IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available  … 
Definition continues below.
Network Management Reports
201 - 225 of 1803 Matches Previous Page  |  Next Page
Key Insights on Securing Networks Against Modern Cyber Threats
sponsored by Fortinet, Inc.
RESOURCE: Understand the capabilities, requirements and benefits of an evolved network security infrastructure. Inside, you'll see how an enterprise firewall can – and perhaps should – be the core of your security layout.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Fortinet, Inc.

Citrix NetScaler: A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: Denial of service (DoS) attacks are on the rise after years of relative dormancy. In that time they have evolved and are honed in on attacking the different networking layers. Discover how DoS attacks have evolved and how to approach DoS protection at each layer of your network.
Posted: 13 Jun 2016 | Published: 30 Jan 2015

Citrix

Improving Productivity through IT Modernization
sponsored by HPE and Intel®
VIDEO: Focus on ensuring that your infrastructure is saving you time and money now, and will continue to do so in the future. See also how you can plan on incorporating mobile into your network strategy.
Posted: 06 Jun 2016 | Premiered: 03 Jun 2016

HPE and Intel®

Five simple strategies to help enable a more productive mobile workforce
sponsored by HPE and Intel®
RESOURCE: How do you keep your mobile workforce productive? Explore best practices and five strategies to make sure that your workers are making the most of mobility.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

HPE and Intel®

Delivering Enterprise-Class Communications with WebRTC
sponsored by Oracle Corporation
WHITE PAPER: Explore potential WebRTC applications, review WebRTC deployment considerations, and discover how WebRTC service enablers help enterprises reap all the benefits of browser-based communications. All of this without compromising security, reliability, or service quality.
Posted: 03 Jun 2016 | Published: 29 Jan 2016

Oracle Corporation

Managed Security
sponsored by MASERGY
WEBCAST: The threat landscape is growing and network security is already a full-time job. Watch this 2 minute webcast to learn about a managed security service and how it bolsters your defenses, preparing you to handle whatever attacks come your way.
Posted: 02 Jun 2016 | Premiered: Jun 1, 2016

MASERGY

Gone Critical: The Evolution in Application Availability
sponsored by Veeam Software
WHITE PAPER: In today's business landscape, constant availability is the key to staying competitive. This is no small task. Read on to learn about an always-on backup and recovery service that makes your critical applications available at all times.
Posted: 31 May 2016 | Published: 31 May 2016

Veeam Software

Secure Premise-Managed Wireless LAN: Deployment Guide
sponsored by Fortinet, Inc.
RESOURCE: Discover a way to drastically simplify your access and security management by combining the management of wireless infrastructure with network security on the same platform.
Posted: 27 May 2016 | Published: 27 May 2016

Fortinet, Inc.

How Cloud Computing Changes the Role of IT
sponsored by MASERGY
RESOURCE: Optimize the performance of your SaaS-based apps by examining network traffic to determine how much of your bandwidth they consume. Discover how to work with end users to improve their cloud-based app experience, and ensure your network is in top shape to accommodate all workloads.
Posted: 25 May 2016 | Published: 15 Jan 2015

MASERGY

Building a Security Fabric for Today's Networks
sponsored by Fortinet, Inc.
WHITE PAPER: What can security professionals do to secure their network in the era of ever expanding network perimeters? Leveraging firewalls to build an enterprise network security system that focuses on deploying defensive strategies throughout the entire enterprise, not just around the perimeter might be the answer.
Posted: 20 May 2016 | Published: 20 May 2016

Fortinet, Inc.

Why HCI and Why Now?
sponsored by VMware
WHITE PAPER: IT has made tremendous leaps with server and app virtualization, but 2 critical resource silos remain largely untouched: networking and storage. In this white paper, you'll discover why enterprises are deploying hyper-converged infrastructure (HCI) to escalate their growth.
Posted: 20 May 2016 | Published: 20 May 2016

VMware

Workplace Mobility, Consumerization, and Cloud Drive End-user Computing Transformation
sponsored by VMware
WHITE PAPER: To combat the rising complexity of desktop environments, you need to think about implementing hybrid consumption models. Read this white paper that details how the next generation of desktop architectures is taking mobility into account and how IT strategies are shifting from managing devices to managing users.
Posted: 20 May 2016 | Published: 29 Jan 2016

VMware

Six Steps to Controlling the Uncontrollable
sponsored by Microsoft
WHITE PAPER: With a next-generation enterprise mobility strategy, you can empower your people to be productive on the devices of their choosing -- all while staying secure. Explore six ways to protect the relentless data streams of a mobile enterprise.
Posted: 18 May 2016 | Published: 01 Apr 2016

Microsoft

Controlling the Uncontrollable: Why You Need to Enable, Protect, and Manage Mobile
sponsored by Microsoft
WHITE PAPER: This guide details how you can ensure a productive and secure mobile workplace through enterprise mobility management. Learn how to control what once seemed uncontrollable now.
Posted: 18 May 2016 | Published: 11 May 2016

Microsoft

Why It's Important to Have a Mobile Enterprise Strategy
sponsored by VMware, Inc.
EGUIDE: We sat down with the general manager of VMware's end-user computing group to learn about the vendor's EMM evolution. Explore additional expert resources that detail ways to integrate EMM into a broader mobile enterprise strategy, and what it means to have a mobile-first strategy.
Posted: 20 Jun 2016 | Published: 15 Jun 2016

VMware, Inc.

The Network Takes Center Stage
sponsored by IBM
EGUIDE: Pinpointing issues is becoming more challenging as networks expand and become more complex, but there are ways to monitor your network more effectively in order to spot the early warning signs of downtime. Access this special report to learn about analytics technology, outsourcing options, and more.
Posted: 20 Jun 2016 | Published: 20 Jun 2016

IBM

Transforming the Networking Capabilities of Norway's Largest Hospital
sponsored by Avaya
CASE STUDY: Norway's largest health system needed a smart, scalable network to bring together 3 hospitals and absorb future growth. Read this case study to learn how employing a virtual enterprise network architecture fulfilled the health system's networking needs and could soon be fulfilling yours.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

Avaya

25 GbE and the Future of the Data Center
sponsored by QLogic Corporation
EGUIDE: Expanded performance and throughput in 25 Gigabit Ethernet (25 GbE), a new Ethernet standard, reflects continued advances in server processing – and also may be the cure for oversubscribed data centers. Access this e-guide for more on these claims, and what 25 GbE means for the future of networking.
Posted: 15 Jun 2016 | Published: 08 Jun 2016

QLogic Corporation

QRadar SIEM
sponsored by IBM
WHITE PAPER: Protecting today's complex networks against malicious activities is a never-ending task. Learn how you can boost threat protection and compliance by developing security intelligence.
Posted: 15 Jun 2016 | Published: 20 Dec 2013

IBM

DLP Tools Essential to Data Protection Strategy
sponsored by Intel Security
EGUIDE: Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

Canon U.S.A. Fully Automates VMOTION and Storage VMOTION with VMTurbo
sponsored by Turbonomic
WHITE PAPER: Resource allocation is the key to succeeding in virtualized environments. Read this brief case study to learn how one company was able to implement a solution that automatically made intelligent adjustments, allowing them to expand their virtual footprint and control over a complex virtual environment.
Posted: 13 Jun 2016 | Published: 31 Dec 2015

Turbonomic

Boston College Excels With VMTurbo to Assure Performance and Intelligently Plan for Growth
sponsored by Turbonomic
CASE STUDY: What if you could increase your virtual footprint by 30% or more? That's what one of Boston's top colleges did. Read on to find out how the college was able to incease its IT staff productivity by 20% and create a viable plan to meet future demands by improving its network infrastructure.
Posted: 10 Jun 2016 | Published: 31 Dec 2015

Turbonomic

Windows 10, EMM, and the Future of PC Security and Management
sponsored by MobileIron
WHITE PAPER: Enterprise mobility management (EMM) is one big key to unlocking mobility's full potential. We had previously required a variety of solutions to deal with every aspect of mobile management. Now there is an EMM solution that does it all. Read on to learn more about EMM and this simplifying solution.
Posted: 03 Jun 2016 | Published: 31 May 2016

MobileIron

Breaking Down the Benefits of Desktop Transformation
sponsored by VMware
WHITE PAPER: The future of mobility relies on the technology that it replaced; desktop computing. Desktop computing is undergoing a transformation that will couple it with the advances mobility has to offer. Read on to learn about the benefits this next-gen desktop is promising to deliver.
Posted: 20 May 2016 | Published: 29 Dec 2015

VMware

Case Study: Solving Malicious Spamming & Scalability Issues
sponsored by StarLeaf
CASE STUDY: See what features a logistics organization needed from a collaboration tool, and if those priorities are in line with your own. While avoiding the costs of on premise infrastructure, mobility and secure communications can become very attractive.
Posted: 18 May 2016 | Published: 18 May 2016

StarLeaf
201 - 225 of 1803 Matches Previous Page    7 8 9 10 11 12    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): … Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available in Windows Vista.In order for event forwarding to function, a service called Event Collector must be enabled on the local computer. This service creates subscriptions on remote computers and servers. Thereafter, the local computer is provided with details concerning events that take place on the remote machines. In this way, event forwarding allows an administrator to continuously collect and store information about events that occur throughout a network.
Network Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement