Skip to main content

What is Network Traffic Monitoring?

11/10/21
Riverbed defines network traffic monitoring, outlines its major uses and explains its benefits to network visibility.

What is IT Infrastructure Monitoring ?

11/10/21
Riverbed defines IT infrastructure monitoring and ITIM tools and discusses how infrastructure performance impacts networks and applications.

What is Network Configuration Management?

11/10/21
Riverbed defines network configuration management, discusses its discovery and diagramming features, and explains its policy compliance and reporting impact.

Network Performance Monitoring and Diagnostics

10/8/21
Gartner defines the network performance monitoring and diagnostic (NPMD) market as tools that leverage a combination packet, flow, and device monitoring (SNMP, WMI, synthetic testing, etc).

How Does a Web Application Work?

9/28/21
In computer system, a web application is a client side and server side software application in which the client runs or request in a web browser...

What is NetFlow?

9/28/21
Riverbed's Alluvio Flow Gateway gathers IP data flows from across the enterprise, collates it, and deduplicates it to provide a single view of the entire flow.

What is AIOps?

9/28/21
AIOps refers to the application of big data, machine learning, analytics, and automation to IT Ops use cases in order to address today’s need to make sense of large quantities of mostly structured, specialized, cross-domain IT data.

What is Cyber Security Analytics?

9/28/21
Cyber security analytics detect behaviors that indicate malicious activity by collecting, normalizing and analyzing network traffic for threat behavior. Learn why to use cyber security analytics, and what benefits cyber security analytics brings to your organization.

What is Cyber Threat Hunting?

9/28/21
Cyber threat hunting is seeking out, tracking, and disabling network intruders. Learn about cyber threat hunting, cyber threat hunters, and their tools.

What is Cybersecurity Incident Response?

9/28/21
Cybersecurity incident response describes the process by which an organization handles a data breach or cyberattack (the “incident”), including how the organization attempts to manage the consequences of the incident. Packet and/or flow data are usually instrumental in the investigation process.