Quickly learn the definitions and functions of key networking technologies, and how Netscout incorporates these technologies into products and solutions. These pages can help you understand benefits, what you can do with the technology, and how it works, with links to additional resources.

For education and training specific to Netscout products and solutions, please visit our Support and Services page.

In-depth guides and blogs written by talented network and security experts.

Learn About Cybersecurity

Cybersecurity fundamentals and modern techniques for safeguarding and defending electronic data from cyberattacks.

Learn About Network Monitoring

Key information on getting full network visibility to finally see and understand your entire network

Learn About DDoS Attacks

In a distributed denial-of-service (DDoS) attack, a network of computers work in tandem to overflow an access point and prevent legitimate users from accessing a service.

Learn About Mobile Network Monitoring and 5G

Understanding mobile network technologies to monitor and manage your entire network.

F-L

What is an Inline Sensor?

A sensor deployed so that the network traffic it is monitoring must pass through it.

What is the Intelligent DDoS Mitigation System (IDMS)?

A specialized security platform which legitimate traffic to its intended destination(s) while dropping DDoS attack traffic. IDMSes make use of specialized countermeasures to evaluated network traffic in order to determine whether it is legitimate or illegitimate in context, including interactive evaluaton of purported traffic sources to determine...

A specialized security platform which legitimate traffic to its intended destination(s) while dropping DDoS attack traffic. IDMSes make use of specialized countermeasures to evaluated network traffic in order to determine whether it is legitimate or illegitimate in context, including interactive evaluaton of purported traffic sources to determine whether their observed behaviors conforms to expected norms. NETSCOUT TMS and AED/APS are IDMSes.

What is an Intrusion Detection System (IDS)?

Hardware or software product that gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions (attacks from outside the organizations) and misuse (attacks from within the organizations.) It’s important to note the IDS only “detects” malicious activity – it...

Hardware or software product that gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions (attacks from outside the organizations) and misuse (attacks from within the organizations.) It’s important to note the IDS only “detects” malicious activity – it does not block this activity. An Intrusion Prevention System (which most likely is the same device but just in a different mode of operation ) “prevents or blocks” the malicious activity. (see below).

What is an Intrusion Prevention System (IPS)?

System(s), which can detect an intrusive activity and can also attempt to stop the activity, ideally before it reaches its targets.A ny malicious activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. Well know IDS/IPS vendors are Trend Micro...

System(s), which can detect an intrusive activity and can also attempt to stop the activity, ideally before it reaches its targets.A ny malicious activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. Well know IDS/IPS vendors are Trend Micro Tippingpoint, McAfee NSP, Cisco Firepower, Darktrace Enterprise Immune System. However, this technology/functionality is also embedded in major Next Gen Firewall (NGFW) products.

What is IoT?

The Internet of Things (IoT) is about extending the power of the internet beyond computers and smartphones to a whole range of other things, processes, and environments.

What is an IPSec Flood DDoS Attack?

Internet Protocol Security (IPSec) is a secure network protocol suite which is primarily used to establish Virtual Private Network (VPN) connections across unsecure networks. IPSec utilizes the Internet Key Exchange (IKE) protocol to ensure secure connections and will authenticate and encrypt packets of data sent over an Internet Protocol (IP)...

Internet Protocol Security (IPSec) is a secure network protocol suite which is primarily used to establish Virtual Private Network (VPN) connections across unsecure networks. IPSec utilizes the Internet Key Exchange (IKE) protocol to ensure secure connections and will authenticate and encrypt packets of data sent over an Internet Protocol (IP) network. Denial-of-Service (DoS) flooding DDoS attacks against IPSec were common a few years ago, however, since the adoption of IKEv2, these types of volumetric DDoS attacks have been rendered largely ineffective.

Cybersecurity Awareness Month

Every October, the NETSCOUT team promotes the conversation around Cybersecurity Awareness Month. We share resources and expertise on how everyone, from end users to service providers, can improve their cyber literacy, keep up with the newest technologies, and join the industry.

Learn how to stay safe online with our helpful resources.

Cybersecurity Awareness Month

More questions? Talk to an expert.