IT Management  >   Systems Operations  >   Network Management  >  

Network Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Networkmonitor, Network Traffic Monitoring, Network Behavior Monitoring, Monitoring Network, Network Performance Monitoring
DEFINITION: Port mirroring, also known as a roving analysis port, is a method of monitoring network traffic that forwards a copy of each incoming and outgoing packet from one port of a network switch to another port where the packet can be studied. A network administrator uses port mirroring as a diagnostic tool or debugging feature, especially when fending off an attack. It enables the administrator to keep  … 
Definition continues below.
Network Monitoring Reports
1 - 25 of 586 Matches Previous Page  |  Next Page
The Zero Trust Model Of Information Security
sponsored by Zscaler
WHITE PAPER: This white paper introduces the Zero Trust Model of information security, which eliminates the idea of trusted and untrusted networks in favor of viewing all network traffic as untrusted.
Posted: 27 Jan 2015 | Published: 22 Oct 2014

Zscaler

Protecting Your Organization from DNS Security Threats
sponsored by Cloudmark
WEBCAST: This webinar provides a detailed look at common threats to DNS infrastructure, and how your enterprise can mitigate these threats.
Posted: 26 Jan 2015 | Premiered: Nov 13, 2014

Cloudmark

Protecting Users from Firesheep and other Sidejacking Attacks with SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the Firesheep Wi-Fi attack tool and other sidejacking attacks with SSL and explains how to avoid these attacks.
Posted: 15 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

A Smarter Approach to Network Encryption
sponsored by Certes Networks
WHITE PAPER: This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.
Posted: 09 Jan 2015 | Published: 16 Dec 2014

Certes Networks

Increase Accessibility with Hybrid WAN
sponsored by Fluke Networks
WHITE PAPER: Check out this white paper to learn how this new generation of networking combines fixed, wireless and mobile technologies to create a hybrid WAN.
Posted: 30 Dec 2014 | Published: 30 Dec 2014

Fluke Networks

How SDN Will Enable Automated Network Security
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford explains how the centralized control enabled by SDN will ultimately result in security-defined routing and other SDN security strategies that could forever change how we defend the network and the applications or data running across it.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

SDN Security Strategies for Network Attack Prevention
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford discusses the rise of software-defined monitoring; using SDN for security monitoring and packet analysis; how SDN security strategies tackle network attack prevention; and more.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Using Network Flow Analysis To Improve Network Security Visibility
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Gregg explains how security professionals are turning to network flow analysis to gain improved network security visibility.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Enterprises Seek Greater Security Through Network Transparency
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Kevin Beaver lists 3 major ways that you can better know and secure your enterprise networks as they grow larger and more complex than ever before.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Unlock New Pathways to Network Security Architecture
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford offers advice on how your organization can make the right network security architecture decisions when it comes to network isolation and segmentation to create a multi-layer attack surface.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Avoid Network Outages—Automated Network Management Comes to the Rescue
sponsored by IBM
WHITE PAPER: In this white paper, discover a network management solution that delivers greater visibility, control and automation over the network infrastructure to help prevent the occurrence of costly network outages.
Posted: 09 Dec 2014 | Published: 30 Nov 2012

IBM

Product Comparison: Network Performance Monitoring
sponsored by IT Central Station
ESSENTIAL GUIDE: With the number of network performance monitoring products on the market, searching for the right one for your organization can be a challenge. With IT Central Station's comprehensive report, you will find IT Professionals' honest opinions about the most popular vendors and products in network performance management today.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


Three Ways to Achieve Fast and Affordable IT in an Always-On World
sponsored by VMware
WHITE PAPER: This white paper explores a way to handle data center challenges head on. Read on to learn how one solution gives you 3 essential capabilities for the era of the always-on business: enhanced performance monitoring, optimized capacity utilization, and simplified data backup and replication.
Posted: 05 Dec 2014 | Published: 31 Aug 2014

VMware

Next-Gen ADCs: The answer to performance woes?
sponsored by Radware
WHITE PAPER: This white paper highlights a next-generation ADC solution that is designed to provide SLA assurance and improvement, enabling application performance management.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Radware

Putting Network Security Into Context
sponsored by SearchNetworking.com
EBOOK: Today's advanced threats demand a network security strategy that can adjust policies based on contextual data about users and apps.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

SearchNetworking.com

A Consolidated Platform for Next-Generation Firewall and Secure Web Gateway Services
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper first defines next-generation firewalls, secure web gateways, and their capabilities, and then specifically discusses the Fortinet FortiGate NGFW and the results of ESG Lab's evaluation and testing of the device.
Posted: 16 Oct 2014 | Published: 30 Sep 2014

Fortinet, Inc.

Why Most Organizations Miss User Response Monitoring—And What To Do About It
sponsored by CA Technologies.
WHITE PAPER: Access this guide to examine the challenges of user response monitoring. You'll also get tips to overcome these challenges and start to get a real handle on your infrastructure performance and how it impacts your users' experience.
Posted: 06 Oct 2014 | Published: 30 Sep 2012

CA Technologies.

Failover Strategies on the Cisco UCS B Series Chassis
sponsored by Global Knowledge
WHITE PAPER: This white paper discusses how Cisco's popular and powerful Unified Computing Solution is driven by the flexibility and agility of the hardware failover options and Service Profiles.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

Meet the N-able product family
sponsored by N-able Technologies
VIDEO: This video to gives you a brief overview of the N-central platform and capabilities. You'll also learn about the powerful modules that make this the leading RMM and MSP automation solution.
Posted: 23 Sep 2014 | Premiered: 08 Apr 2014

N-able Technologies

Probleu Builds a Winning MSP Business with N-Able by Solarwinds
sponsored by N-able Technologies
WHITE PAPER: Access this case study to learn how this MSP eventually chose to leverage the IT channel's #1 RMM and MSP service automation platform.
Posted: 22 Sep 2014 | Published: 19 Sep 2014

N-able Technologies

MY IT Reboots RMM Automation with N-Able by Solarwinds
sponsored by N-able Technologies
WHITE PAPER: Check out this white paper to learn how a top-tier MSP that meets the IT needs of small to midsized businesses was able to leverage a new RMM platform. You'll learn the top 10 reasons more MSPs are choosing this solution.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

N-able Technologies

Bluewave Computing Realizes Million-Dollar Productivity Gains with N-Able Technologies
sponsored by N-able Technologies
WHITE PAPER: Access this case study to learn how one organization was able to upgrade their service automation platform and deliver benefits in terms of improved productivity, efficiency, and customer retention.
Posted: 16 Sep 2014 | Published: 16 Sep 2014

N-able Technologies

Singapore Education Group Builds Highly-Connected Campus
sponsored by Dell, Inc. and Intel®
CASE STUDY: This case study examines how a Singapore-based education group was able to find a single solution partner that could provide a network infrastructure capable of handling the unique demands of delivering a highly scalable network in an educational institution.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

Dell, Inc. and Intel®

Guarding Against a Data Breach
sponsored by Hewlett-Packard Company
WHITE PAPER: In this informative white paper, discover how modern enterprises should respond to growing security threats while balancing economic and organizational concerns.
Posted: 22 Aug 2014 | Published: 31 Jan 2012

Hewlett-Packard Company

Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EGUIDE: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014

SearchSecurity.com
1 - 25 of 586 Matches Previous Page    1 2 3 4    Next Page
 
NETWORK MONITORING DEFINITION (continued): …  close track of switch performance and alter it if necessary. Port mirroring can be managed locally or remotely.An administrator configures port mirroring by assigning a port from which to copy all packets and another port where those packets will be sent. A packet bound for or heading away from the first port will be forwarded onto the second port as well. The administrator places a protocol analyzer on the port receiving the mirrored data to monitor each segment separately. The analyzer captures and evaluates the data without affecting the client on the original port. The monitor port may … 
Network Monitoring definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement