Whitepaper Library > Technology > Networking > Monitoring
 

Monitoring

Network Monitoring describes the use of a system that constantly monitors a computer network for slow or failing systems and that notifies the network administrator in case of outages via email, pager or other alarms. It is a subset of the functions involved in network management.
Results 176 - 183 of 183Sort Results By: Published Date | Title | Company Name
White Paper Published By: CCSS     Published Date: Jul 05, 2007
Capability breeds dependence. The more you can do, the more is asked of you. The more time you save, the more time you spend seeking out ways to save more time or money. If less really is more, how do you do more with less? Effective system monitoring could help you break free of the system shackles and use your System i (iSeries) network to save time and money.
Tags : 
ibm, system monitoring, monitoring, network monitoring, productivity
    
CCSS
White Paper Published By: CCSS     Published Date: Jul 05, 2007
Is a lack of availability costing your business thousands or even hundreds of thousands of dollars? Assessing the true financial impact of unplanned downtime may surprise you. Placing a dollar amount on this issue is often the first step and biggest motivator to meeting your ongoing availability requirements.
Tags : 
availability, high availability, business continuity, network monitoring, server monitoring
    
CCSS
White Paper Published By: Jumpnode Systems     Published Date: Jun 12, 2007
Network monitoring software packages require complex installation, ongoing maintenance and additional costs for servers and third-party applications. Software-as-a-Service (SaaS) network monitoring alternatives greatly simplify implementation and maintenance, but they rely on uninterrupted Internet access to function, often require complex VPNs or firewall modifications, and typically provide limited access to historical data.
Tags : 
monitoring, software as a service, saas, high availability, network management
    
Jumpnode Systems
White Paper Published By: Jumpnode Systems     Published Date: Jun 07, 2007
Get this free whitepaper now and read how a newer architecture, Appliance-enabled Software (AeS) services, combines a plug-in monitoring appliance with a hosted dashboard application to provide the benefits of SaaS (Software-as-a-Service) along with failover out-of-band communication capabilities for dependable alert notification and escalation.
Tags : 
saas, software as a service, monitoring, network monitoring, network management
    
Jumpnode Systems
White Paper Published By: Cyberoam     Published Date: Apr 19, 2007
Protecting students from the millions of sites that house pornography, adult chat rooms, violence & hacking can provide not just a safe surfing atmosphere to minors in schools and libraries, but also qualify the institutions for federal E-rate funding through compliance with CIPA - the Children's Internet Protection Act.
Tags : 
cipa, cipa compliance, cyberoam, cyberroam, chat room
    
Cyberoam
White Paper Published By: NetIQ Corporation     Published Date: Jan 29, 2007
This white paper identifies what is required for a comprehensive and integrated security management solution and examines the difference between SEM, SIM and SIEM and the challenges of enterprise level security monitoring.
Tags : 
security management, event management, network security, monitoring, network security
    
NetIQ Corporation
White Paper Published By: NetIQ Corporation     Published Date: Nov 18, 2006
This white paper is a must read for those involved in the process of log management for legal use. You'll examine the admissibility of log data in court cases; maintaining the authenticity of log data; and how log data can be attacked and stand up to scrutiny. And, learn legal terms like Hearsay, Best Evident Rules, etc.
Tags : 
log file, data protection, log management, legal log, log data
    
NetIQ Corporation
Start   Previous    1 2 3 4 5 6 7 8     Next   End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.