Monitoring Network Reports

Focus: Network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
Posted: 08 Feb 2021 | Published: 24 Apr 2017

TechTarget ComputerWeekly.com

Royal Holloway: Security evaluation of network traffic mirroring in public cloud
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.
Posted: 27 Apr 2022 | Published: 27 Apr 2022

TechTarget ComputerWeekly.com

IoT: What it Takes to Run a Wireless, Secure, Mobile Strategy
sponsored by Aruba Networks
EGUIDE: The Internet of Things is here and the knowledge of how to run it effectively is vital. Without a plan and without a vision, the IoT can fall apart catastrophically. In this e-guide, learn what it takes to run an IoT wireless network, how BYOD and IoT device onboarding can improve security, and what your mobile security strategy should look like.
Posted: 09 Sep 2016 | Published: 07 Sep 2016

Aruba Networks

A Computer Weekly E-Guide to Network Management & Monitoring
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Covid has introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. SD WAN, SASE and in particular digital transformation are key examples of that.
Posted: 08 Oct 2021 | Published: 08 Oct 2021

TechTarget ComputerWeekly.com

APCON INTELLAFLEX-36 Port 10G Time Stamping and Packet Slicing Blade
sponsored by APCON, Inc.
WHITE PAPER: This white paper highlights the challenges that data centers face when it comes to network monitoring. It also explains the performance capabilities and benefits of blade servers from APCON.
Posted: 07 May 2014 | Published: 28 Feb 2014

APCON, Inc.

A network automation roadmap to reap tech's best benefits
sponsored by TechTarget Networking
EBOOK: A network automation roadmap can help guide organizations through the Wild West of modern networking in order to reap benefits that automation can bring to employees, customers and partners. Reducing labor-intensive tasks does entail changing a network engineer's work, though.
Posted: 08 Sep 2021 | Published: 06 Sep 2021

TechTarget Networking

Buyer's Criteria for Advanced Malware Protection
sponsored by Sourcefire
WHITE PAPER: This guide explores the current state of malware in today's threat landscape and discusses some of the top strategies for stopping sophisticated malware.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

Sourcefire

Measuring the Business Benefits of Unified Communications
sponsored by Dimension Data
EGUIDE: This guide discusses the waning enthusiasm for UC, but more importantly, how IT can rethink the business benefits and the best ways to manage UC services in order to increase adoption and enthusiasm.
Posted: 02 Mar 2016 | Published: 25 Feb 2016

Dimension Data

Unified Visibility Fabric Architecture – A New Approach to Visibility
sponsored by Gigamon
WHITE PAPER: This guide explores a new strategy for network visibility enhancement and how it will revolutionize your existing infrastructure.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Gigamon

Deploying Nagios Monitoring
sponsored by BigPanda
EGUIDE: In this technical guide you will learn how to integrate monitoring into your existing Nagios environment, and specifically how to set up remote server monitoring using remote host definitions that contain a specification for each individual service that needs monitoring. The advantage of this approach is the ease of deployment.
Posted: 24 Feb 2016 | Published: 18 Feb 2016

BigPanda