An ACL applies rules to switch ports or (Internet Protocol) IP addresses available to a host or switch. The rules determine whether or not packets can flow through those ports or IPs.
An ACL applies rules to switch ports or (Internet Protocol) IP addresses available to a host or switch. The rules determine whether or not packets can flow through those ports or IPs.
A signal passed between communication processes to signify response recipience as part of a communications protocol.
A directory service that Microsoft developed for Windows domain networks.
Comprehensive, evolving cloud computing platform provided by Amazon.
A new dimension of application performance that combines three dimensions of APM, which are application topology discovery and visualization, User-defined transaction profiling, and Application component deep-dive.
An area of IT that focuses on monitoring the performance of software application programs in order to provide end-users with a quality experience.
A set of subroutine definitions, protocols, and tools for building application software. These include, but aren’t limited to, Microsoft Windows API, C++ Standard Template Library, and Java APIs.
An NM tool that allows you to detect your entire web environment, visualize it into a single interactive infographic, and learn about your network environment’s performance without ignoring performance anomaly identification.
A measurement of the number of bits conveyed or processed (bit-rate) that are available or consumed in metric multiples of bits per second.
An network monitoring tool that allows you to track end-to-end user activity for all web-based applications during network user sessions.
Network of remote servers hosted on the internet and used to store, manage, and process data.
An IT model that enables configurable resources (computer networks, servers, applications, etc.) from users and enterprises to allow computing capabilities, such as storage or processing, with minimal management.
The process of moving data, applications or other business elements from an organization’s onsite computers to the cloud.
An OSI network management service interface used to monitor and control different computing systems.
System of allowing multiple entities of a communications system to transmit information via any kind of physical quantity variations.
Method of IT management that reduces the size of a single facility, or merges one or more facilities to reduce overall operating costs and reduce IT footprint.
Gathering information about a program’s possible values, then using a control flow graph to determine optimization methods for the program.
A computer program that tells the OS how to communicate with a piece of hardware.
A measurement of how much activity the server’s disks are experiencing, which is measured in terms of megabytes per second.
Domain Name Servers: The main directory of domain names which are then translated into Internet Protocol (IP) addresses.
A way to automatically assign IP addresses and settings to a network device.
A functionality that allows you to monitor the actual end user experience of any network component on any device.
The set of people, processes, and technology focused on managing mobile devices, wireless networks, and other mobile computing services in a business context.
Protocol used to transfer web pages and other files on the World Wide Web.
Secure version of HTTP that is used to transfer sensitive data, such as credit card numbers.
The application that allows computers to store, study, retrieve, transmit, and manipulate data.
The principal communications protocol for sending and receiving datagrams across network boundaries, connecting multiple networks together across the Internet.
A computer network that connects devices within a limited space (schools, college campuses, office buildings, etc.)
A set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network.
Using a system to constantly monitor a computer network(s) for hinderances or failures in the network’s components, which are then notified to network administrators for quick remediation.
A procedure for identifying active hosts on a network, either for the purpose of attacking them or for network security assessment.
An active electronic device that is attached to a network, and it’s capable of creating, receiving, or transmitting information over a communications channel.
The ability to use all available enterprise data as needed and usually involves streaming data that allows users to make decisions on the fly.
The industry standard for transmitting secure data over the Internet. It is based on a system of trusted certificates issued by certificate authorities and recognized by servers.
A contract between a service provider or vendor and the customer that defines the level of service expected. SLAs are service-based and specifically define what the customer can expect to receive.
The process of defining a structured solution that meets all of the technical and operational requirements, while optimizing common quality attributes such as performance, security, and manageability.
A software delivery model in which software is licensed on a subscription basis and is centrally hosted and typically accessed by end-users using a client via web browser.
Standard language for accessing and manipulating databases.
Separate virtual networks on the same physical network; network packets are tagged so traffic flows to the appropriate VLAN. This lets you keep network applications separate despite being connected to the same physical network and doesn’t require multiple sets of cabling and networking devices to be deployed.
Technique used to create a secure connection between two or more devices over a public network.
A computer system that processes requests via Hypertext Transfer Protocol (HTTP), the basic network protocol used to distribute information on the internet.
Security protocol for wireless networks. It’s an improvement over WEP and is required for networks that use 802.11n.
Easy and reliable uptime and performance monitoring solution, with highly customizable status pages.