Monitoring Network Reports

Royal Holloway: Security evaluation of network traffic mirroring in public cloud
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.
Posted: 27 Apr 2022 | Published: 27 Apr 2022

TechTarget ComputerWeekly.com

Picking the Best Approach to Multicloud Strategy
sponsored by Rackspace Technology
EGUIDE: Three industry experts assess the best approaches to a multicloud strategy, why the evolution of leaf-spine architecture didn't emerge sooner and Innovium's programmable switch.
Posted: 22 Jun 2017 | Published: 12 Jun 2017

Rackspace Technology

SD-WAN: Choosing a Provider, Common Features & More
sponsored by TechTarget Networking
EBOOK: Read this handbook to explore a handful of SD-WAN features, including traffic management and built-in analytics, and learn how to determine which features you need. Also, find out areas where vendor differentiation is lacking and where SD-WAN could use some help.
Posted: 19 Feb 2019 | Published: 19 Feb 2019

TechTarget Networking

Employ AI for Cybersecurity, Reap Strong Defenses Faster
sponsored by TechTarget Security
EBOOK: Adversaries are constantly changing their hacking techniques to bypass the strongest enterprise security systems. Meanwhile, businesses are adopting new and advanced technologies to protect their assets. In this e-guide, explore considerations for implementing the latest applications of AI for cybersecurity in your enterprise.
Posted: 17 Jun 2020 | Published: 17 Jun 2020

TechTarget Security

Using DNS Monitoring to Detect Network Breaches
sponsored by Dyn
EGUIDE: Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.
Posted: 18 Oct 2016 | Published: 17 Oct 2016

Dyn

Turning Application Performance in Business Information
sponsored by TechTarget Networking
EZINE: In this issue of Network Evolution, find out how APM vendors are focusing on network visibility. We also explore 802.11ac's bandwidth demands and video conferencing drivers.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

TechTarget Networking

The Swiss Army Knife for the Network Analyst
sponsored by Riverbed Technology, Inc.
CASE STUDY: This exclusive case study covers a tool that helped one company with their network and protocol analysis.
Posted: 31 Jul 2014 | Published: 03 Aug 2013

Riverbed Technology, Inc.

Planning a Private Enterprise Cloud?
sponsored by KEMP Technologies
WHITE PAPER: This informative whitepaper explores the role of SDN and load balancing when planning your private cloud.
Posted: 14 May 2014 | Published: 14 May 2014

KEMP Technologies

The SDN Charge and the New Role in Mobile Security
sponsored by Juniper Networks, Inc.
EGUIDE: Take a closer look at the benefits and challenges of an SDN-WAN and network function virtualization (NFV) deployment. Additionally, this guide illustrates SDN's new security methodologies, which are reshaping mobile security today.
Posted: 14 Nov 2016 | Published: 11 Nov 2016

Juniper Networks, Inc.

5 reasons why end user experience management is not APM
sponsored by Aternity
WHITE PAPER: This guide explores the benefits of application performance management can benefit your network and end-user experience.
Posted: 09 May 2014 | Published: 31 Dec 2013

Aternity