IT Management  >   Systems Operations  >   Network Management  >   Network Performance  >  

Network Behavior Anomaly Detection

RSS Feed    Add to Google    Add to My Yahoo!
Network Behavior Anomaly DetectionReports
 
Forrester Thought Leadership White Paper: Exploring the Potential Benefits of End-to-End Convergence of Data Center Networks
sponsored by Cisco Systems, Inc.
WHITE PAPER: This whitepaper discloses the results of an evaluation of end-to-end storage area network/local area network (SAN/LAN) networking issues including Fibre Channel over Ethernet (FCoE) adoption.
Posted: 14 Feb 2012 | Published: 14 Feb 2012

Cisco Systems, Inc.

Video Solutions: Understanding Video Quality
sponsored by Motorola, Inc.
WHITE PAPER: An understanding of the effect of factors such as resolution, frames per second, video codec, packets per second, and bit rate on bandwidth requirements will enable network operators to correctly design communications infrastructure networks that will support video applications. Read on to learn more.
Posted: 21 Aug 2009 | Published: 21 Aug 2009

Motorola, Inc.

PCI DSS Compliance with Riverbed Stingray Traffic Manager and Stingray Application Firewall
sponsored by Riverbed Technology, Inc.
WHITE PAPER: PCI DSS is mandatory for any business that handles confidential cardholder data. Riverbed® Stingray™ Traffic Manager and Stingray Application Firewall Module help with many parts of the PCI DSS specification, notably the web application firewall (WAF) requirements of section 6.6.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

Riverbed Technology, Inc.

The Advantages of Multi-Core Architecture in Unified Threat Management (UTM) Solutions
sponsored by SonicWALL
WHITE PAPER: Securing your company's network requires a comprehensive approach that includes intrusion prevention, data leak protection, and content filtering. This white paper examines how UTM solutions provide enhanced security that is efficient and cost-effective.
Posted: 28 Apr 2008 | Published: 01 Apr 2008

SonicWALL

Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them
sponsored by BlueCoat
PRESENTATION TRANSCRIPT: Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

BlueCoat

How to Accurately Detect and Correct Packet Loss
sponsored by Silver Peak
WHITE PAPER: This paper explains how packet loss can be properly measured throughout an enterprise, and what can be done to mitigate its effects in real-time.
Posted: 21 May 2012 | Published: 31 Dec 2010

Silver Peak

Practitioners Guide to Establishing a SOC Webinar
sponsored by AlienVault
WEBCAST: This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AlienVault

Managing Network Bandwidth to Maximize Network Performance
sponsored by Fluke Networks
WHITE PAPER: This white paper describes how to leverage best practices to monitor, baseline, and manage the network bandwidth and performance. It also highlights how to identify and eliminate issues such as unwanted traffic, unwanted protocols, and network problems with factory default switch configurations.
Posted: 13 Apr 2010 | Published: 01 Aug 2007

Fluke Networks

Continuously Monitor and Manage with Unified Service Monitor
sponsored by Cisco Systems, Inc.
DATA SHEET: Uncover the details of a unified communications solution that will help you easily achieve an effective collaboration experience every time, from any workspace.
Posted: 16 Mar 2012 | Published: 16 Mar 2012

Cisco Systems, Inc.

AirTight Social Wi-Fi and Analytics for the Retail Store of the Future
sponsored by AirTight Networks, Inc.
WHITE PAPER: Companies are now going beyond simple high-speed Wi-Fi to ensure a seamless consumer experience. This guide outlines how retailers now have access to the same analytics online retailers.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

AirTight Networks, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement