IT Management  >   Systems Operations  >  

Network Management

RSS Feed   
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available  … 

Network Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary
Network Management Reports
101 - 125 of 1933 Matches Previous Page  |  Next Page
SD-WAN’s New SASE (“Sassy”) Friend
sponsored by Hughes Network Systems
EBOOK: Now that much of the working world has gone remote, legacy security architectures will not cut it when it comes to safeguarding from threats. The ever-growing number of new devices connecting to cloud networks need a smarter way to have identity and context brokered. Read this e-book to learn about SASE, a close friend of SD-WAN.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Hughes Network Systems

Six Must-Haves for Application Delivery in Hybrid- and Multi-Cloud Environments
sponsored by Citrix
EBOOK: Discover why ninety-four percent of organizations surveyed are already modifying, overhauling, or reassessing their network infrastructure to facilitate application delivery in hybrid- and multi-cloud environments. In this e-book, learn why you should re-architect your network infrastructure to optimize application delivery.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Citrix

How your network can take on the cloud
sponsored by Citrix
EBOOK: If you're moving to multi-, hybrid-, or cloud-based infrastructures, your networking solution could be the key to a streamlined transition. In this e-book, learn how the right network solution will simplify app delivery and protect your entire infrastructure, so that you can navigate your journey to the cloud with confidence.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Citrix

Analyst Report: WAN Edge Infrastructure
sponsored by Palo Alto Networks
ANALYST REPORT: Gartner defines the WAN edge infrastructure market as WAN edge products that provide network connectivity from distributed enterprise locations to access resources in private and public data centers, as well as IaaS and SaaS. In this Magic Quadrant, explore key vendors in the space and see how they stack up again each other.
Posted: 05 Oct 2020 | Published: 23 Sep 2020

Palo Alto Networks

The Top 5 InfoSec Professional Challenges
sponsored by LogicGate
RESOURCE: What keeps you up at night? If you’re anything like most risk and information security professionals, the list is long. Juggling security concerns, reporting on risk data, and managing the latest regulatory requirements all add up. To stay in the know, read the top 5 challenges infosec professionals face, and the common thread linking them all.
Posted: 02 Oct 2020 | Published: 24 Sep 2020

LogicGate

7 Facts That Will Help You Better Enable Your Remote Workforce
sponsored by Riverbed
RESOURCE: There has been a massive shift to work from home. And, it is unlikely to reverse itself anytime soon. In fact, 74% of companies plan to permanently shift to more remote work post COVID-19. In this infographic, explore 7 facts that will help you better enable your remote workforce.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Riverbed

InSecurity Podcast: Ron Ross - Applying the NIST Framework to Home Networks
sponsored by BlackBerry
PODCAST: Today’s security protocols are evolving so rapidly that organizations are in need of a framework to guide them. Who better to discuss the future of remote work and IT security than with a NIST Fellow? Listen to this gripping podcast to hear Dr. Ron Ross discuss the blindingly fast transformation from on-prem to remote work and what it means.
Posted: 02 Oct 2020 | Premiered: Apr 21, 2020

BlackBerry

Buyer’s Guide for Unified Network Performance Management
sponsored by Riverbed
WHITE PAPER: Current research indicates that companies will continue with an expanded remote work model after the concerns around COVID-19 subside. This shift places new challenges on the network. In this white paper, learn how a network performance monitoring solution can help you maintain network resiliency and security.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Riverbed

Endpoint Security for Smart Manufacturing: Protection from the Factory Floor To the Supply Chain
sponsored by BlackBerry
WHITE PAPER: Manufacturers have embraced digital transformation, which means they’re now capturing more and more data on many new and different types of endpoints, both in their factories and throughout their logistics channels. But with all that data comes added security risks. Jump into this white paper to look at these threats and their implications.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

BlackBerry

CEO Impersonation
sponsored by Inky Technology
WHITE PAPER: Threat actors have realized that they can achieve at least a minimal rate of success by impersonating a company’s CEO or other high-level official in an email to an employee lower down in the organization. They will typically request money via wire transfer, but it does not stop there. Read this white paper to see some examples.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Inky Technology

Zoom & Doom: How INKY Unraveled a Credential Harvesting Phishing Scam
sponsored by Inky Technology
RESOURCE: Zoom jumped from 10 million daily meeting participants in December 2019 to 300 million this past April. This boom in Zoom use spawned a flurry of fake meeting invitations from cybercriminals attempting to harvest credentials from users. Luckily, INKY was on the case. Read this article to view these fake Zoom meeting invites and more.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Inky Technology

Why and How I&O Should Lead Edge Computing
sponsored by Equinix
ANALYST REPORT: Edge computing is a nascent trend manifesting itself in many divergent use cases across the enterprise through a wide variety of technologies, topologies and vendors. With its potential to change how enterprises work, edge computing is the epitome of Infrastructure-Led Disruption. Download this Gartner report to learn more about Edge Computing.
Posted: 02 Oct 2020 | Published: 28 Feb 2020

Equinix

5 Network Automation Tips and Tricks for NetOps
sponsored by Nvidia
WHITE PAPER: Automation can help make the life of a networking pro easier. However, getting your automation off the ground to begin with can be a challenge. In this white paper, uncover 5 tips and tricks to get clarity around your automation decisions and reduce any friction that may be inhibiting adoption of network automation.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Nvidia

Covid-19: Three technology areas that CIOs must address
sponsored by ComputerWeekly.com
EGUIDE: CIOs will need to consider the IT measures that will be needed to support their organisations as the government ramps up its response to the coronavirus
Posted: 02 Oct 2020 | Published: 02 Oct 2020

ComputerWeekly.com

9 essential elements of network security
sponsored by ComputerWeekly.com
EGUIDE: Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

ComputerWeekly.com

Report: Build the Business Case for Cybersecurity and Privacy
sponsored by Okta
ANALYST REPORT: Mega data breaches will often spur organizations to invest in cybersecurity. However, if the approach is reactive and unplanned, then it’s a wasted opportunity. Use this report to structure a sound business case for cybersecurity and privacy investments that will both provide assurance to the stakeholders and value to the business.
Posted: 01 Oct 2020 | Published: 14 Aug 2020

Okta

Building a Wireless and 5G Future
sponsored by Telstra
ANALYST REPORT: Enabling a wireless and 5G future offers exciting opportunities for Australian businesses. For help preparing for and understanding the many benefits 5G can provide, read this white paper. It explores results of a survey conducted in June 2020 with GlobalData, where 150 business and IT decision makers across Australia were interviewed.
Posted: 01 Oct 2020 | Published: 01 Oct 2020

Telstra

Definitive Guide to Zero-Trust Security
sponsored by ColorTokens
EBOOK: Upon first hearing the term zero-trust, it can feel a bit worrying to implement what sounds like a “never trust” security policy. But what it actually provides is “just enough trust” to authorized users while blocking out all other traffic. To learn more, dive into the Definitive Guide to Zero-Trust Security to understand how zero trust works.
Posted: 01 Oct 2020 | Published: 01 Oct 2020

ColorTokens

Top Trends in Customer Identity and Access Management (CIAM) with analyst Mary Ruddy
sponsored by Okta
WEBCAST: Customer identity has gone mainstream. A seamless customer experience across devices is now expected. At the same time, security and privacy concerns are at an all-time high. View this webinar to hear from Gartner analyst Mary Ruddy and learn about findings from her recent research "Top 5 Trends in CIAM Solution Design".
Posted: 30 Sep 2020 | Premiered: Sep 30, 2020

Okta

11-Minute Webinar: Strategies to Work from Anywhere
sponsored by Okta
WEBCAST: Telework involves more than getting your employees up and running with video conferencing – it requires a massive shift in how people work and how you think about securing users and their devices. Don’t float adrift in a sea of distributed workforce challenges – watch this 10-minute webinar and learn how to manage access and security.
Posted: 30 Sep 2020 | Premiered: Jul 24, 2020

Okta

Executive Summary: Threat Hunting Made Easy
sponsored by Malwarebytes
RESOURCE: “Threat hunting” may sound like buzzword when you first hear it, but it is a very real practice that allows you to contain suspicious activity, determine if a threat is malicious or benign and remediate with just the click of a button. View this short brief and uncover a threat hunting opportunity your organization could use.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Malwarebytes

Enduring from Home
sponsored by Malwarebytes
ANALYST REPORT: 2020 is a test of business continuity. Now-remote workers are connecting to potentially unsecured home networks while accessing company resources from personal devices, and their unique cybersecurity needs must be considered. Read this report to learn perspectives on IT leaders on the sudden shift to remote work and its impact on security.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Malwarebytes

Security and Compliance for a Case Management SaaS
sponsored by Armor
CASE STUDY: When a private case management platform evolved into a software-as-a-service (SaaS) offering, a healthcare tech company needed a secure cloud-based solution that could help ensure HIPAA compliance. Read this comprehensive case study to learn about Armor Anywhere, a secure hosting platform designed with security and compliance in mind.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Armor

Key Tenets of Zero Trust Architecture
sponsored by ColorTokens
RESOURCE: Zero-trust architecture (ZTA) is a security blueprint built on the premise that attackers are already present and that anything can be compromised at any point. Broadly speaking, the tenets of ZTA can be classified under three security domains. Read this short article alongside the NIST SP 800-207 to examine the vital roles of these tenets.
Posted: 30 Sep 2020 | Published: 04 Sep 2020

ColorTokens

NetOps 2.0: Embrace Network Automation and Analytics to Win in the Era of ContinuousNext
sponsored by Gigamon
ANALYST REPORT: In a new report Gartner asserts "By 2023, the use of NetOps 2.0 principles will grow by 40%, and those embracing these principals will reduce their application delivery times by 25%.” Find out how to embrace NetOps 2.0 today.
Posted: 30 Sep 2020 | Published: 09 Oct 2019

Gigamon
101 - 125 of 1933 Matches Previous Page    3 4 5 6 7 8    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info