Quickly learn the definitions and functions of key networking technologies, and how Netscout incorporates these technologies into products and solutions. These pages can help you understand benefits, what you can do with the technology, and how it works, with links to additional resources.

For education and training specific to Netscout products and solutions, please visit our Support and Services page.

In-depth guides and blogs written by talented network and security experts.

Learn About Cybersecurity

Cybersecurity fundamentals and modern techniques for safeguarding and defending electronic data from cyberattacks.

Learn About Network Monitoring

Key information on getting full network visibility to finally see and understand your entire network

Learn About DDoS Attacks

In a distributed denial-of-service (DDoS) attack, a network of computers work in tandem to overflow an access point and prevent legitimate users from accessing a service.

Learn About Mobile Network Monitoring and 5G

Understanding mobile network technologies to monitor and manage your entire network.

What is Contain Time?

The length of time from when a breach is discovered to time that the mitigation of that breach begins.

What is Cyber Threat Hunting?

Cyberthreat Hunting is a proactive cybersecurity approach that involves actively searching for and mitigating potential threats within a network. It goes beyond traditional security measures by seeking out anomalies and vulnerabilities before they escalate into significant incidents.

What is Defense-in-Breadth?

A planned, systematic set of multidisciplinary activities that seek to identify, manage, and reduce risk of exploitable vulnerabilities at every stage of the system, network, or sub-component life cycle (system, network, or product design and development; manufacturing; packaging; assembly; system integration; distribution; operations; maintenance...

A planned, systematic set of multidisciplinary activities that seek to identify, manage, and reduce risk of exploitable vulnerabilities at every stage of the system, network, or sub-component life cycle (system, network, or product design and development; manufacturing; packaging; assembly; system integration; distribution; operations; maintenance; and retirement).

What is Denial of Service (DoS)?

The prevention of authorized access to resources or the delaying of time-critical operations. (Time-critical may be milliseconds or it may be hours, depending upon the service provided.)

What is Extended Detection and Response (XDR)?

Extended detection and response (XDR) is a cybersecurity technology that monitors and mitigates cyber security threats by collecting and correlating data across various network points such as servers, email, cloud workloads, and endpoints. The data is then analyzed and correlated, lending it visibility and context, and revealing advanced threats.

What is False Acceptance?

In biometrics, the instance of a security system incorrectly verifying or identifying an unauthorized person. It typically is considered the most serious of biometric security errors as it gives unauthorized users access to systems that expressly are trying to keep them out.

Cybersecurity Awareness Month

Every October, the NETSCOUT team promotes the conversation around Cybersecurity Awareness Month. We share resources and expertise on how everyone, from end users to service providers, can improve their cyber literacy, keep up with the newest technologies, and join the industry.

Learn how to stay safe online with our helpful resources.

Cybersecurity Awareness Month

More questions? Talk to an expert.