Quickly learn the definitions and functions of key networking technologies, and how Netscout incorporates these technologies into products and solutions. These pages can help you understand benefits, what you can do with the technology, and how it works, with links to additional resources.

For education and training specific to Netscout products and solutions, please visit our Support and Services page.

In-depth guides and blogs written by talented network and security experts.

Learn About Cybersecurity

Cybersecurity fundamentals and modern techniques for safeguarding and defending electronic data from cyberattacks.

Learn About Network Monitoring

Key information on getting full network visibility to finally see and understand your entire network

Learn About DDoS Attacks

In a distributed denial-of-service (DDoS) attack, a network of computers work in tandem to overflow an access point and prevent legitimate users from accessing a service.

Learn About Mobile Network Monitoring and 5G

Understanding mobile network technologies to monitor and manage your entire network.

M-R

What is MEC?

Multi Access Edge Compute (MEC) allows communication service providers (CSPs) to host content closer to the edge or the network versus in the central cloud network to ensure reliability and rapid response of services.

What is Metadata?

Specific data types (Service Type, Action Event, Source IP Address, etc.) created by the parsers which are counted and itemized in the captured data. A detailed list of metadata for each parser may be found in the Netscout nGeniusONE.

What is a Mimicked User Browsing DDoS Attack?

A Mimicked User Browsing DDoS attack involves botnets that pose as legitimate users attempting to access a website. A sufficiently high volume of these bots will ultimately overwhelm the target website causing it to crash, or making it impossible for legitimate traffic to get through. The common motive behind such DDoS attacks may be financial or...

A Mimicked User Browsing DDoS attack involves botnets that pose as legitimate users attempting to access a website. A sufficiently high volume of these bots will ultimately overwhelm the target website causing it to crash, or making it impossible for legitimate traffic to get through. The common motive behind such DDoS attacks may be financial or political.

What is Mitigate?

To lessen in force or intensity. To mitigate vulnerability is to take actions that reduce the vulnerability’s impact or exposure.

What is Mitigation?

To lessen in force or intensity. To mitigate vulnerability is to take actions that reduce the vulnerability’s impact or exposure.

What is MiTM?

Man-in-the-middle – a type of attack where the attacker can intercept, monitor, and potentially change data in transit.

Cybersecurity Awareness Month

Every October, the NETSCOUT team promotes the conversation around Cybersecurity Awareness Month. We share resources and expertise on how everyone, from end users to service providers, can improve their cyber literacy, keep up with the newest technologies, and join the industry.

Learn how to stay safe online with our helpful resources.

Cybersecurity Awareness Month

More questions? Talk to an expert.