IT Management  >   Systems Operations  >   Network Management  >  

Network Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Networkmonitor, Network Traffic Monitoring, Network Behavior Monitoring, Monitoring Network, Network Performance Monitoring
DEFINITION: Port mirroring, also known as a roving analysis port, is a method of monitoring network traffic that forwards a copy of each incoming and outgoing packet from one port of a network switch to another port where the packet can be studied. A network administrator uses port mirroring as a diagnostic tool or debugging feature, especially when fending off an attack. It enables the administrator to keep  … 
Definition continues below.
Network MonitoringWhite Papers (View All Report Types)
76 - 100 of 357 Matches Previous Page  | Next Page
Protecting DNS Infrastructure - Inside and Out
sponsored by Infoblox
WHITE PAPER: This guide takes a look at some top threats your network faces and explores the strategies needed to defend yourself against DNS-based attacks.
Posted: 06 Mar 2014 | Published: 31 Jan 2014

Infoblox

A Cybercriminal's Guide to Exploiting DNS for Fun and Profit
sponsored by Infoblox
WHITE PAPER: This guide explores current network security trends and how to protect your DNS from various cyber-attacks.
Posted: 06 Mar 2014 | Published: 31 Jan 2014

Infoblox

Poison Ivy and Random Access Tools: What You Need to Know
sponsored by FireEye
WHITE PAPER: This guide explores the current threat landscape and more specifically Poison Ivy, a remote access tool that has been used in several high-profile malware campaigns. Read on to learn which tools you need to defend yourself from this form of cybercrime.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

FireEye

A Cybercriminal's Guide to Exploiting DNS for Fun and Profit
sponsored by Infoblox
WHITE PAPER: This guide explores current network security trends and how to protect your DNS from various cyber-attacks.
Posted: 04 Mar 2014 | Published: 31 Jan 2014

Infoblox

Optimizing Visibility, Control and Performance of Network Traffic
sponsored by Ixia
WHITE PAPER: Learn how network monitoring switches can help offload and control your current tools, providing the visibility you need for effective data center network monitoring and management.
Posted: 03 Mar 2014 | Published: 30 Jun 2013

Ixia

Best Practices for Utilizing Network Monitoring Switches in Cisco Environments
sponsored by Ixia
WHITE PAPER: Access this white paper to discover how network monitoring switches can help overcome the challenges of deploying packet-based monitoring in a Cisco network.
Posted: 03 Mar 2014 | Published: 31 Mar 2013

Ixia

Simplify Network Monitoring
sponsored by Ixia
WHITE PAPER: Day-to-day network monitoring shouldn't be as difficult as it is--but as networks expand, infrastructures have become more complex. Discover how network monitoring switches can help.
Posted: 03 Mar 2014 | Published: 30 Jun 2013

Ixia

Five Steps to Building Visibility and Security Into Your Network
sponsored by Ixia
WHITE PAPER: Discover five steps you need to take to not only build visibility and security into your network, but also get the most out of your current monitoring investments.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

Ixia

Improving Network Visibility with Advanced Packet Filtering
sponsored by Ixia
WHITE PAPER: Find out more about a network monitoring switch tool with advanced filtering options that can quickly resolve network problems and address future requirements.
Posted: 28 Feb 2014 | Published: 31 Aug 2013

Ixia

Automation: The Future of Network Visibility
sponsored by Ixia
WHITE PAPER: Gain an understanding of how monitoring switch automation fits your organization, and discover how different security tools can help boost your compliance initiatives.
Posted: 28 Feb 2014 | Published: 30 Nov 2013

Ixia

Unified Threat Management Guide
sponsored by Sophos, Inc.
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Sophos, Inc.

Ixia Black Book: Long Term Evolution - Access
sponsored by Ixia
WHITE PAPER: This in-depth guide provides a general overview of the LTE technology market and explores some informative case studies about LTE.
Posted: 25 Feb 2014 | Published: 31 Dec 2012

Ixia

Application Visibility: The Root of Good Service Management
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This guide highlights some best practices for managing your services and how to enhance your existing tools to provide a more effective network and application visibility.
Posted: 24 Jan 2014 | Published: 31 Dec 2012

Riverbed Technology, Inc.

Evolving APM: Big Data Approach, Integrated End-user Experience Monitoring Bring Deep End-to-end Application visibility
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This whitepaper examines a solution that leverages existing big data capabilities, integrates end-user experience monitoring and uses integrated development environment tools to maintain deep end-to-end application visibility.
Posted: 24 Jan 2014 | Published: 24 Jan 2014

Riverbed Technology, Inc.

Minimize Security Risks While Reducing Costs
sponsored by Palo Alto Networks
WHITE PAPER: This resource overviews a next-generation security platform that offers clear visibility and improved control over users, applications, and content. Click now to see how 3 businesses fared after deploying this solution, including immense cost and operation reduction benefits.
Posted: 24 Jan 2014 | Published: 31 Aug 2013

Palo Alto Networks

Integrate Firewalls and Increase Visibility Anywhere with User-ID Link
sponsored by Palo Alto Networks
WHITE PAPER: This white paper highlights a security solution that integrates existing enterprise directory services with next-generation firewalls so application activity and policies are linked directly with users or groups. Read on to learn how user-based analysis, reporting, and forensics can improve visibility and protection.
Posted: 24 Jan 2014 | Published: 12 Nov 2012

Palo Alto Networks

Achieve Network Visibility and Control with Firewall Traffic Classification
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, explore a firewall traffic classification solution that offers improved visibility and control over every application that traverses the network. Learn more about the 4 unique technologies that help identify any potential risks so IT can enforce stronger application enablement policies.
Posted: 24 Jan 2014 | Published: 21 Mar 2014

Palo Alto Networks

SaaS vs. Premise-based Monitoring: 9 Reasons Why SaaS Makes More Sense
sponsored by LogicMonitor
WHITE PAPER: Access this resource for the 9 benefits of SaaS, and to find out why server and network monitoring is ideal for a cloud-based model.
Posted: 05 Mar 2014 | Published: 05 Mar 2014

LogicMonitor

Why Protection and Performance Matter: Introducing Next-Generation Firewalls
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to discover the benefits of a next-generation firewall and how it offers top security without causing serious network latency.
Posted: 27 Feb 2014 | Published: 31 Dec 2012

Dell, Inc.

K-12 School District Implements BYOD and Incorporates Blended Learning Curriculum with Extreme Networks Products
sponsored by Extreme Networks
WHITE PAPER: This case study takes a look at how one school successfully implemented BYOD initiatives and centralized network management.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

Extreme Networks

The “BYOD Done Right™” Solution
sponsored by Extreme Networks
WHITE PAPER: This guide takes a look at a unique tool for solving potential mobility issues and how with enhanced network management, businesses can enjoy a high-performing mobile workplace.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

Extreme Networks

Extreme Networks Physical Security Solution
sponsored by Extreme Networks
WHITE PAPER: This guide explores some significant benefits of networking for your physical security and how it can enhance your network performance.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

Extreme Networks

Extend the OneFabric Architecture to 3rd Party Applications
sponsored by Extreme Networks
WHITE PAPER: This guide explores the value of SDN and how it can help your network overcome the challenges of growing workplace mobility and BYOD.
Posted: 18 Feb 2014 | Published: 18 Feb 2014

Extreme Networks

Enabling Network Monitoring at 40Gbps and 100Gbps
sponsored by Gigamon
WHITE PAPER: This guide explores the evolution of network monitoring, its importance to your data center and how you can raise your monitoring speeds from 40Gbps to 100Gbps.
Posted: 30 Jan 2014 | Published: 31 Dec 2012

Gigamon

Network Monitoring and Troubleshooting for Dummies
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This in-depth guide explores the challenges of a complex network system and how with effective network monitoring and management you can optimize your network and enhance your end-user experience. Read now and learn how to better monitor and troubleshoot your network.
Posted: 24 Jan 2014 | Published: 24 Jan 2014

Riverbed Technology, Inc.
76 - 100 of 357 Matches Previous Page    2 3 4 5 6 7    Next Page
 
NETWORK MONITORING DEFINITION (continued): …  close track of switch performance and alter it if necessary. Port mirroring can be managed locally or remotely.An administrator configures port mirroring by assigning a port from which to copy all packets and another port where those packets will be sent. A packet bound for or heading away from the first port will be forwarded onto the second port as well. The administrator places a protocol analyzer on the port receiving the mirrored data to monitor each segment separately. The analyzer captures and evaluates the data without affecting the client on the original port. The monitor port may … 
Network Monitoring definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement