Quickly learn the definitions and functions of key networking technologies, and how Netscout incorporates these technologies into products and solutions. These pages can help you understand benefits, what you can do with the technology, and how it works, with links to additional resources.

For education and training specific to Netscout products and solutions, please visit our Support and Services page.

In-depth guides and blogs written by talented network and security experts.

Learn About Cybersecurity

Cybersecurity fundamentals and modern techniques for safeguarding and defending electronic data from cyberattacks.

Learn About Network Monitoring

Key information on getting full network visibility to finally see and understand your entire network

Learn About DDoS Attacks

In a distributed denial-of-service (DDoS) attack, a network of computers work in tandem to overflow an access point and prevent legitimate users from accessing a service.

Learn About Mobile Network Monitoring and 5G

Understanding mobile network technologies to monitor and manage your entire network.

C-E

What is an Event?

Any observable occurrence in a system and/or network. Events sometimes provide indication that an incident is occurring.

What is an Exploit?

An Exploit is a technique (usually code) which targets a vulnerability to achieve access to information or cause an outage

F-L

What is a False Negative?

An instance in which an intrusion detection and prevention technology fails to identify malicious activity as being such.

What is a False Positive?

An instance in which an intrusion detection and prevention technology incorrectly identifies benign activity as being malicious.

What is Flow Telemetry?

Constantly-updated metadata describing network traffic which is continuously streamed to collection/analysis systems such as NETSCOUT Sightline. It is the industry-standard form of network telemetry used to detect, classify, and traceback DDoS attack traffic, and scales to provide visibility into network traffic on the largest networks in the world...

Constantly-updated metadata describing network traffic which is continuously streamed to collection/analysis systems such as NETSCOUT Sightline. It is the industry-standard form of network telemetry used to detect, classify, and traceback DDoS attack traffic, and scales to provide visibility into network traffic on the largest networks in the world. Cisco NetFlow, IETF IPFIX, s/Flow, and Juniper cflowd are examples of flow telemetry

What is Gn?

Gn is the interface used by the gateway GPRS support node (GGSN) to communicate with serving GPRS support nodes (SGSN) and other gateway GPRS support nodes on the same public land mobile network (PLMN). Gn uses the GTP Protocol.

Cybersecurity Awareness Month

Every October, the NETSCOUT team promotes the conversation around Cybersecurity Awareness Month. We share resources and expertise on how everyone, from end users to service providers, can improve their cyber literacy, keep up with the newest technologies, and join the industry.

Learn how to stay safe online with our helpful resources.

Cybersecurity Awareness Month

More questions? Talk to an expert.