Quickly learn the definitions and functions of key networking technologies, and how Netscout incorporates these technologies into products and solutions. These pages can help you understand benefits, what you can do with the technology, and how it works, with links to additional resources.

For education and training specific to Netscout products and solutions, please visit our Support and Services page.

In-depth guides and blogs written by talented network and security experts.

Learn About Cybersecurity

Cybersecurity fundamentals and modern techniques for safeguarding and defending electronic data from cyberattacks.

Learn About Network Monitoring

Key information on getting full network visibility to finally see and understand your entire network

Learn About DDoS Attacks

In a distributed denial-of-service (DDoS) attack, a network of computers work in tandem to overflow an access point and prevent legitimate users from accessing a service.

Learn About Mobile Network Monitoring and 5G

Understanding mobile network technologies to monitor and manage your entire network.

C-E

What is a Console?

A program that provides user and administrator interfaces to an intrusion detection and prevention system.

What is the Content Delivery Network (CDN)?

A globally distributed network of proxy servers deployed in multiple data centers. The goal of a CDN is to serve content to end users with high availability and high performance.

What are Countermeasures?

Actions, devices, procedures, techniques, or other measures that reduce the vulnerability of an information system. Synonymous with security controls and safeguards.

What is CUPS?

CUPS stands for control and user plane separation of the evolved packet core (EPC) nodes and provides the architecture enhancements for the separation of functionality in the EPC’s serving gateway node (SGW), packet data network gateway (PGW), and the traffic detection function (TDF). This enables flexible network deployment and operation, by...

CUPS stands for control and user plane separation of the evolved packet core (EPC) nodes and provides the architecture enhancements for the separation of functionality in the EPC’s serving gateway node (SGW), packet data network gateway (PGW), and the traffic detection function (TDF). This enables flexible network deployment and operation, by distributed or centralized deployment and the independent scaling between control plane and user plane functions - while not affecting the functionality of the existing nodes subject to this split.

What is Cyber Threat Intelligence (CTI)?

Cyber threat intelligence (CTI) is an area of cybersecurity that focuses on the collection and analysis of information about current and potential attacks that threaten the safety of an organization or its assets. The benefit of threat intelligence is that it's a proactive security measure, preventing data breaches and saving you the financial...

Cyber threat intelligence (CTI) is an area of cybersecurity that focuses on the collection and analysis of information about current and potential attacks that threaten the safety of an organization or its assets. The benefit of threat intelligence is that it's a proactive security measure, preventing data breaches and saving you the financial costs of cleaning up after an incident. Its purpose is to give companies an in-depth understanding of the threats that pose the greatest risk to their infrastructure and tell them what they can do to protect their business. All information should be actionable and provide support to the organization.

NETSCOUT’s ATLAS Threat Intelligence Feed is an example of Cyber Threat Intelligence. NETSCOUT Arbor Edge Defense can consume cyber threat intelligence.

What is a Data Breach?

A network breach is when unauthorized access to the network has occurred as a result of bypassing underlying security mechanisms. This could be someone coming through the firewall or entering the network via a phishing email. A data breach happens after a network breach, when an individual or an application illegitimately enters a private...

A network breach is when unauthorized access to the network has occurred as a result of bypassing underlying security mechanisms. This could be someone coming through the firewall or entering the network via a phishing email.

A data breach happens after a network breach, when an individual or an application illegitimately enters a private, confidential or unauthorized logical IT perimeter and steals confidential or unauthorized data such as private consumer information, credit cards, IP etc.

Cybersecurity Awareness Month

Every October, the NETSCOUT team promotes the conversation around Cybersecurity Awareness Month. We share resources and expertise on how everyone, from end users to service providers, can improve their cyber literacy, keep up with the newest technologies, and join the industry.

Learn how to stay safe online with our helpful resources.

Cybersecurity Awareness Month

More questions? Talk to an expert.