IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: FCAPS (fault-management, configuration, accounting, performance, and security) is an acronym for a categorical model of the working objectives of network management. There are five levels, called the fault-management level (F), the configuration level (C), the accounting level (A), the performance level (P), and the security level (S).At the F level, network problems are found and corrected. Potential  … 
Definition continues below.
Network Management Reports
151 - 175 of 1732 Matches Previous Page  |  Next Page
Cloud First Mobile First – Introducing Enterprise Mobility as a Service
sponsored by Dimension Data
VIDEO: This exclusive video details a way to enable your organization to adopt a more user-centric approach in addressing the needs of today's mobile workforce. View now to learn more.
Posted: 26 Feb 2015 | Premiered: 26 Feb 2015

Dimension Data

Australian icon achieves 63% reduction in network maintenance costs
sponsored by Dimension Data
CASE STUDY: The following case study profiles a global minor contractor who wanted to make improvements to their overall network—including application performance and the end user experience.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Dimension Data

What is Software Diversification?
sponsored by WhiteCryption
WHITE PAPER: This document describes the concept of software diversification and explains why it should be an integral part of the protection scheme of all software systems run on untrusted hosts. Read on to learn more.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

WhiteCryption

3 Key Insights of UC&C Complexity
sponsored by Premiere Conferencing
WHITE PAPER: This exclusive white paper highlights the 3 complex forces of UC&C complexity and how to work around them. Read on to learn more.
Posted: 25 Feb 2015 | Published: 25 Feb 2015


Taking Steps to Protect Financial Mobile Applications from Cybercrime and Malware
sponsored by WhiteCryption
WHITE PAPER: This exclusive white paper takes an in-depth look at how to protect your mobile applications from cybercrime and malware. Read on to learn more.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

WhiteCryption

Gartner Magic Quadrant for Application Delivery Controllers
sponsored by F5 Networks
WHITE PAPER: This exclusive vendor comparison brought to you by the experts at Gartner reveal the top vendors in each quadrant - plus an in-depth look at pros and cons to all. Read on to learn more.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

F5 Networks

7 Keys to Rock Solid Communications – Year after Year after Year
sponsored by Unify
WHITE PAPER: This exclusive white paper offers 7 helpful tips for a rock-solid unified communications plan.  Read on to learn more.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

Unify

The Current State of IT for Network Engineers
sponsored by Fluke Networks
WHITE PAPER: In this white paper, examine the state of the IT landscape today and what network engineers are up against. Read on to explore the benefits cloud computing has bestowed upon data center and the challenges it presents for network engineers.
Posted: 18 Feb 2015 | Published: 07 Jan 2015

Fluke Networks

Operationalizing the Network: SDN
sponsored by F5 Networks
WHITE PAPER: This exclusive white paper takes an in-depth look at a solution for today's application world: SDN. Read on to learn more.
Posted: 18 Feb 2015 | Published: 18 Feb 2015

F5 Networks

Next-Generation Network Security: A Buyers’ Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: This buyer's guide provides an in-depth explanation of the factors that impel organizations to look at next generation security solutions.  Read on to learn more.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

Cisco Systems, Inc.

Cloudmark Security Platform for DNS
sponsored by Cloudmark
ASSESSMENT TOOL: If you suspect that your DNS has been compromised, use this DNS analysis page from Cloudmark to send them a traffic sample for complimentary analysis—the first step to take along the path to proven security success.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

Cloudmark

Unified Network Management—Are We There Yet?
sponsored by SearchNetworking.com
EBOOK: This technical guide considers the subject of unified network management, and how IT pros can better manage and monitor networks today.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

SearchNetworking.com

The four cornerstones of a successful BYOD program
sponsored by Dell, Inc. and Intel®
WHITE PAPER: In this informative e-guide, learn about the four cornerstones of a successful BYOD program: quality of user experience, device flexibility, vendor independence, and security policy. Information is one of the most valuable pieces of an organization – discover how to implement to right BYOD policy to secure it
Posted: 11 Feb 2015 | Published: 11 Feb 2015

Dell, Inc. and Intel®

From Singapore to Tokyo: Choosing a Data Center Location in Asia Pacific
sponsored by Digital Realty
WHITE PAPER: This white paper explains why selecting the right data center location is critical for managing costs and mitigating the risks associated with availability, uptime, and resiliency, and includes a checklist to assist enterprises in evaluating and selecting a data center location in Asia Pacific.
Posted: 02 Feb 2015 | Published: 13 Nov 2013

Digital Realty

Next Generation Network Security: Incorporating Vulnerability Intelligence
sponsored by Hewlett-Packard Company
WHITE PAPER: This crucial paper surveys today's network security threat landscape, discussing available tools, best practices, and the critical role that vulnerability intelligence must play in your security strategy.
Posted: 01 Feb 2015 | Published: 25 Feb 2014

Hewlett-Packard Company

Security Considerations When Undergoing a Network Refresh
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative whitepaper reviews the threat landscape of 2013 and outlines the most troublesome risks coming your way in 2014.
Posted: 01 Feb 2015 | Published: 15 Apr 2014

Hewlett-Packard Company

Enhancing Network Security: 205 Network Security Pros Weigh In
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores the challenges faced by 205 network security professionals in the United States, including their major concerns, their experience with cyber threats, and their current and planned use of network security technologies.
Posted: 01 Feb 2015 | Published: 19 Nov 2014

Hewlett-Packard Company

Network Security Intelligence Selection Buying Guide
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why network defense can make or break the success of an enterprise; and also introduces HP TippingPoint, a leader in security intelligence, as a potential solution.
Posted: 01 Feb 2015 | Published: 19 Nov 2014

Hewlett-Packard Company

How SDN Will Enable Automated Network Security
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford explains how the centralized control enabled by SDN will ultimately result in security-defined routing and other SDN security strategies that could forever change how we defend the network and the applications or data running across it.
Posted: 01 Feb 2015 | Published: 12 Dec 2014

Hewlett-Packard Company

Unlock New Pathways to Network Security Architecture
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford offers advice on how your organization can make the right network security architecture decisions when it comes to network isolation and segmentation to create a multi-layer attack surface.
Posted: 01 Feb 2015 | Published: 12 Dec 2014

Hewlett-Packard Company

Using Network Flow Analysis To Improve Network Security Visibility
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Gregg explains how security professionals are turning to network flow analysis to gain improved network security visibility.
Posted: 01 Feb 2015 | Published: 12 Dec 2014

Hewlett-Packard Company

SDN Security Strategies for Network Attack Prevention
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford discusses the rise of software-defined monitoring; using SDN for security monitoring and packet analysis; how SDN security strategies tackle network attack prevention; and more.
Posted: 01 Feb 2015 | Published: 12 Dec 2014

Hewlett-Packard Company

Enterprises Seek Greater Security Through Network Transparency
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Kevin Beaver lists 3 major ways that you can better know and secure your enterprise networks as they grow larger and more complex than ever before.
Posted: 01 Feb 2015 | Published: 12 Dec 2014

Hewlett-Packard Company

Next-Generation Firewalls and IPS: Why You Need Both
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP white paper shows how next-generation firewalls and next-generation intrusion prevention systems are complementary security solutions that work together to secure your network.
Posted: 01 Feb 2015 | Published: 11 Dec 2014

Hewlett-Packard Company

Deliver Reliable and Robust Wi-Fi for Healthcare
sponsored by Xirrus
WHITE PAPER: This exclusive white paper takes an in-depth look at how one wireless solution was able to deliver rock-solid Wi-Fi service to healthcare organizations. Read on to learn more.
Posted: 24 Feb 2015 | Published: 24 Feb 2015

Xirrus
151 - 175 of 1732 Matches Previous Page    5 6 7 8 9 10    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): …  future problems are identified, and steps are taken to prevent them from occurring or recurring. In this way, the network is kept operational, and downtime is minimized.At the C level, network operation is monitored and controlled. Hardware and programming changes, including the addition of new equipment and programs, modification of existing systems, and removal of obsolete systems and programs, are coordinated. An inventory of equipment and programs is kept and updated regularly.The A level, which might also be called the allocation level, is devoted to distributing resources optimally and fairly … 
Network Management definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement