IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: FCAPS (fault-management, configuration, accounting, performance, and security) is an acronym for a categorical model of the working objectives of network management. There are five levels, called the fault-management level (F), the configuration level (C), the accounting level (A), the performance level (P), and the security level (S).At the F level, network problems are found and corrected. Potential  … 
Definition continues below.
Network ManagementReports
1 - 25 of 1724 Matches Previous Page  | Next Page
The Need to Rethink the WAN
sponsored by VeloCloud
WHITE PAPER: This white paper explores some WAN characteristics, limitations and some new approachesbetter suited to supporting fast-changing business and technology environments. Read on to learn more.
Posted: 19 Dec 2014 | Published: 19 Dec 2014

VeloCloud

Enterprise Mobility 101: Separating Work and Personal
sponsored by BlackBerry
WHITE PAPER: This exclusive white paper takes an in-depth look at dealing with the difficult security challenges associated with mobility adoption. Read on to learn more.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

BlackBerry

Mobility in Financial Services
sponsored by BlackBerry
WHITE PAPER: This exclusive white paper takes an in-depth look at enterprise mobility for financial services companies, and how taking control of the benefits of mobility today can pay off big time tomorrow. Read on to learn more.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

BlackBerry

How to Ensure Web and App Performance by Addressing the Front End
sponsored by Limelight Networks, Inc.
WHITE PAPER: The following white paper explores what companies need to do to ensure the performance of web and mobile applications. Uncover how front end acceleration can help achieve the desired speed, which technologies make this goal a reality, and how to apply the front end acceleration to 3 key areas.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Limelight Networks, Inc.

The New Office: A Moving Story
sponsored by Sprint
WHITE PAPER: This exclusive white paper dives into the hopes and fears that come with an office move and offers up six must-have technologies for making the move easier.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Sprint

A powerful defense against denial of service attacks
sponsored by Citrix
WHITE PAPER: As cybercrime continues to grow, denial of service (DoS) attacks have become far more prevalent. This guide explores the current landscape of DoS attacks and what you can do to protect your network.
Posted: 16 Dec 2014 | Published: 27 Dec 2013

Citrix

Got IP address management problems? Think DNS, DHCP, IPAM Trifecta
sponsored by BlueCat
EGUIDE: In this expert e-guide, discover the challenges of IPAM and how a more complex network management tool that targets DNS, DHCP, and IPAM (DDI) may be the answer you're looking for.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

BlueCat

Protect Your Sensitive Data Without Weighting Down Your Networks
sponsored by SafeNet, Inc.
PRODUCT OVERVIEW: This white paper introduces SafeNet's Network Encryption and Isolation solutions, which ensure data confidentiality and infrastructure isolation for your networks without impacting day-to-day operations, whether in traditional data centers or in the cloud.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

SafeNet, Inc.

The IBM Platform Computing Cloud Service: Benchmarking performance
sponsored by IBM
WHITE PAPER: Check out this white paper to learn why IBM's Platform Computing Cloud Service is a smart choice for handling heavy workloads and other short-term peak demands.
Posted: 15 Dec 2014 | Published: 31 May 2014

IBM

IT Professionals Rate ShoreTel Top in Customer Loyalty, Service, Value
sponsored by ShoreTel
WHITE PAPER: This exclusive research paper details the key factors organizations should look for when choosing a UC provider.  Read on to learn more.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

ShoreTel

Staying Secure in the Cloud: Considerations for Migrating Communications Solutions to Cloud Services
sponsored by ShoreTel
WHITE PAPER: This white paper examines security considerations for migrating communication solutions into the cloud and offers insight into how a cloud service protects your valuable data. Read on to learn more.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

ShoreTel

The Rise of the Super-User
sponsored by Telstra Global
WHITE PAPER: This exclusive research report takes an in-depth look at what users in the unified communications network find the most helpful, and more. Read on to take the first step towards a better understanding of the future for UC.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

Telstra Global

How SDN Will Enable Automated Network Security
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford explains how the centralized control enabled by SDN will ultimately result in security-defined routing and other SDN security strategies that could forever change how we defend the network and the applications or data running across it.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

SDN Security Strategies for Network Attack Prevention
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford discusses the rise of software-defined monitoring; using SDN for security monitoring and packet analysis; how SDN security strategies tackle network attack prevention; and more.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Using Network Flow Analysis To Improve Network Security Visibility
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Gregg explains how security professionals are turning to network flow analysis to gain improved network security visibility.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Enterprises Seek Greater Security Through Network Transparency
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Kevin Beaver lists 3 major ways that you can better know and secure your enterprise networks as they grow larger and more complex than ever before.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Unlock New Pathways to Network Security Architecture
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford offers advice on how your organization can make the right network security architecture decisions when it comes to network isolation and segmentation to create a multi-layer attack surface.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Next-Generation Firewalls and IPS: Why You Need Both
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP white paper shows how next-generation firewalls and next-generation intrusion prevention systems are complementary security solutions that work together to secure your network.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

Hewlett-Packard Company

Conquer the Cloud with an Automated and Secure Network
sponsored by BlueCat
WEBCAST: This webcast highlights how to manage your network while enforcing security and implementing automation.
Posted: 10 Dec 2014 | Premiered: Dec 10, 2014

BlueCat

Revolutionize your infrastructure with automation, agility and security
sponsored by IBM
WHITE PAPER: Access this white paper to explore a comprehensive solution that can propel your business in the future, in terms of cloud and virtualization technologies.
Posted: 10 Dec 2014 | Published: 31 Dec 2013

IBM

Detecting Cyber Attacks in a Mobile and BYOD Organization
sponsored by Vectra Networks
WHITE PAPER: This solution brief sets out to explore the challenges, understand the needs,evaluate mobile device management as an approach to detecting attacks. Read on to learn more.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Vectra Networks

In the "Age of the Customer," APM is Critical for Success
sponsored by IBM
WHITE PAPER: This resource explains the benefits and challenges associated with today's IT monitoring solutions, and explains the types of monitoring features that will help businesses meet application, performance, and availability expectations.
Posted: 09 Dec 2014 | Published: 28 Feb 2014

IBM

Get the Most From Mobility for Individuals and Workgroups
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This exclusive white paper explains how mobile computing has made people more aware, agile, and responsive in their personal lives - and how raised expectations in the workplace have real implications for the enterprise. Read on to learn more.
Posted: 09 Dec 2014 | Published: 03 Dec 2014

Dell, Inc. and Intel®

The Storm of Collaboration by Telstra Cloud Collaboration
sponsored by Telstra Global
VIDEO: This exclusive video explores a cloud collaboration solution that focuses on processes that deal with the individual over the enterprise with a consumption model that goes from system to service.
Posted: 09 Dec 2014 | Premiered: 03 Sep 2014

Telstra Global

Creating a Solid Foundation for DNS and DHCP
sponsored by BlueCat
WHITE PAPER: In this white paper, explore several design options available to network architects—including a number of recommended industry best practices that help ensure DNS and DHCP environments are reliable, secure and manageable.
Posted: 09 Dec 2014 | Published: 31 Dec 2013

BlueCat
1 - 25 of 1724 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): …  future problems are identified, and steps are taken to prevent them from occurring or recurring. In this way, the network is kept operational, and downtime is minimized.At the C level, network operation is monitored and controlled. Hardware and programming changes, including the addition of new equipment and programs, modification of existing systems, and removal of obsolete systems and programs, are coordinated. An inventory of equipment and programs is kept and updated regularly.The A level, which might also be called the allocation level, is devoted to distributing resources optimally and fairly … 
Network Management definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement