IT Management  >   Systems Operations  >  

Network Management

RSS Feed   
ALSO CALLED: Element Management, NSM, Managing Network, Network and System Management
DEFINITION: Event forwarding is the transmission of information to a centralized computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers. Event forwarding is a standard feature of the SQL Server Enterprise Manager interface and is also available  … 

Network Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary
Network Management Reports
126 - 150 of 1606 Matches Previous Page  |  Next Page
Network - ISG Software Defined Solutions and Services Partners
sponsored by Apcela
ANALYST REPORT: The SDN, closely related to NFV and SD-WAN technologies and services are evolving and rapidly penetrating the enterprise market. In this ISG Provider Lens research report, compare software defined solutions and services partners, their key strengths, challenges and competitive differentiators.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Apcela

4 Ways Digital Transformation Can Help the Bottom Line and How a SIEM Can Help
sponsored by Splunk
WHITE PAPER: IDC estimates that digital transformation could translate to over $18 trillion of new value. This is great, but what specific effects could these transformation strategies have on the bottom line and on cybersecurity? Read this white paper to get the answer.
Posted: 20 Nov 2020 | Published: 20 Nov 2020

Splunk

2020 GLOBAL CLOUD UNIFIED COMMUNICATIONS AND COLLABORATION ADOPTION STRATEGIES CUSTOMER VALUE LEADERSHIP AWARD
sponsored by Fuze
ANALYST REPORT: Unified communications & collaboration professionals are always searching for ways to uncover growth potential by impacting value proposition. But what separates a firm from its competitors in this respect? View this report to see the story of how one firm earned Frost & Sullivan’s award for customer value leadership.
Posted: 20 Nov 2020 | Published: 20 Nov 2020

Fuze

Define the Future with On-Demand Network Acquisition
sponsored by Extreme Networks
DATA SHEET: The U.S. Federal Government has placed a higher priority on delivering better national security through IT investments while maintaining high levels of user satisfaction. In some cases, they’ve even explored outsourcing enterprise IT services. What kinds of modern network solutions are they considering? View this data sheet to find out.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Extreme Networks

Leeds Beckett University Modernized Campus Infrastructure with Extreme Networks
sponsored by Extreme Networks
CASE STUDY: Leeds Beckett is a leading English public university that is striving to digitally transform. With the volume of connected devices increasing, and student expectations for instant, reliable, Wi-Fi access higher than ever, Leeds Beckett wanted a comprehensive infrastructure featuring Wi-Fi 6. View this case study to see how they got it done.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Extreme Networks

The Value of Extreme Networks For Manufacturing Organizations
sponsored by Extreme Networks
DATA SHEET: From high-performance Wi-Fi solutions designed to meet the complex and often harsh, operating environments common in manufacturing; to simple networking solutions that enable manufacturers to converge disparate networks, Extreme Networks has the solutions to help meet manufacturer’s stringent network requirements. Download this brief to learn more.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Extreme Networks

Burlington Area School District Strives for A Reliable, Modern Network
sponsored by Extreme Networks
CASE STUDY: The Burlington Area School District had an outdated network and was looking for an upgrade. Additionally, they were set on designing a different kind of network—one that could automatically connect their Chromebooks, support a 1-1 initiative and operate without interruption. Download this case study to learn how they were able to achieve this.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Extreme Networks

ExtremeCloud™ IQ: Cloud Security and Architecture Overview
sponsored by Extreme Networks
WHITE PAPER: If you’re searching for a cloud-based network management and security solution that strives to provide centralized configuration, orchestration and network monitoring, reporting, alarms and statistics for all cloud-enabled devices, read this comprehensive white paper.
Posted: 18 Nov 2020 | Published: 18 Nov 2020

Extreme Networks

Find Efficiencies and Control IT Costs
sponsored by SolarWinds, Inc.
WHITE PAPER: A recent research report found 25% of large enterprises have 8 or more network performance monitoring tools, some as many as 25. Suddenly, things are more complex and more expensive. As an IT director, this isn’t the direction you want to head. Read this white paper to learn how to cut down on complexity by consolidating monitoring systems.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

SolarWinds, Inc.

Computer Weekly – 17 November 2020: How Mastercard is taking digital payments into a new era
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to Mastercard about how the credit card giant is using new technologies to take digital payments into a new era. After months of unprecedented uncertainty, we ask CIOs how they are planning for the next 12 months. And we examine how the growth in remote working will affect IT salaries. Read the issue now.
Posted: 16 Nov 2020 | Published: 17 Nov 2020

ComputerWeekly.com

IDC: SD-WAN market spend to top $5B in 2023
sponsored by ComputerWeekly.com
EGUIDE: Discover the current vendors' share of the SD-WAN market, and why the market will grow an average of nearly 31% annually through 2023.
Posted: 13 Nov 2020 | Published: 13 Nov 2020

ComputerWeekly.com

Why decentralisation depends on a fast and secure network
sponsored by Business nbn
WHITE PAPER: COVID-19 has hit the accelerator on the move to digital, upending previously held orthodoxies about where work needs to happen. This presents the opportunity for organizations to plan a path to recovery that looks at regional centers as frontiers for growth. In this paper, learn why this movement depends on a fast and secure broadband network.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

Business nbn

Networking as the enabler of digital transformation
sponsored by Business nbn
WHITE PAPER: Greater uptake and deployment of cloud-based services, data storage, analytics and other digital elements are driving new ways of working. However, if businesses are without underlying communications infrastructure that can support these new methods, they’re risk falling behind. Read this white paper to learn how to stay ahead of the curve.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

Business nbn

451 Research: Open RAN transitions for established service providers
sponsored by Red Hat and Intel
ANALYST REPORT: In this 451 Research report, explore how RAN technologies enable communications service providers to enhance 4G networks at the mobile edge and prepare for the transition to 5G.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

Red Hat and Intel

NWN & Cisco: Transforming the Citizen Experience for the Town of Cary, NC
sponsored by NWN Corporation
VIDEO: The town of Cary, North Carolina set out to adopt the latest smart city technologies to enhance the lives of its citizens. Through evolving their network infrastructure and adopting a cloud-based approach, Cary is able to continually give its growing population the most modern digital experiences. Watch this quick video to learn the details.
Posted: 10 Nov 2020 | Premiered: 05 Dec 2019

NWN Corporation

Finding Your Way Forward in Uncertain Times
sponsored by Aruba Networks
EBOOK: So many businesses are performing damage control these days. Plans of digital transformation have pivoted to those of business continuity to ensure smooth and secure operations. However, you still have to move forward, and this can be easier said than done. View this e-book to see how Aruba and HPE Financial Services may be able to help.
Posted: 06 Nov 2020 | Published: 06 Nov 2020

Aruba Networks

SD-WAN: Tips for Enterprises to Unlock More Value
sponsored by Telstra
ANALYST REPORT: SD-WAN has quickly evolved from new technology to enterprises’ preferred way forward. Omdia’s survey of enterprises in the first quarter of 2020 uncovered that 53% of larger enterprises are testing or have deployed SD-WAN. In this report, explore more key findings from the survey and uncover tips for enterprises to unlock more value from SD-WAN.
Posted: 05 Nov 2020 | Published: 31 Aug 2020

Telstra

Methodology of an IAM Introduction
sponsored by Beta Systems
WHITE PAPER: IAM projects fail more often than one thinks, but why? Well, sometimes people think too big or too small, or they don't plan at all and often they simply underestimate the complexity of the overall project. For a successful IAM implementation, one must understand all the factors at play. Access this white paper to learn them.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Beta Systems

Garancy IAM Suite: Identity & Access Management Solution for Dynamic Companies
sponsored by Beta Systems
DATA SHEET: According to Carnegie Mellon, insider attacks are causing almost 200% more damage on average per case than attacks coming from outside. So it must be asked – is your identity and access management (IAM) up to snuff? If you feel as though your IAM suite could use a lookover or even a re-tool, read this data sheet and see what you may be missing.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Beta Systems

How IAM Systems Support Compliance
sponsored by Beta Systems
EGUIDE: Many organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.
Posted: 02 Nov 2020 | Published: 29 Oct 2020

Beta Systems

Detecting Malicious Activity In Large Enterprises
sponsored by Chronicle
ANALYST REPORT: With threat actors retaining the ability to jump from on-premise to cloud to legacy and back again, how can organizations effectively detect suspicious or malicious activity? To learn how to gain visibility, dive into this SANS report and understand how large enterprises can work to detect threats in the face of environmental complexity.
Posted: 30 Oct 2020 | Published: 30 Sep 2020

Chronicle

The Network Leader’s Guide to Secure SD-WAN
sponsored by Fortinet, Inc.
WHITE PAPER: With the rapid rise in SaaS and IaaS use, many network engineering and operations leaders are looking to replace their outdated WAN infrastructures with SD-WAN. While selecting the right SD-WAN for a particular use case may require a few compromises, security shouldn’t be one of them. Access this guide to learn about secure SD-WAN.
Posted: 29 Oct 2020 | Published: 03 Oct 2019

Fortinet, Inc.

A path to smart, not just present, video conferencing
sponsored by ComputerWeekly.com
EGUIDE: As businesses plan a recovery from the effects of the Covid-19. Employees now expect employers to offer a modern approach to how/where they work. It won't be enough for businesses to get by with aging processes. Wherever staff are based, video conferencing will be pivotal
Posted: 29 Oct 2020 | Published: 29 Oct 2020

ComputerWeekly.com

Blueprint for a Future Ready Workforce
sponsored by VMware
WHITE PAPER: When global events caused companies to rapidly pivot to remote work, IT had to act fast. In terms of PC lifecycle management, it quickly became apparent that legacy approaches were no longer adequate. Advance your strategy by reading this white paper, which offers a blueprint for your journey to a future-ready workspace on Windows 10.
Posted: 27 Oct 2020 | Published: 31 Jul 2020

VMware

Threat Report: TeamTNT: The First Cryptojacking Worm to Steal AWS Credentials
sponsored by Cysiv
WHITE PAPER: Because most online services now run in the cloud (AWS, Azure, Google Cloud, etc.), these cloud service providers have become an important new target for cybercriminals to install cryptojacking malware and to mine cryptocurrency. The Cysiv threat research team has analyzed this malware – read their report to learn what they discovered.
Posted: 27 Oct 2020 | Published: 19 Oct 2020

Cysiv
126 - 150 of 1606 Matches Previous Page    4 5 6 7 8 9    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences