IT Management  >   Systems Operations  >  

Network Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: FCAPS (fault-management, configuration, accounting, performance, and security) is an acronym for a categorical model of the working objectives of network management. There are five levels, called the fault-management level (F), the configuration level (C), the accounting level (A), the performance level (P), and the security level (S).At the F level, network problems are found and corrected. Potential  … 
Definition continues below.
Network Management Reports
26 - 50 of 1669 Matches Previous Page  |  Next Page
Technical Brief: Wireless Access Points
sponsored by Xirrus
WHITE PAPER: This exclusive technical brief features an array of wireless access points that have helped optimize exists WANs and help take the burden off of IT.  Read on to learn more.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Xirrus

Reduce the Burden on IT and Get the Most out of Your Wireless Network
sponsored by Xirrus
WHITE PAPER: This white paper takes an in-depth look at how to manage your network infrastructure to create the most seamless Wi-Fi experience possible. Read on to learn more.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Xirrus

NAC Vendor Face-off
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: In this white paper, learn everything you need to know about NAC and endpoint security to protect your data. Read on to uncover an NAC vendor comparison, the pros and cons of each platform, and which system may be right for your cyber defense strategy.
Posted: 19 Feb 2015 | Published: 07 Jan 2015

ForeScout Technologies, Inc.

7 Keys to Rock Solid Communications – Year after Year after Year
sponsored by Unify
WHITE PAPER: This exclusive white paper offers 7 helpful tips for a rock-solid unified communications plan.  Read on to learn more.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

Unify

Overcoming the Challenges of High Density Access Points
sponsored by Xirrus
WHITE PAPER: This exlusive paper takes an in-depth look at overcoming the challenges of high density access points. Read on to learn more and take the first step towards a faster, more reliable wi-fi experience.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

Xirrus

How to Get the Most out of Your Wireless Network
sponsored by Xirrus
WHITE PAPER: This white paper takes an in-depth look at how to manage your network infrastructure to create the most seamless Wi-Fi experience possible. Read on to learn more.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

Xirrus

The Current State of IT for Network Engineers
sponsored by Fluke Networks
WHITE PAPER: In this white paper, examine the state of the IT landscape today and what network engineers are up against. Read on to explore the benefits cloud computing has bestowed upon data center and the challenges it presents for network engineers.
Posted: 18 Feb 2015 | Published: 07 Jan 2015

Fluke Networks

Operationalizing the Network: SDN
sponsored by F5 Networks
WHITE PAPER: This exclusive white paper takes an in-depth look at a solution for today's application world: SDN. Read on to learn more.
Posted: 18 Feb 2015 | Published: 18 Feb 2015

F5 Networks

Next-Generation Network Security: A Buyers’ Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: This buyer's guide provides an in-depth explanation of the factors that impel organizations to look at next generation security solutions.  Read on to learn more.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

Cisco Systems, Inc.

Optimizing Enterprise Security: Intelligence, Control, and Response
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explores the factors that make network security management and operations more difficult today than ever before.
Posted: 17 Feb 2015 | Published: 28 Nov 2014

ForeScout Technologies, Inc.

Defending Against Rogue Users, Devices, and Applications
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explains how NAC technologies help to ensure that only appropriate users, devices, and applications have access to your network resources, enabling you to support your users in a secure, efficient way.
Posted: 17 Feb 2015 | Published: 29 Aug 2014

ForeScout Technologies, Inc.

Integrated Network Security Architecture: Threat-focused Next-generation Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: How bad have things gotten and what should CISOs do to address these issues? Find out now by reading this whitepaper.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

Cisco Systems, Inc.

Changing Face of Mobility: Raises The Stakes For Endpoint Data Protection
sponsored by CommVault
WHITE PAPER: This white paper highlights some potentially troubling byproducts of that movement. Read on to learn more.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

CommVault

Magic Quadrant for Network Access Control
sponsored by ForeScout Technologies, Inc.
ANALYST REPORT: This analyst report from Gartner evaluates and compares 10 top network access control (NAC) vendors. Read on to learn the strengths and weaknesses of each vendor in order to discover which NAC vendor is the best fit for your enterprise's network security needs.
Posted: 16 Feb 2015 | Published: 10 Dec 2014

ForeScout Technologies, Inc.

Unified Network Management—Are We There Yet?
sponsored by SearchNetworking.com
EBOOK: This technical guide considers the subject of unified network management, and how IT pros can better manage and monitor networks today.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

SearchNetworking.com

The four cornerstones of a successful BYOD program
sponsored by Dell, Inc. and Intel®
WHITE PAPER: In this informative e-guide, learn about the four cornerstones of a successful BYOD program: quality of user experience, device flexibility, vendor independence, and security policy. Information is one of the most valuable pieces of an organization – discover how to implement to right BYOD policy to secure it
Posted: 11 Feb 2015 | Published: 11 Feb 2015

Dell, Inc. and Intel®

Vietnam’s Leading Beverage Manufacturer Gains Real-time Market Visibility With Acumatica
sponsored by Acumatica
WHITE PAPER: Tan Hiep Phat (THP) Beverage Group wanted real-time visibility and enhanced capabilities to better manage its network of more than 200 distributors across the country.Read this case study to find out which single, centralized database improved THP's network management.
Posted: 09 Feb 2015 | Published: 16 Jan 2015

Acumatica

Enterprises Need Monitoring to Ensure Lync UC Performance
sponsored by Nectar Corp
WHITE PAPER: In this eguide learn tips on leveraging network performance monitoring tools to ensure UCC performance success
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Nectar Corp

BYOD Security: Free Your Employees and Secure Your Data
sponsored by BitGlass
WHITE PAPER: This exclusive security report takes an in-depth look at BYOD and mobile security, offering a strategy that was able to deliver both IT's and end-user's expectations. Read on to learn more.
Posted: 03 Feb 2015 | Published: 03 Feb 2015

BitGlass

From Singapore to Tokyo: Choosing a Data Center Location in Asia Pacific
sponsored by Digital Realty
WHITE PAPER: This white paper explains why selecting the right data center location is critical for managing costs and mitigating the risks associated with availability, uptime, and resiliency, and includes a checklist to assist enterprises in evaluating and selecting a data center location in Asia Pacific.
Posted: 02 Feb 2015 | Published: 13 Nov 2013

Digital Realty

Next Generation Network Security: Incorporating Vulnerability Intelligence
sponsored by Hewlett-Packard Company
WHITE PAPER: This crucial paper surveys today's network security threat landscape, discussing available tools, best practices, and the critical role that vulnerability intelligence must play in your security strategy.
Posted: 01 Feb 2015 | Published: 25 Feb 2014

Hewlett-Packard Company

Security Considerations When Undergoing a Network Refresh
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative whitepaper reviews the threat landscape of 2013 and outlines the most troublesome risks coming your way in 2014.
Posted: 01 Feb 2015 | Published: 15 Apr 2014

Hewlett-Packard Company

Enhancing Network Security: 205 Network Security Pros Weigh In
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores the challenges faced by 205 network security professionals in the United States, including their major concerns, their experience with cyber threats, and their current and planned use of network security technologies.
Posted: 01 Feb 2015 | Published: 19 Nov 2014

Hewlett-Packard Company

Network Security Intelligence Selection Buying Guide
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why network defense can make or break the success of an enterprise; and also introduces HP TippingPoint, a leader in security intelligence, as a potential solution.
Posted: 01 Feb 2015 | Published: 19 Nov 2014

Hewlett-Packard Company

How SDN Will Enable Automated Network Security
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford explains how the centralized control enabled by SDN will ultimately result in security-defined routing and other SDN security strategies that could forever change how we defend the network and the applications or data running across it.
Posted: 01 Feb 2015 | Published: 12 Dec 2014

Hewlett-Packard Company
26 - 50 of 1669 Matches Previous Page    1 2 3 4 5    Next Page
 
NETWORK MANAGEMENT DEFINITION (continued): …  future problems are identified, and steps are taken to prevent them from occurring or recurring. In this way, the network is kept operational, and downtime is minimized.At the C level, network operation is monitored and controlled. Hardware and programming changes, including the addition of new equipment and programs, modification of existing systems, and removal of obsolete systems and programs, are coordinated. An inventory of equipment and programs is kept and updated regularly.The A level, which might also be called the allocation level, is devoted to distributing resources optimally and fairly … 
Network Management definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement