
Network Monitoring White Papers (View All Report Types)
51 - 75 of 352 Matches Previous Page  |  Next Page
Threat Intelligence Platforms: Everything You've Ever Wanted to Know But Didn't Know to Ask
sponsored by ThreatConnect
WHITE PAPER: Today's cyber-threats are relentless, and they come in all forms. This in-depth resource covers the ins and outs of threat intelligence, discussing everything from what threat intelligence is to how you can best utilize it.
Posted: 15 Dec 2015 | Published: 15 Dec 2015

ThreatConnect

The Cyber Threat Risk: Oversight Guidance for CEOs and Boards
sponsored by LogRhythm, Inc.
WHITE PAPER: This resource discusses what CEOs and other executives can do to ensure strong security in their enterprises.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

LogRhythm, Inc.

Secure and Monitor Every Endpoint, Everywhere
sponsored by IBM
WHITE PAPER: Access this white paper that discusses the challenges of endpoint security and gives advice on monitoring and protecting all of your endpoints before, during and after a hack.
Posted: 19 Oct 2015 | Published: 31 Jul 2015

IBM

Partitioning vs. "Split By" Clause in Anomaly Detection
sponsored by Prelert
WHITE PAPER: This white paper points out the finer differences between anomaly detection approaches and how each affects your anomaly score. Read on to learn which strategy will enhance your network security.
Posted: 02 Feb 2016 | Published: 20 Jul 2015

Prelert

Prelert Analytics vs Holt-Winters Filtering
sponsored by Prelert
WHITE PAPER: In this technical brief, explore the comparison between two real time series data modeling and anomaly detection strategies. Learn how anomaly detection on real time series data requires specific modeling capabilities and review the results obtained with each approach.
Posted: 01 Feb 2016 | Published: 30 Dec 2015

Prelert

Detect and Investigate DNS Tunneling with Security Analytics
sponsored by Prelert
WHITE PAPER: In this white paper, discover the benefits of enhancing anomaly detection and why it's imperative your network security leverages it.
Posted: 01 Feb 2016 | Published: 24 Aug 2015

Prelert

Prioritizing IT Monitoring Alerts with Anomaly Severity Scores
sponsored by Prelert
WHITE PAPER: This white paper examines why organizations are turning to behavioral analytics to reduce noise and takes a closer look at one organization's success with the strategy.
Posted: 01 Feb 2016 | Published: 12 Aug 2015

Prelert

Detect and Thwart Insider Threats
sponsored by Lancope
WHITE PAPER: This white paper discusses how you can stop insider threats with enhanced network visibility. Read on to learn how to keep your organization secure from the inside out.
Posted: 05 Jan 2016 | Published: 31 Dec 2015

Lancope

Detect Network Anomalies with the Right Netflow Analysis Tool
sponsored by Lancope
WHITE PAPER: In this article, a security expert discusses how he found a security tool that met his netflow analysis needs. Read on and learn how you can obtain the deep network insights necessary for stopping advanced hacks in your organization.
Posted: 04 Jan 2016 | Published: 18 Nov 2014

Lancope

Case Study: School District Stops Breaches with Heightened Network Visbility
sponsored by Lancope
WHITE PAPER: Access this case study to discover how a large school district blocked breaches with network visibility, improved its incident response time, and more.
Posted: 30 Dec 2015 | Published: 30 Dec 2015

Lancope

What's Behind a Cyber Attack?
sponsored by IBM
WHITE PAPER: Learn how to uncover the what, when, and how of security incidents to fortify your security strategy against increasingly sophisticated attacks. Examine the shortcomings of conventional breach investigation approaches and how to build intelligence to navigate investigations faster and easier in this helpful whitepaper.
Posted: 12 Nov 2015 | Published: 14 Apr 2014

IBM

Turning APM into an IT Detective
sponsored by CA Technologies.
WHITE PAPER: This white paper shows you how you can make sure that your APM solutions are deployed optimally in your network.
Posted: 21 Sep 2015 | Published: 21 Sep 2015

CA Technologies.

Security and Privacy on the Encrypted Network
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This white paper discusses the challenges of decryption and gives advice on how you can implement it more effectively.
Posted: 17 Sep 2015 | Published: 20 Jan 2015

Symantec & Blue Coat Systems

Unified Monitoring: A Business Perspective
sponsored by CA Technologies.
WHITE PAPER: Access this paper to explore today's computing trends and their monitoring implications in detail, and to learn the 5 requirements for gaining a unified monitoring perspective.
Posted: 16 Sep 2015 | Published: 31 Oct 2014

CA Technologies.

The Economics of Defense: Modeling Security Investments Against Risk
sponsored by Juniper Networks, Inc.
WHITE PAPER: There are a number of factors to take into account when building, or modifying, your cybersecurity strategy – and inside this report, take a look at 5 drivers that influence the costs of cybersecurity.
Posted: 08 Sep 2015 | Published: 08 Sep 2015

Juniper Networks, Inc.

Quick Guide to Network Anomaly Detection
sponsored by Prelert
WHITE PAPER: This brief white paper details the two types of anomaly scores and how they are manifested. Continue reading now to learn how to use each score as an indicator for proactive alerting.
Posted: 10 Aug 2015 | Published: 30 Jul 2015

Prelert

Research Report: The Benefits of Security Analytics
sponsored by Prelert
WHITE PAPER: Read this report to discover what IT pros have to say about security analytics' most useful features, its value, and more.
Posted: 05 May 2015 | Published: 30 Apr 2015

Prelert

Anomaly Detection: Finding Black Swans in Big Data
sponsored by Prelert
WHITE PAPER: This white paper introduces an anomaly detection system that cuts through big data to find even the subtlest threats.
Posted: 26 Mar 2015 | Published: 24 Jan 2015

Prelert

Why Every IT Security Team Needs Anomaly Detection Software
sponsored by Prelert
WHITE PAPER: In this white paper, you will discover the ins and outs of anomaly detection, used to actively prevent today's most pernicious cyber-attacks. Read on to learn the benefits network anomaly detection will deliver to your IT environments, and see how it can function as the "watchdog" for your IT security team.
Posted: 25 Mar 2015 | Published: 31 Dec 2014

Prelert

Distilling Alert Noise to Find Real Problems
sponsored by Prelert
WHITE PAPER: Read this brief article to discover how anomaly detection programs can lower your rates of false positives and make security management much more efficient.
Posted: 24 Mar 2015 | Published: 04 Mar 2015

Prelert

7 Ways to Find Rogue Users
sponsored by Prelert
WHITE PAPER: This article explores 7 steps to guard your network against rogue users. Read on to discover the unobtrusive measures you can take to catch and stop inside threats.
Posted: 23 Mar 2015 | Published: 03 Apr 2014

Prelert

Case Study: Catching Virtual Thieves
sponsored by Prelert
WHITE PAPER: In this brief case study, discover a crime on intellectual property that came very close to slipping through the cracks.
Posted: 23 Mar 2015 | Published: 16 Jan 2015

Prelert

Leverage the Network Infrastructure for Competitive Success
sponsored by Cisco Systems, Inc.
WHITE PAPER: This IDC report examines the opportunity midmarket firms have in leveraging network infrastructure for competitive success in the new cloud and mobility era. Inside, learn how midmarket firms can improve their competitive position by providing more efficient access to advanced productivity resources.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Cisco Systems, Inc.

Enabling Ubiquitous Visibility in Virtualized Enterprises
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper discusses the lack of visibility in the context of monitoring and troubleshooting end-to-end application performance and introduces one company's network performance management solution.
Posted: 04 Aug 2014 | Published: 31 Dec 2012

Riverbed Technology, Inc.

How to Make Apps Run More Efficiently in the Age of the Cloud
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper details many of the issues that applications operations staff currently face; explains the requirements that today's applications operations groups have for an application performance management solution; and lists a number of suggestions for organizations currently choosing between APM solutions.
Posted: 01 Aug 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.
51 - 75 of 352 Matches Previous Page    1 2 3 4 5 6    Next Page
 
NETWORK MONITORING DEFINITION (continued): …  protocol statistics and current TCP/IP network connections.NETSTAT -a -b -e -n -o -p proto -r -s -v interval -a Displays all connections and listening ports. -b Displays the executable involved in creating each connection or listening port. In some cases well-known executables host multiple independent components, and in these cases the sequence of components involved in creating the connection or listening port is displayed. In this case the executable name is in [] at the bottom, … 
Network Monitoring definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement