IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available  … 
Definition continues below.
Network Management Reports
201 - 225 of 1911 Matches Previous Page  |  Next Page
3 Ways Businesses Use Network Virtualization
sponsored by VMware
WHITE PAPER: This white paper discusses how virtualizing the network can help you meet the increasing demands of today's IT environment. Learn how IT teams can identify which areas need help most, and slowly extend virtualization to other parts of the network as time and budget permit.
Posted: 26 Oct 2016 | Published: 31 Aug 2016

VMware

7 Ways to Make Yourself Harder to Hack
sponsored by Solarwinds MSP
WHITE PAPER: Whether you call it layered security or defense in depth, layers of control buys you time to respond effectively. Access now to learn more about integrated tools that cover security and network management for MSPs.
Posted: 25 Oct 2016 | Published: 25 Oct 2016

Solarwinds MSP

Enterprise Mobility Management: Mobile Device Management's Expansion to Devices, Apps and Content
sponsored by IBM
WHITE PAPER: This white paper uncovers key considerations for a unified mobile enterprise policy. Discover how to gain visibility into every device entering your network, as well as ways to ensure corporate data security and productivity simultaneously.
Posted: 21 Oct 2016 | Published: 21 Oct 2016

IBM

10 Critical Requirements for Optimizing Application Delivery
sponsored by A10 Networks
WHITE PAPER: Learn the 10 capabilities that should be a critical component of your selection criteria when evaluating application delivery controllers, including intelligent traffic management, global load balancing, and more.
Posted: 19 Oct 2016 | Published: 19 Oct 2016

A10 Networks

If External DNS Fails, So Does Your Digital Business
sponsored by Dyn
RESEARCH CONTENT: Without properly functioning external DNS, Internet-based resources may "disappear" or become unavailable without warning. To boost DNS management, this Gartner research report explores the concept of externally sourced and managed DNS as a service. Access now to uncover their key findings and learn best practices for improved DNS performance.
Posted: 14 Oct 2016 | Published: 15 Sep 2016

Dyn

5 Critical KPIs For Field Service Success
sponsored by LogMeIn Rescue
WHITE PAPER: This report identifies the KPIs that you can leverage to improve your business, regardless of your industry. Access now to learn more about these indicators.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

LogMeIn Rescue

Remove Blind Spots from the Network: A Guide for I&O Professionals
sponsored by Snow Software
EBOOK: Gain visibility of all software and devices used across the IT estate with software asset management (SAM) that will remove your ITAM and network blind spots. Download this e-book to enforce total visibility across all assets to maintain SLAs.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

Snow Software

Extending Global Load Balancing to the Cloud With Secondary DNS
sponsored by Dyn
WHITE PAPER: Discover how on premise global load balancing (GLB) can become part of your cloud deployment. With GLB enhancing your DNS networks, you can improve security and prevent DDoS attacks.
Posted: 10 Oct 2016 | Published: 13 Jul 2016

Dyn

Protecting the Distributed Enterprise: Network Security for the Distributed Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: The solution guide provides 5 key requirements that will collectively dictate the success of a distributed enterprise firewall deployment. It will elaborate on the details of each requirement and how it can be adopted to drive a cost-effective and reliable way to better protect your organization.
Posted: 07 Oct 2016 | Published: 01 Sep 2016

Fortinet, Inc.

Securing the Borderless Enterprise
sponsored by Fortinet, Inc.
DATA SHEET: This enterprise firewall checklist provides you with a view of where your expected enterprise firewall capabilities stand when put into comparison against those of your peers and in the process, help identify the gaps. Download now and uncover the insight you need to deploy the best fit enterprise firewall for your business.
Posted: 07 Oct 2016 | Published: 01 Sep 2016

Fortinet, Inc.

The Packet Train Difference
sponsored by AppNeta
WHITE PAPER: Get an in-depth look at packet train dispersion technology and how it delivers an accurate measure of network performance. You'll learn key benefits of packet train dispersion analysis, how it works, and more.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

AppNeta

Case Study: Optimizing the In-Store, Retail Experience with Application and Network Monitoring
sponsored by AppNeta
CASE STUDY: "Is it the app or the network?" Discover how to pinpoint whether your network or a certain app is causing latency or service outages within minutes. Read on to enable your app teams to constructively diagnose and troubleshoot the precise issues, freeing up resources to focus on more strategic initiatives.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

AppNeta

Advanced Evasion Techniques for Dummies
sponsored by Forcepoint
EBOOK: Learn the current state of cyber-criminality and why the security landscape looks so rosy from their perspective. Come to understand not only the shortcomings of traditional approaches but also how patching can lead to further problems and the issues with current network security devices countering advanced evasion techniques.
Posted: 12 Sep 2016 | Published: 31 Dec 2015

Forcepoint

Buying Criteria for Next-Generation Network Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: Discover an in-depth explanation of the factors that compel organizations to look at next-generation solutions. This buyer's guide offers an analysis of the most important capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need to be an educated buyer.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

IDC Worldwide Enterprise Mobility Management Market Share 2016
sponsored by vmware airwatch
WHITE PAPER: This study analyzes the EMM market, ranking the top 14 vendors by revenue and revealing the market trends and events that have helped shape the market landscape. Uncover advice on what you can do in the EMM buying phase.
Posted: 12 Sep 2016 | Published: 31 May 2016

vmware airwatch

Explore the Evolving DDoS Threat Landscape
sponsored by Radware
EGUIDE: Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.
Posted: 20 Oct 2016 | Published: 18 Oct 2016

Radware

Using DNS Monitoring to Detect Network Breaches
sponsored by Dyn
EGUIDE: Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.
Posted: 18 Oct 2016 | Published: 17 Oct 2016

Dyn

How DNS Information Can Help Cut Millions from Your Infrastructure Costs
sponsored by Dyn
EGUIDE: This expert e-guide explains why DNS intelligence is the key to better network capacity planning and dynamic resourcing. Access now to begin planning to cut your infrastructure costs dramatically in the coming years.
Posted: 18 Oct 2016 | Published: 17 Oct 2016

Dyn

Is Passive Optical Networking Good For Enterprises?
sponsored by Nokia
EGUIDE: This expert e-guide explores the possibilities a passive optical network or PON offers to both service providers as well as personal users. Access now to discover the key benefits PON could potentially offer to enterprises and the top factors IT managers must consider before choosing PON.
Posted: 10 Oct 2016 | Published: 10 Oct 2016

Nokia

Top Nine Benefits of Managed Network Services for Distributed Enterprises
sponsored by Comcast
WHITE PAPER: This resource lays out the 9 benefits of using a managed network service for distributed enterprises.
Posted: 05 Oct 2016 | Published: 05 Oct 2016

Comcast

Tips to Right-Size Cloud Capacity and Optimize Performance
sponsored by Hewlett Packard Enterprise
EGUIDE: Overprovisioning and overspending for unused cloud capacity is a common issue that can impact your enterprise's bottom line. Access this e-guide for tips on right-sizing your cloud to prevent wasting resources. Plus, learn how to manage data to avoid performance bottlenecks in the hybrid cloud.
Posted: 04 Oct 2016 | Published: 04 Oct 2016

Hewlett Packard Enterprise

Deciphering the Tactics of the Enemy: APT-Style Attacks
sponsored by Dimension Data
EGUIDE: In this e-guide learn one of the most nefarious tactics cybercriminals are deploying in today's threat landscape: the Advanced Persistent Threat-style attack.
Posted: 23 Sep 2016 | Published: 21 Sep 2016

Dimension Data

Is FDE Enough to Thwart "Evil Maid" Attacks?
sponsored by Dimension Data
EGUIDE: In this e-guide learn why the traditionally accepted full disk encryption (FDE) isn't enough to protect enterprise data in case an attacker steals your device.
Posted: 23 Sep 2016 | Published: 21 Sep 2016

Dimension Data

6 Crucial Incident Response Policy Mistakes to Avoid
sponsored by Delta Risk
EGUIDE: Discover how to avoid 6 common pitfalls of a modern incident response policy as shared by expert Kevin Beaver. Access now before your policy's weaknesses make you – and your company – look bad.
Posted: 20 Sep 2016 | Published: 16 Sep 2016

Delta Risk

Next-Generation Networking Trends
sponsored by Optus
EGUIDE: In this e-guide, learn about innovation in software-defined networking and network functions virtualization technologies for next-generation networks, and one IT pro's strategies for improving Wi-Fi in a device-saturated dormitory.
Posted: 20 Sep 2016 | Published: 13 Sep 2016

Optus
201 - 225 of 1911 Matches Previous Page    7 8 9 10 11 12    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): … Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available in Windows Vista.In order for event forwarding to function, a service called Event Collector must be enabled on the local computer. This service creates subscriptions on remote computers and servers. Thereafter, the local computer is provided with details concerning events that take place on the remote machines. In this way, event forwarding allows an administrator to continuously collect and store information about events that occur throughout a network.
Network Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement