IT Management  >   Systems Operations  >  

Network Management

RSS Feed   
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available  … 

Network Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary
Network Management White Papers (View All Report Types)
1 - 25 of 613 Matches Previous Page  |  Next Page
Why IT leaders should consider a zero trust network access strategy
sponsored by Zscaler
WHITE PAPER: This white paper covers why IT leaders should consider a zero-trust network access (ZTNA) strategy. Access it here to learn 5 challenges technology leaders must overcome when adopting new technologies and see how ZTNA plays a role in overcoming each.
Posted: 23 Sep 2021 | Published: 23 Sep 2021

Zscaler

Cisco Negotiations Guide
sponsored by ClearEdge
WHITE PAPER: Cisco solutions are entrenched in most organizations which can give their sales teams the upper hand in negotiations. Many customers overpay. But there's hope. This eGuide walks you through a 4-point plan to negotiate the best deal.
Posted: 14 Sep 2021 | Published: 14 Sep 2021

ClearEdge

Cisco Pricing Guide
sponsored by ClearEdge
WHITE PAPER: As the one of the world's leading technology providers, Cisco maintains significant pricing power—but customers still have negotiating leverage, they just too often fail to take advantage. This invaluable resource provides actual discount ranges obtained by customers and helps you understand how to maximize leverage in your next deal.
Posted: 14 Sep 2021 | Published: 14 Sep 2021

ClearEdge

Cisco Contract Gotchas Guide
sponsored by ClearEdge
WHITE PAPER: Customers doing business with Cisco most often contract through a Cisco Enterprise Agreement (EA). The discounts can be enticing but risks inherent to this agreement expose you to cost overruns in other ways. This guide exposes the "Top 3 Gotchas in a Cisco EA" and explains how to avoid them.
Posted: 14 Sep 2021 | Published: 14 Sep 2021

ClearEdge

Modernize Your Network Performance Monitoring
sponsored by Turbonomic
WHITE PAPER: Many networking teams in enterprises, CSPs and MSPs are trying to monitor modern networks with outdated tools and approaches, making any insights they gain mostly inaccurate and effectively useless. Download this white paper to learn 5 steps that networking teams can take to increase operational efficiency.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

Turbonomic

Unity Orchestrator Global Enterprise
sponsored by Aruba Networks
WHITE PAPER: If your organization has multiple large-scale SD-WAN deployments, it can be difficult to get visibility into them and, moreover, orchestrate them. Professionals with Silver Peak Unity EdgeConnet SD-WAN fabrics in their stack should read this white paper. It details how you can centrally manage and monitor these SD-WAN deployments.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

Aruba Networks

Are Your Branch Sites an Open Door to Cyberattacks?
sponsored by SonicWall
WHITE PAPER: Traditional methods of deploying and maintaining security at branch sites have become ineffective, expensive and unmanageable. But an SD-Branch solution can form a cornerstone for boundless security in distributed enterprise environments. Jump into this white paper to see why the time for SD-Branch is now.
Posted: 18 Feb 2021 | Published: 18 Feb 2021

SonicWall

Architecting a Secure Business-Driven SD-WAN
sponsored by Silver Peak
WHITE PAPER: SD-WAN delivers the ability to actively utilize low-cost broadband services. But because broadband services are ‘public’ instead of ‘private,’ advanced security capabilities are required to ensure the confidentiality and integrity of application traffic traversing such connections. Access this white paper to learn about Silver Peak’s secure SD-WAN.
Posted: 29 Jan 2021 | Published: 29 Jan 2021

Silver Peak

Making the Shift to a Business-First Networking Model
sponsored by Silver Peak
WHITE PAPER: While the majority of enterprises have moved applications and IT infrastructure to the cloud, many have yet to realize the full promise of the cloud. This is down to your network. The onus is now on network professionals to give their employees the best possible experience. Read this white paper the role of business-driven SD-WAN.
Posted: 29 Jan 2021 | Published: 29 Jan 2021

Silver Peak

Silver Peak Application Performance Torture Test
sponsored by Silver Peak
WHITE PAPER: A key benefit delivered by SD-WAN is the ability to actively utilize low-cost broadband services. However, even business-grade broadband connections often perform poorly due to packet loss when congestion occurs. Engage this white paper to see how Silver Peak’s Application Performance ‘Torture’ Test examines this issue.
Posted: 28 Jan 2021 | Published: 28 Jan 2021

Silver Peak

4 Ways Digital Transformation Can Help the Bottom Line and How a SIEM Can Help
sponsored by Splunk
WHITE PAPER: IDC estimates that digital transformation could translate to over $18 trillion of new value. This is great, but what specific effects could these transformation strategies have on the bottom line and on cybersecurity? Read this white paper to get the answer.
Posted: 20 Nov 2020 | Published: 20 Nov 2020

Splunk

Autoscaling Explained Why Scaling Your Site Is So Remarkably Hard
sponsored by Queue-it ApS
WHITE PAPER: In an ideal world, websites could scale infinitely and on demand, accommodating whatever traffic the internet throws their way. Trendy buzzwords like “autoscaling” makes this sound simple and automatic. But scaling servers is no trivial task. In this white paper, learn more about autoscaling and find out why it is not as easy as it might seem.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Queue-it ApS

Find Efficiencies and Control IT Costs
sponsored by SolarWinds, Inc.
WHITE PAPER: A recent research report found 25% of large enterprises have 8 or more network performance monitoring tools, some as many as 25. Suddenly, things are more complex and more expensive. As an IT director, this isn’t the direction you want to head. Read this white paper to learn how to cut down on complexity by consolidating monitoring systems.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

SolarWinds, Inc.

WANs Beyond Wires
sponsored by Cradlepoint
WHITE PAPER: Wireless WANs, based on the capabilities of 4G LTE and more powerful 5G technology, are becoming an essential part of any organization’s digital transformation. In this white paper, uncover 5 key strategies for Wireless WAN deployments.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Cradlepoint

Methodology of an IAM Introduction
sponsored by Beta Systems
WHITE PAPER: IAM projects fail more often than one thinks, but why? Well, sometimes people think too big or too small, or they don't plan at all and often they simply underestimate the complexity of the overall project. For a successful IAM implementation, one must understand all the factors at play. Access this white paper to learn them.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Beta Systems

Key Considerations for Securing 5G Network Traffic
sponsored by Verizon
WHITE PAPER: The growth of enterprise data is putting pressure on technology professionals to secure and govern it. The generation, networking and storage of this data means that 5G will affect every company’s security posture. So, how can you be prepared for what’s coming? Read this white paper to learn how 5G security will be influenced by evolving threats.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Verizon

Optimization for SaaS
sponsored by Cato Networks
WHITE PAPER: Enterprise-wide SaaS app adoption is spelling big changes in network traffic patterns. With cloud applications, traffic needs to be optimized for global access to a specific location, rather than to a data center, to maintain a consistent application experience. Read this white paper to learn how you can optimize access to cloud applications.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Cato Networks

Responding to public sector cyber security threats: Views of public sector professionals and where to from here
sponsored by BlackBerry
WHITE PAPER: If you’re working in the public sector in Australia, look at this in-depth report about the state of cybersecurity on the continent, presented by Blackberry. It details key findings, presents critical themes for a rock-solid cybersecurity strategy and outlines the ‘Essential Eight’ Maturity Model for security technology.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

BlackBerry

Understanding & Preventing Ransomware Attacks
sponsored by Keeper Security Inc
WHITE PAPER: Ransomware attacks are particularly devastating in that they can be done with little technical expertise – they can even be purchased as a cloud service! A new attack happens about every 14 seconds, and their global damages are expected to reach $20B by 2021. So how can you prevent them? Read this white paper to find out.
Posted: 12 Oct 2020 | Published: 12 Oct 2020

Keeper Security Inc

CEO Impersonation
sponsored by Inky Technology
WHITE PAPER: Threat actors have realized that they can achieve at least a minimal rate of success by impersonating a company’s CEO or other high-level official in an email to an employee lower down in the organization. They will typically request money via wire transfer, but it does not stop there. Read this white paper to see some examples.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Inky Technology

Ransomware Decoded
sponsored by Cybereason
WHITE PAPER: Ransomware has reemerged, and ransom payments have shot up in tandem, with the average payout at $80,000 in Dec. 2019. In addition, it’s evolving to avoid detection, and with the advent of Ransonware-as-a-Service (RaaS), even non-technical users can create an attack. Stay vigilant, read this white paper to learn what modern ransomware looks like.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Cybereason

A web of weak spots: Securing your supply chain with NDR and Collective Defense
sponsored by IronNet
WHITE PAPER: Today’s supply chain is an extended enterprise with many back doors. Indirect attacks against weak links in the supply chain now account for 40% of security breaches. How can you better protect your data? Dig into this white paper to learn the 5 most common attacks and how network detection & response can help prevent them.
Posted: 03 Sep 2020 | Published: 03 Sep 2020

IronNet

HOW IT DECISION-MAKERS ARE RESPONDING TO COVID-19
sponsored by Aruba Networks
WHITE PAPER: As the world moves toward a hybrid workplace (employees in between office and remote), IT investments and therefore IT consumption are set to change drastically on a global scale across all industries. Want to see the numbers? View this in-depth report.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Aruba Networks

XDR: Extended Detection and Response
sponsored by Palo Alto Networks
WHITE PAPER: Extended detection & response (XDR) has emerged in the wake of a need to detect, investigate and respond to threats across all threat vectors in a company’s infrastructure (network, endpoint and cloud) rather than just one. Dive into this white paper to learn about XDR and how it uses integration and orchestration as defense.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Palo Alto Networks

Achieving Resilience in Your Distributed Workforce Environment During the COVID-19 Pandemic and Beyond
sponsored by Tanium
WHITE PAPER: To accommodate the transformation to remote work, organizations have upended their traditional IT infrastructure and adopted decentralized networks, cloud-based services, and widespread usage of employees’ personal devices. This has revealed critical gaps in visibility. Use this white paper to learn how to fill these gaps and remain resilient.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Tanium
1 - 25 of 613 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences