IT Management  >   Systems Operations  >   Network Management  >  

Network Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Networkmonitor, Network Traffic Monitoring, Network Behavior Monitoring, Monitoring Network, Network Performance Monitoring
DEFINITION: Port mirroring, also known as a roving analysis port, is a method of monitoring network traffic that forwards a copy of each incoming and outgoing packet from one port of a network switch to another port where the packet can be studied. A network administrator uses port mirroring as a diagnostic tool or debugging feature, especially when fending off an attack. It enables the administrator to keep  … 
Definition continues below.
Network MonitoringReports
201 - 225 of 550 Matches Previous Page  | Next Page
Smart Grid and the Internet of Things
sponsored by ComputerWeekly.com
PRESENTATION: Rob McNamara, executive director of SmartGrid GB, tells the story behind the UK's Smart Meter project in this presentation.
Posted: 08 Aug 2013 | Published: 08 Aug 2013

ComputerWeekly.com

Monitoring and Management for the Next-Generation Network
sponsored by SearchNetworking.com
EZINE: With all the changing network technologies and architectures – due to innovations like SDN and gigabit wireless, it's hard for IT managers to know when to invest. This issue of The Network Evolution explores these challenges with an in-depth look at network monitoring and management for the next-generation network.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

SearchNetworking.com

Drive reliable wireless performance: Customer success stories
sponsored by Xirrus
WEBCAST: This brief video introduces a high-performance wireless networking solution and examines a number of organizations that have used this strategy to centralize network management, cut costs, navigate the challenges of BYOD, and more.
Posted: 31 Jul 2013 | Premiered: Dec 27, 2012

Xirrus

Avaya Aura Communication Manager Survivability Simplified
sponsored by Global Knowledge
WHITE PAPER: The Avaya Aura product line offers many opportunities for communications to survive failures of the IP network or the Avaya equipment. Here, we will focus on the Communication Manager Survivability explanation, implementation, verification, "good to know facts," and troubleshooting commands.
Posted: 25 Jul 2013 | Published: 25 Jun 2013

Global Knowledge

Application Performance Management for Dummies
sponsored by Riverbed Technology, Inc.
EBOOK: Application performance management helps deliver the application performance users and the business demand. Effectively monitoring and troubleshooting application performance issues requires a comprehensive solution.
Posted: 24 Jul 2013 | Published: 24 Jul 2013

Riverbed Technology, Inc.

Unified Networking: Manage Wired and Wireless Networks with Ease
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn about a set of unified networking and management platforms built to provide consistency and continuity within your unified wired and wireless network, helping you achieve cost-efficiency, improved user experience, and simplified management.
Posted: 15 Jul 2013 | Published: 31 Jan 2013

Cisco Systems, Inc.

Catalyst Access Switches: Understanding the Financial Impact
sponsored by Cisco Systems, Inc.
ANALYST REPORT: Uncover the total economic impact and potential ROI enterprises can realize by using Cisco Catalyst Access Switches in their organization. Learn how these switches address major market discontinuities that businesses often face with their campus access networks.
Posted: 15 Jul 2013 | Published: 31 Jan 2012

Cisco Systems, Inc.

5 Backup Features to Ensure Compliance
sponsored by APTARE
WHITE PAPER: In this brief resource, you will discover how a storage backup manager eliminates the complexity and manual labor associated with SOX auditing by automatically collecting backup data in real time and storing it in a central web-based repository where administrators and auditors can access, analyze and record the information.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

APTARE

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013

Infoblox

Disaster Preparedness for Core Network Services
sponsored by Infoblox
WHITE PAPER: This white paper will take a look at how failures can unexpectedly disrupt core network services and the applications that depend on them despite employing traditional approaches to providing redundant configurations. Read this white paper to learn how to minimize the effects of failures to ensure business continuity.
Posted: 15 Aug 2013 | Published: 31 Jan 2013

Infoblox

Solve the Application Visibility Challenge with NetScaler Insight Center
sponsored by Citrix
WHITE PAPER: Are you ready to solve the application visibility challenge? This resource outlines how a next-gen visibility solution provides the end-to-end visibility you need to win the battle.
Posted: 13 Aug 2013 | Published: 29 Mar 2013

Citrix

Gartner Magic Quadrant Report for Application Delivery Controllers
sponsored by Citrix
ANALYST REPORT: This Gartner Magic Quadrant report explores application delivery controllers (ADCs) and their role in the modern data center. View now to uncover a quick description of twelve of today's leading ADC vendors, their strengths and weaknesses, and where they stack up when compared.
Posted: 08 Aug 2013 | Published: 30 Oct 2012

Citrix

The Total Economic Impact of WANdisco SVN MultiSite
sponsored by WANdisco
WHITE PAPER: This Forrester Total Economic Impact™ report unveils how one solution provides LAN-speed collaboration between distributed teams, giving them the feeling that they're all working in the same room. View now to uncover how this solution helped one global software engineering company enjoy a 357% ROI with a payback period of less than two months.
Posted: 01 Aug 2013 | Published: 31 Jul 2013

WANdisco

Strategy guide to business protection for physician practices
sponsored by HP and Intel® Xeon® processors
WHITE PAPER: This white paper demonstrates how hospitals can manage risk and keep critical IT infrastructure up and running. Read now to learn how HIT leaders can ensure a high availability IT infrastructure that can improve service and protect their business.
Posted: 01 Aug 2013 | Published: 15 Nov 2012

HP and Intel® Xeon® processors

Enterasys Data Center Networking – Connectivity and Topology Design Guide
sponsored by Enterasys
WHITE PAPER: View key concepts that will help you build a data center fabric capable of meeting the needs of both organizations and users both today and in the future. View now to learn more!
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Enterasys

System z: Making great security even better
sponsored by IBM
WHITE PAPER: Adopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

Seven Things to Look for in a Colocation Provider
sponsored by SAVVIS
WEBCAST: This resource outlines the difference between the data center and colocation services and explains the different types of colocation providers out there. In addition, view the top seven things you should look for in any potential colocation provider.
Posted: 29 Jul 2013 | Premiered: Dec 31, 2012

SAVVIS

Open SDN for Network Visibility: Simplifying large scale network monitoring systems with Big Tap
sponsored by Big Switch Networks
WHITE PAPER: Traditional performance monitoring and management tools do not scale to meet the needs of the modern network. Consult this solution guide today to learn how the right SDN application can simplify large network monitoring systems and lead to success.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

Big Switch Networks

Information Security Essential Guide: The Evolution of Threat Detection and Management
sponsored by IBM
ESSENTIAL GUIDE: This Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.
Posted: 18 Jul 2013 | Published: 31 May 2013

IBM

AlienVault Unified Security Management: Complete Security Visibility
sponsored by AlienVault
TRIAL SOFTWARE: AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

AlienVault

SIEM Demo: Get Complete Security Visibility in an Hour
sponsored by AlienVault
WEBCAST: Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.
Posted: 17 Jul 2013 | Premiered: Jun 27, 2013

AlienVault

Optimize Operations of Cisco Environments with Converged Infrastructure Management
sponsored by CA Technologies.
WEBCAST: This webcast explores the growing interest in converged IT infrastructure and explains best practices for managing converged environments – especially when it comes to optimizing application performance.
Posted: 16 Jul 2013 | Premiered: Jun 29, 2013

CA Technologies.

Quick Dirty Dozen PCI Compliance Simplified
sponsored by AlienVault
WEBCAST: Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013

AlienVault

Accelerate App Delivery, Improve App Performance, and Spur Innovation
sponsored by CA Technologies.
WHITE PAPER: Learn about a set of application performance management (APM) and capacity management solutions that together facilitate information sharing between your DevOps teams, in end leading to better app deployments, improved monitoring, lowered number of risks, and reduced repair times.
Posted: 28 Jun 2013 | Published: 31 Aug 2012

CA Technologies.

Cisco® ONE: The Value of Advanced Flow Control
sponsored by Cisco Systems, Inc.
WHITE PAPER: Discover how utilizing the advanced flow control capability in Cisco Open Network Environment (ONE) can help you overcome the complex monitoring challenges you are facing today.
Posted: 28 Jun 2013 | Published: 31 May 2013

Cisco Systems, Inc.
201 - 225 of 550 Matches Previous Page    7 8 9 10 11 12    Next Page
 
NETWORK MONITORING DEFINITION (continued): …  close track of switch performance and alter it if necessary. Port mirroring can be managed locally or remotely.An administrator configures port mirroring by assigning a port from which to copy all packets and another port where those packets will be sent. A packet bound for or heading away from the first port will be forwarded onto the second port as well. The administrator places a protocol analyzer on the port receiving the mirrored data to monitor each segment separately. The analyzer captures and evaluates the data without affecting the client on the original port. The monitor port may … 
Network Monitoring definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement