Home
 > search for

Featured Documents related to »  port monitoring


Layer 3 or Bust
Extreme Networks has once again seized the number one position in Layer 3 Ports shipped for the first quarter of 2000.

port monitoring  well as Gigabit Ethernet ports. According to a report released by Dell'Oro Group, Extreme Networks holds 24% of the 10/100 MB layer 3 switch market. Along with capturing the 10/100 MB market, Extreme has totally dominated the Gigabit Layer 3 market by capturing approximately 40% of the Gigabit ports shipped this quarter. Extreme Networks dominance in the Layer 3 market place is nothing new, as it has dominated the network market since it came onto the scene back in 96 . Extreme has gone up against the Read More...
Business Performance Management
Business performance management (BPM) enables organizations to translate strategies into plans, monitor execution, and provide insight needed to manage and improve financial and operational perf...
Start evaluating software now
Country:

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » port monitoring


Using Keyboard, Video, and Mouse over IP to Connect Remote Networks
Today’s IT professionals are often challenged by unrelenting changes in the enterprise, increased data growth and compliance regulations, and geographic

port monitoring  connection and the switch port fails, access to all 32 servers is lost. Spiders can be cascaded or connected individually back to a switch. They can even be distributed among multiple switches so no single switch failure cuts you off from all your servers. Most high-density solutions require purchasing dongles to connect to managed servers, increasing cost. Spider has the necessary HD-15 video, USB and PS/2 connections built in. A typical high-density solution allows access to a limited number of managed Read More...
CyberPeepers from Korean Sites Peek at U.S. Networks
Numerous United States Internet sites are being bombarded by cyberpeepers from Korea. Whether or not these network scans constitute an attack depends upon whom

port monitoring  to be aimed at port 111, which is the sunrpc port, and automount port for Linux. The source port for most of the scans seems to be UDP port 53. A spokesperson for the U.S. Department of Interior suggested that it was probably some intelligence gathering, however, more likely it is hackers from other parts of the world coming in through Korea due to the easy ability to compromise systems on .kr networks. Some network administrators are retaliating by scanning back the IP addresses where these probes are Read More...
The CyberAngel: Laptop Recovery and File Encryption All-in-One
Relevant Technologies took the CyberAngel into our labs to test it for our acceptability rating. It worked as advertised, and had more features than expected.

port monitoring  (CSIRC). We tested the port locking feature by inserting a wrong password into the password authentication box and then proceeded to try to HotSync some data to a Palm Pilot. The password violation blocked all the COM ports preventing the HotSync from taking place. The port locking feature also prevented us from initiating outgoing communications lines. However, in stealth mode, the CyberAngel initiated a call back to the recovery server to alert it of the laptop's geographic location verifying that COM Read More...
Cisco’s Complete Network in a Box
Cisco has extended its Architecture for Voice, Video, and Integrated Data (AVVID) to the mid-sized market. Cisco has introduced the new LAN switching solution

port monitoring  IP connection to each port on the device. This automatic detection allows for IP-based telephones to be powered with 48 volts DC with standard category 5 cabling. This in-line power system will also allow for all telephone connections to remain intact if building power is lost. User Recommendations The Cisco Catalyst 3524-PWR-XL (available today) is the most complete network device to date. This option packed device is the beginning of the totally converged IP-network for mid-sized companies. With the Read More...
Monitoring How Your Assets Use Energy
To stay competitive in a rapidly changing market, organizations need to incorporate asset management capabilities that optimize not only their assets

port monitoring  value and new market opportunities. Read More...
Enterprise Performance Management
Monitoring, measuring, and reporting on the financial health of a company is a basic need that requires effective tools and processes to optimize the end result

port monitoring  Management Monitoring, measuring, and reporting on the financial health of a company is a basic need that requires effective tools and processes to optimize the end result. Underpinning this is the requirement for planning capabilities, using scenario and what-if analysis with simulations and other forward-looking capabilities. The new primary research presented in this report shows that most organizations still have much to do. Read More...
Predictive Service Excellence for Printers: An Overview of Remote Service Platforms for Printer and Copier Devices
Networked printers and multifunction peripherals often require a high level of support and manual intervention. Secure remote monitoring platforms reduce device

port monitoring  a high level of support and manual intervention. Secure remote monitoring platforms reduce device downtime by automating service alerts and meter reading, and providing proactive toner replenishment. Users benefit from improved device uptime, and manufacturers and their service partners can build proactive service relationships that can drive customer loyalty. Read More...
Attributes of Sarbanes-Oxley Tool Sets Part Two: Information and Communication, Monitoring, and Startup Tips
An earlier article, Audit Considerations for Enterprise Software Implementations, included a brief discussion of the use of computer-based tool sets and

port monitoring  and accuracy of financial reporting and corporate disclosures. While you could do this on your own or manually, why reinvent the audit controls wheel? Automated tool sets and repositories to facilitate SOX compliance are available in ample numbers. But like any piece of software, you have to know what to look for to meet your organization's expectations and avoid disappointments. This research note examines critical attributes of SOX tool sets, discussing how you can utilize them effectively to maximize Read More...
Monitoring Your Business Vital Signs: A Guide for Engineer-to-order and Project-based Manufacturers
Keeping track of your key business indicators is the difference between a thriving business concern and a business on life support. But even with this knowledge

port monitoring  that is on life support. Yet according to PricewaterhouseCoopers’ Trendsetter Barometer, one-third of CEOs at fast-growth companies feel that they are not spending enough time reviewing financial and operating numbers.1 On the other hand, nine percent of fast-growth CEOs think they are spending too much time personally reviewing their key indicators. Tellingly, theirs are also the businesses that have grown twice as fast over the past five years as the average “trendsetter” company. But is the Read More...
Realizing ROI from a Comprehensive Monitoring Solution
A single view into the health of the IT infrastructure is essential to efficiency. However, comprehensive monitoring is inaccessible to many IT organizations

port monitoring  development speed, and revenue support. Read More...
Analysis of Sendmail, Inc.'s Largest Open Source Release in Twenty Years
sendmail 8.10 now includes SMTP authentication and support for the lightweight directory access protocol (LDAP) and multiple queues.

port monitoring  includes SMTP authentication and support for the lightweight directory access protocol (LDAP) and multiple queues. Nearly 5,000 users participated in the beta testing of the new version to ensure its quality and performance. (Source: Sendmail, Inc.). Market Impact During sendmail 8.10's development, over 5,000 beta users tested the product to reveal any issues and recommend improvements prior to the products final release. Revision 8.10 has improved in three key areas: security, integration and Read More...
Tizor
Tizor provides the world's largest companies with the only enterprise Data Auditing and Protection solutions capable of monitoring and reporting on all critical

port monitoring  capable of monitoring and reporting on all critical data activity across the enterprise data center - databases, file servers, and mainframe applications - for compliance assurance, data protection, and theft detection. Tizor's Mantra solutions enable the highest level of compliance assurance, data security, and privacy by providing a complete life cycle of intelligent data auditing capabilities including data discovery, audit reporting, theft detection, real-time alerting, and data protection. Founded Read More...
Is Something Fishy Happening To Your Website?
Freshwater Software offers powerful solutions for website monitoring. There’s a product or service for every budget and every type of site, and the customer

port monitoring  Operations Center The SiteReliance Portal, which aggregates monitoring data and allows for customized views of that data and the monitoring environment Customizable portal interface using XML/XSL Customized reports for error tracking and trend analysis. Product Strategy and Trajectory With its combination of products Freshwater has offerings for almost every size of company, and their customers range from Fortune 500 companies to small Internet sites. While there's probably not much more that can be Read More...
The Truth about Agent-based versus Agentless Monitoring: A Short Guide to Choosing the Right Solution
Monitoring servers, environments, platforms, applications, and services have become key ingredients for building successful IT departments. However, it can be a

port monitoring  Truth about Agent-based versus Agentless Monitoring: A Short Guide to Choosing the Right Solution Monitoring servers, environments, platforms, applications, and services have become key ingredients for building successful IT departments. However, it can be a daunting task to find the right solution to accomplish these critical needs with a limited budget and tight timelines. Learn about the differences between agent-based and agentless monitoring, so you can make the right decision based on your Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others