ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Monitoring Research

  • Gain Network Visibility Or Fall Behind

    Sponsored by: Catchpoint Systems Inc.

    This datasheet introduces a set of features dedicated to deploying a wide set of monitoring systems to painlessly cover your network. In addition, it details how these monitoring tools can provide a historical comparison and leverage robust adaptive analytics to bolster enterprise performance.

  • The Definitive Buyer's Guide for Evaluating Enterprise Network Firewalls

    Sponsored by: Palo Alto Networks

    This essential guide demonstrates how to reduce your attack surface by making an informed decision on the right firewall for your business. To do so, discover the fundamentals of modern firewall technology, 10 critical business requirements your next firewall must address, and more.

  • The Top 3 Monitoring Challenges IT Faces

    Sponsored by: AppNeta

    IT's visibility into applications both in-house and in the cloud is more important and more difficult than ever. Discover the top 3 monitoring challenges facing IT teams today and how to overcome them.

  • Measuring Web App Performance Into and Across Cloud Providers

    Sponsored by: AppNeta

    End user experience is what drives business. To ensure the best possible experience, IT teams need the ability to monitor off-premise apps and services. This webcast teaches you which metrics require attention in measuring app performance, why slow response times are as problematic as downtime, and more.

  • The Case for Business-critical SaaS Application Monitoring

    Sponsored by: AppNeta

    This case study details how National Instruments was able to overcome their application performance issues by implementing an application performance management platform that provided end-to-end path and user experience monitoring specifically designed for their applications.

  • The Packet Train Difference

    Sponsored by: AppNeta

    Get an in-depth look at packet train dispersion technology and how it delivers an accurate measure of network performance. You'll learn key benefits of packet train dispersion analysis, how it works, and more.

  • A New Approach to Network Monitoring

    Sponsored by: AppNeta

    End-user application experience monitoring has become more difficult due to cloud computing. This white paper details the challenges presented by cloud applications and an entirely new way to assess, monitor, troubleshoot and report on network performance from the perspective of applications that run on the network.

  • Case Study: Optimizing the In-Store, Retail Experience with Application and Network Monitoring

    Sponsored by: AppNeta

    "Is it the app or the network?" Discover how to pinpoint whether your network or a certain app is causing latency or service outages within minutes. Read on to enable your app teams to constructively diagnose and troubleshoot the precise issues, freeing up resources to focus on more strategic initiatives.

  • White paper: Network management and operational efficiency

    Sponsored by: Forcepoint

    Learn how to make a NGFW work for your enterprise, both in the sense of security and the bottom line. Discover the intricacies of these firewalls, and what your enterprise might or might not need to manage one towards its potential.

  • Case study: Protecting high-profile clients with resilient network security

    Sponsored by: Forcepoint

    Learn what NETprotocol did to ensure that it provided the most resilient, scalable network security solution on the market. Discover how it helped its clients maximize efficiency and improve ROI from their IT budgets responded to the exact needs of each client, and more.

  • Case study : How the French Ministry of Education strengthens front-end security

    Sponsored by: Forcepoint

    Learn how the largest employer in France, the Ministry of Education, updated its massive network to include a powerful next-gen firewall (NGFW) that could support standard central services but also decentralized campus structures and data centers.

  • Cisco Nexus Data Broker

    Sponsored by: Cisco Systems, Inc.

    Network traffic monitoring has become more challenging as network and application traffic volume has increased. This document explains how Cisco Nexus Data Broker along with Cisco Nexus 9000 Series Switches combines with Cisco Application Centric Infrastructure to provide fabric traffic visibility for security, monitoring, and operations purposes.

  • eBook : Your Guide to Advanced Evasion Techniques

    Sponsored by: Forcepoint

    Learn the current state of cyber-criminality and why the security landscape looks so rosy from their perspective. Come to understand not only the shortcomings of traditional approaches but also how patching can lead to further problems and the issues with current network security devices countering advanced evasion techniques.

  • Why Now Is the Time to Re-Architect the Enterprise Network

    Sponsored by: Juniper Networks, Inc.

    IT professionals continue to embrace new technologies, but are they thinking about the infrastructure across which they're to delivering these technologies? Learn how to re-architect the enterprise network and data center infrastructure, in light of the momentum towards cloud, mobility, bandwidth-hungry apps, and advanced security threats.

  • How a School District Swiftly Detects and Remediates Internal and External Threats

    Sponsored by: Cisco Systems, Inc.

    Learn how the Council Rock School District approached their massive network security blind spot and reduced their threat reaction time from months to detect and resolve to mere minutes. Discover what did and what did not work for them, how they also improved their capacity planning, and more.

  • Unified Infrastructure Management: Inside-out Visibility and Control

    Sponsored by: CA Technologies

    Learn how unified infrastructure management (UIM) eliminates the need for many disparate monitoring solutions, and can help you optimize operational efficiency while reducing the complexity, cost and hassle of having to integrate multiple IT monitoring tools.

  • Managing Software-Defined Networks

    Sponsored by: Turbonomic

    Network-heavy workloads place considerable stress on today's virtualized and cloud data centers. SDN technologies aim to reduce the bottlenecks that can precipitate at the network layer in such environments. Access this whitepaper that explores the benefits of incorporating network topology and traffic-matrix information in VM placement decisions.

  • SD-WAN Securely Delivers a Consistent User Experience

    Sponsored by: Citrix

    This short video shows a user maintaining security while demonstrating network performance despite deteriorating conditions. You'll see how an SD-WAN can make up for failures in your MPLS.

  • Competitive Landscape: Carrier-Class Network Firewalls

    Sponsored by: Juniper Networks, Inc.

    As communications service providers (CSPs) move toward software-defined networking (SDN), and virtualizing network functions, new security capabilities must be in place. Access this report to uncover essential competitive insights into carrier network firewall providers.

  • Deliver Security Virtually Everywhere with SDN and NFV

    Sponsored by: Juniper Networks, Inc.

    Security vendorsĀ are progressing toward secure SDN and NFV rollouts. Read this report and explore approaches and exhibits for adding a layer of security to virtual network infrastructures.

  • Networking: You Can't Protect What You Can't See

    Sponsored by: Cisco Systems, Inc.

    Learn what types of attacker activity are most common and how better visibility helps you identify suspicious network behaviors. Also uncover the "suspicious seven": the top questionable activities that every security team needs to be able to see.

  • Incident Response with NetFlow for Dummies

    Sponsored by: Cisco Systems, Inc.

    Security incidents are critical times for information security pros, with the time period after the first identifications having a big impact on the incident's severity. Access this e-book to learn how to align your incident response processes with industry-standard practices and how to enhance your technical capabilities.

  • A New Approach to Data Center Security

    Sponsored by: VMware

    The persistent threats and coordinated attacks in today's environment call for a new model of data center security. But how do you implement this new model without incurring huge hardware and firewall costs? Access this white paper to learn how micro-segmentation empowered by a network virtualization platform delivers fine-grained security.

  • Deciphering the Tactics of the Enemy: APT-Style Attacks

    Sponsored by: Dimension Data

    In this e-guide learn one of the most nefarious tactics cybercriminals are deploying in today's threat landscape: the Advanced Persistent Threat-style attack.

  • 7 Critical Components for Cybersecurity Readiness

    Sponsored by: Dimension Data

    This guide shows you seven elements of cyber security readiness critical for every organization. Expert Peter Sullivan outlines the most important components that your organization needs for a high degree of situational awareness into your network operations and utilization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.