Put our resources to work, for you.

Information and insights to help you get more from SolarWinds

More Resources

What is Application Performance Monitoring?

Your complete guide to APM concepts, capabilities, tools, and more.

Read IT Glossary

What is a Vulnerability Assessment?

Vulnerability investigation or assessment is a systematic approach to identify the security loopholes or weak points in your IT infrastructure and take active measures to resolve them quickly.

Read IT Glossary

What is Network Topology?

Network topology offers a diagrammatic explanation of the logical and physical setup of different components, such as routers and switches, in a network.

Read IT Glossary

What Is Software-Defined Networking?

Learn more about software-defined networking (SDN), including how it works, implementation, benefits, and differences between SDN and traditional networking.

Read IT Glossary

What Is an Insider Threat?

An insider threat is a user with authorized access to sensitive company assets or data who may misuse their access rights to compromise the organization's security.

Read IT Glossary

What Is DHCP?

DHCP intelligently manages IP address allotment and renewal activities in a network.

Read IT Glossary

What Is End-User Network Experience Monitoring?

End-user network experience monitoring allows teams to assess the impact of network performance on end users' experiences.

Read IT Glossary

What is High Availability?

High availability indicates a system's capability of being resilient to known or unknown failures.

Read IT Glossary

What Is a NoSQL Database?

NoSQL databases store and retrieve information in a nontabular format, unlike relational databases.

Read IT Glossary

What Is a Relational Database?

A relational database allows you to easily find, scan, and sort specific information based on the relationship among the different fields defined within a table.

Read IT Glossary
Next page