Quickly learn the definitions and functions of key networking technologies, and how Netscout incorporates these technologies into products and solutions. These pages can help you understand benefits, what you can do with the technology, and how it works, with links to additional resources.

For education and training specific to Netscout products and solutions, please visit our Support and Services page.

In-depth guides and blogs written by talented network and security experts.

Learn About Cybersecurity

Cybersecurity fundamentals and modern techniques for safeguarding and defending electronic data from cyberattacks.

Learn About Network Monitoring

Key information on getting full network visibility to finally see and understand your entire network

Learn About DDoS Attacks

In a distributed denial-of-service (DDoS) attack, a network of computers work in tandem to overflow an access point and prevent legitimate users from accessing a service.

Learn About Mobile Network Monitoring and 5G

Understanding mobile network technologies to monitor and manage your entire network.

F-L

What is Low Impact?

The loss of confidentiality, integrity, or availability could be expected to have a limited adverse impact on the services of the entity, meaning, for example: limited degradation in service delivery impacting efficiency or effectiveness; minor damage to assets or limited financial loss; or minor harm to individuals.

What is LTE?

LTE (Long Term Evolution) is a standard for wireless communication of high-speed data for mobile phones and data terminals that is often referred to as "4G." Service providers that offered CDMA2000 or GSM /UMTS networks generally use the LTE standard as the upgrade from those earlier, third-generation (3G) standards for faster service.

M-R

What is Malicious Code?

Software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. A virus, worm, Trojan horse, or other code-based entity that infects a host. Spyware and some forms of adware are also examples of malicious code.

What is Malware?

A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system or of otherwise annoying or disrupting the victim.

What is the Management Network?

A separate network strictly designed for security software management.

What is the Management Server?

A centralized device that receives information from sensors or agents and manages them.

Cybersecurity Awareness Month

Every October, the NETSCOUT team promotes the conversation around Cybersecurity Awareness Month. We share resources and expertise on how everyone, from end users to service providers, can improve their cyber literacy, keep up with the newest technologies, and join the industry.

Learn how to stay safe online with our helpful resources.

Cybersecurity Awareness Month

More questions? Talk to an expert.