ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Monitoring Research

  • Gartner Magic Quadrant Report for Application Delivery Controllers

    Sponsored by: Citrix

    This Gartner Magic Quadrant report explores application delivery controllers (ADCs) and their role in the modern data center. View now to uncover a quick description of twelve of today's leading ADC vendors, their strengths and weaknesses, and where they stack up when compared.

  • Monitoring and Management for the Next-Generation Network

    Sponsored by: TechTarget Networking

    With all the changing network technologies and architectures – due to innovations like SDN and gigabit wireless, it's hard for IT managers to know when to invest. This issue of The Network Evolution explores these challenges with an in-depth look at network monitoring and management for the next-generation network.

  • The Total Economic Impact of WANdisco SVN MultiSite

    Sponsored by: WANdisco

    This Forrester Total Economic Impact™ report unveils how one solution provides LAN-speed collaboration between distributed teams, giving them the feeling that they're all working in the same room. View now to uncover how this solution helped one global software engineering company enjoy a 357% ROI with a payback period of less than two months.

  • Strategy guide to business protection for physician practices

    Sponsored by: HP and Intel® Xeon® processors

    This white paper demonstrates how hospitals can manage risk and keep critical IT infrastructure up and running. Read now to learn how HIT leaders can ensure a high availability IT infrastructure that can improve service and protect their business.

  • Enterasys Data Center Networking – Connectivity and Topology Design Guide

    Sponsored by: Enterasys

    View key concepts that will help you build a data center fabric capable of meeting the needs of both organizations and users both today and in the future. View now to learn more!

  • System z: Making great security even better

    Sponsored by: IBM

    Adopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today.

  • Open SDN for Network Visibility: Simplifying large scale network monitoring systems with Big Tap

    Sponsored by: Big Switch Networks

    Traditional performance monitoring and management tools do not scale to meet the needs of the modern network. Consult this solution guide today to learn how the right SDN application can simplify large network monitoring systems and lead to success.

  • Information Security Essential Guide: The Evolution of Threat Detection and Management

    Sponsored by: TechTarget Security

    This Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.

  • AlienVault Unified Security Management: Complete Security Visibility

    Sponsored by: AT&T Cybersecurity

    AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.

  • SIEM Demo: Get Complete Security Visibility in an Hour

    Sponsored by: AT&T Cybersecurity

    Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.

  • Quick Dirty Dozen PCI Compliance Simplified

    Sponsored by: AT&T Cybersecurity

    Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.

  • 5 Backup Features to Ensure Accuracy, Eliminate Complexity and Streamline Auditing

    Sponsored by: APTARE

    In this brief resource, you will discover how a storage backup manager eliminates the complexity and manual labor associated with SOX auditing by automatically collecting backup data in real time and storing it in a central web-based repository where administrators and auditors can access, analyze and record the information.

  • Cisco® ONE: The Value of Advanced Flow Control

    Sponsored by: Cisco Systems, Inc.

    Discover how utilizing the advanced flow control capability in Cisco Open Network Environment (ONE) can help you overcome the complex monitoring challenges you are facing today.

  • EMA Radar™ for Advanced Performance Analytics (APA) Use Cases: Q4 2012

    Sponsored by: Hewlett-Packard Enterprise

    This EMA Radar Report details how a suite of advanced performance analytics (APA) solutions combines predictive analytics with a dynamic service model to provide an intelligent framework around alerts, help you achieve faster MTTR, proactively manage application performance, and much more.

  • Cisco® ONE: Traffic Visualization and Control

    Sponsored by: Cisco Systems, Inc.

    This resource explores how Cisco ONE's traffic visualization and control capability can help service providers visualize traffic end-to-end across the network and respond to unpredictable network capacity demands quickly, easily, and efficiently.

  • Networking for Application Performance and Delivery

    Sponsored by: Citrix

    This expert TechGuide from SearchEnterpriseWAN.com on network application performance optimization explains the top do's and don'ts that will help you achieve the application performance your users expect.

  • Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler

    Sponsored by: Citrix

    Explore the details of an end-to-end mobility solution that simplifies mobile integration into the network and helps you overcome the top challenges enterprise mobility presents, from visibility and management to scalability and security.

  • Network Security Visibility and Analysis Technical Guide

    Sponsored by: TechTarget Security

    This TechGuide explores how to improve network security visibility with network flow analysis tools, cloud security monitoring solutions and anomaly-based monitoring technology. Read on now to secure the data traveling across your network with these monitoring strategies.

  • Managing a Virtualized Network

    Sponsored by: TechTarget Security

    Download this exclusive IT handbook for the 5 steps to integrate and manage virtual networks, traffic analysis tips and tricks, advice on how to gain virtual network overlay visibility and much more.

  • Application Optimization for the Network

    Sponsored by: TechTarget Networking

    In the new WAN, we'll see user-aware WAN optimization, the rise of software-defined networking and WAN-on-demand. There may be some bumps along the road to WAN innovation, but it's sure to be an interesting journey.

  • Ixia ControlTower Architecture

    Sponsored by: Ixia

    As networks grow in size and complexity, the need for visibilty becomes even more essential. Consult this resource to learn more about how you can increase scale, flexible deployments and the need for application and security monitoring in the network.

  • Software-Defined Networks and the New Network Hypervisor

    Sponsored by: TechTarget Security

    This issue of the Network Evolution E-Zine focuses on various SDN solutions, if it's the answer to the bottleneck problem, and potential pitfalls. Read this issue now to see what experts have to say about the possible SDN revolution.

  • 10 Tips to Help You Minimize the Duration and Impact of a Security Breach

    Sponsored by: Dell SecureWorks

    Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.

  • Infrastructure Agility Through Affinities

    Sponsored by: Plexxi

    The way your applications take part in your infrastructure – and influence it – is crucial to business success. Unfortunately, this has been inherently complex and costly to achieve. Until now. View this white paper to learn how affinities can help you overcome these challenges.

  • Troubleshooting Your Network Without Breaking the Bank

    Sponsored by: Riverbed Technology, Inc.

    As a network manager, application manager or security manager, you need systems that can collect data across your WAN, continuously analyze the data to discover problems, and troubleshoot issues as soon as they occur. Riverbed Cascade has fundamentally changed the economics of network performance management. Learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.