Quickly learn the definitions and functions of key networking technologies, and how Netscout incorporates these technologies into products and solutions. These pages can help you understand benefits, what you can do with the technology, and how it works, with links to additional resources.

For education and training specific to Netscout products and solutions, please visit our Support and Services page.

In-depth guides and blogs written by talented network and security experts.

Learn About Cybersecurity

Cybersecurity fundamentals and modern techniques for safeguarding and defending electronic data from cyberattacks.

Learn About Network Monitoring

Key information on getting full network visibility to finally see and understand your entire network

Learn About DDoS Attacks

In a distributed denial-of-service (DDoS) attack, a network of computers work in tandem to overflow an access point and prevent legitimate users from accessing a service.

Learn About Mobile Network Monitoring and 5G

Understanding mobile network technologies to monitor and manage your entire network.

M-R

What is Network Security?

Network security is the practice of protecting computer systems, networks, and data from unauthorized access, damage, or theft. As compared to endpoint security which monitors behavior on the hosts/devices connected to the network (e.g. PCs, file servers, etc.), network security monitors network traffic to look for cyber threats. Effective network...

Network security is the practice of protecting computer systems, networks, and data from unauthorized access, damage, or theft. As compared to endpoint security which monitors behavior on the hosts/devices connected to the network (e.g. PCs, file servers, etc.), network security monitors network traffic to look for cyber threats. Effective network security requires a layered approach, combining multiple security technologies, policies, and practices to create a robust defense against evolving cyber threats.

What is Network Access Control?

A feature provided by some firewalls that allow access based on a user’s credentials and the results of health checks performed on the telework client device.

What is the Network Behavior Analysis System?

An intrusion detection and prevention system that examines network traffic to identify and stop threats that generate unusual traffic flows.

What is Network Security Stack?

The term ‘Security Stack’ is used to help visualize the many different cyber security tools (many times depicted in layers) that an organization uses to protect themselves from cyber threats. More specifically the ‘Network Security Stack’ are those cyber security tools which are network attached and conducting some sort of network traffic/packet...

The term ‘Security Stack’ is used to help visualize the many different cyber security tools (many times depicted in layers) that an organization uses to protect themselves from cyber threats. More specifically the ‘Network Security Stack’ are those cyber security tools which are network attached and conducting some sort of network traffic/packet analysis to detect and block threats. These could include a wide range of tools including firewalls (FW/NGFW), network intrusion prevention/detection systems (NIPS/NIDS), security information and event management systems (SIEM), secure web gateways (SWG), threat intelligence feeds/platforms, security analytics solutions and advanced malware analysis platforms. Examples in the market today of companies who provide technologies for this layer are Palo Alto Networks, FireEye, Cisco, among others.

NETSCOUT Arbor Edge Defense is part of the network security stack.

What is Network Slicing?

The logical partition of a network utilizing virtual resources that enables a service provider to provision a “network” with specific attributes (such as ultra-low latency and/or ultra-high bandwidth, or high density of devices) that can better serve a specific application, customer, or class of IoT devices and services. The ability to see and...

The logical partition of a network utilizing virtual resources that enables a service provider to provision a “network” with specific attributes (such as ultra-low latency and/or ultra-high bandwidth, or high density of devices) that can better serve a specific application, customer, or class of IoT devices and services. The ability to see and monitor these virtual network slices to assure quality of service will be indispensable for network operations teams.

5G network slicing allows CSPs to provide portions of their networks for each specific customer requirement, optimizing resources and network topology to meet SLA-specific requirements, such as connectivity, speed, and capacity for each given application as needed.

What is Network Tap?

A direct connection between a sensor and the physical network media itself, such as a fiber optic cable.

Cybersecurity Awareness Month

Every October, the NETSCOUT team promotes the conversation around Cybersecurity Awareness Month. We share resources and expertise on how everyone, from end users to service providers, can improve their cyber literacy, keep up with the newest technologies, and join the industry.

Learn how to stay safe online with our helpful resources.

Cybersecurity Awareness Month

More questions? Talk to an expert.