Quickly learn the definitions and functions of key networking technologies, and how Netscout incorporates these technologies into products and solutions. These pages can help you understand benefits, what you can do with the technology, and how it works, with links to additional resources.
For education and training specific to Netscout products and solutions, please visit our Support and Services page.
In-depth guides and blogs written by talented network and security experts.
Learn About Cybersecurity
Cybersecurity fundamentals and modern techniques for safeguarding and defending electronic data from cyberattacks.
Learn About Network Monitoring
Key information on getting full network visibility to finally see and understand your entire network
Learn About DDoS Attacks
In a distributed denial-of-service (DDoS) attack, a network of computers work in tandem to overflow an access point and prevent legitimate users from accessing a service.
Learn About Mobile Network Monitoring and 5G
Understanding mobile network technologies to monitor and manage your entire network.
C-E
What is a DNS Water Torture DDoS Attack?
In a DNS Water Torture DDoS attack, the attacker overwhelms the Domain Name System (DNS) server with a large volume of requests for non-existent or invalid records. In most cases, these state exhaustion DDoS attacks will be handled by a DNS Proxy server, which will then use up most, if not all, of its resources querying the DNS Authoritative server with these records. This will, in most cases, result in both the DNS Proxy server and the DNS Authoritative server using up all their time handling those bad requests, slowing response for legitimate requests and eventually, stopping responses all together.
What is Dwell Time?
The length of time from initial compromise to when the organization becomes aware of the breach.
What is Edge Cloud?
The term Edge Cloud refers to virtual and cloud-based technologies that are used in the RAN for network, compute, and storage for user plane applications and services.
What is Endpoint Detection and Response (EDR)?
Endpoint Detection and Response is an emerging technology addressing the need for continuous monitoring and response to advanced threats. One could even make the argument that endpoint detection and response is a form of advanced threat protection.
What is an Encrypted Key?
A cryptographic key that has been encrypted using an Approved security function with a key encrypting key, a PIN, or a password in order to disguise the value of the underlying plaintext key.
What is an Evasion?
Modifying the format or timing of malicious activity so that its appearance changes but its effect on the target is the same.
Cybersecurity Awareness Month
Every October, the NETSCOUT team promotes the conversation around Cybersecurity Awareness Month. We share resources and expertise on how everyone, from end users to service providers, can improve their cyber literacy, keep up with the newest technologies, and join the industry.
Learn how to stay safe online with our helpful resources.