Quickly learn the definitions and functions of key networking technologies, and how Netscout incorporates these technologies into products and solutions. These pages can help you understand benefits, what you can do with the technology, and how it works, with links to additional resources.

For education and training specific to Netscout products and solutions, please visit our Support and Services page.

In-depth guides and blogs written by talented network and security experts.

Learn About Cybersecurity

Cybersecurity fundamentals and modern techniques for safeguarding and defending electronic data from cyberattacks.

Learn About Network Monitoring

Key information on getting full network visibility to finally see and understand your entire network

Learn About DDoS Attacks

In a distributed denial-of-service (DDoS) attack, a network of computers work in tandem to overflow an access point and prevent legitimate users from accessing a service.

Learn About Mobile Network Monitoring and 5G

Understanding mobile network technologies to monitor and manage your entire network.

F-L

What is GPRS?

GPRS (General Packet Radio Services) is a packet-oriented Mobile Data Service available to users of GSM and IS-136 mobile phones.

What is GSM?

GSM (Global System for Mobile Communications) is a digital wireless protocol for mobile phones. Its signal and speech channels are both digital rather than analog, making this system a second generation, or "2G," mobile phone system. GSM uses TDMA (time division multiplexing) versus the code division multiplexing on which CDMA is based. See also...

GSM (Global System for Mobile Communications) is a digital wireless protocol for mobile phones. Its signal and speech channels are both digital rather than analog, making this system a second generation, or "2G," mobile phone system. GSM uses TDMA (time division multiplexing) versus the code division multiplexing on which CDMA is based. See also CDMA.

What is GTP?

GTP (GPRS Tunneling Protocol) is the defining IP protocol of the GPRS core network. It allows users of a GSM network to move from place to place while continuing to connect to the internet as if from one location.

What is a Honey Pot?

A system (e.g., a Web server) or system resource (e.g., a file on a server) that is designed to be attractive to potential crackers and intruders and has no authorized users other than its administrators.

What are Human Threats?

Possible disruptions in operations or breach of security controls resulting from intentional or unintentional human actions.

What is a Hybrid Network?

Any computer network that uses more than one type of connecting technology or topology is a hybrid network.

Cybersecurity Awareness Month

Every October, the NETSCOUT team promotes the conversation around Cybersecurity Awareness Month. We share resources and expertise on how everyone, from end users to service providers, can improve their cyber literacy, keep up with the newest technologies, and join the industry.

Learn how to stay safe online with our helpful resources.

Cybersecurity Awareness Month

More questions? Talk to an expert.