Quickly learn the definitions and functions of key networking technologies, and how Netscout incorporates these technologies into products and solutions. These pages can help you understand benefits, what you can do with the technology, and how it works, with links to additional resources.

For education and training specific to Netscout products and solutions, please visit our Support and Services page.

In-depth guides and blogs written by talented network and security experts.

Learn About Cybersecurity

Cybersecurity fundamentals and modern techniques for safeguarding and defending electronic data from cyberattacks.

Learn About Network Monitoring

Key information on getting full network visibility to finally see and understand your entire network

Learn About DDoS Attacks

In a distributed denial-of-service (DDoS) attack, a network of computers work in tandem to overflow an access point and prevent legitimate users from accessing a service.

Learn About Mobile Network Monitoring and 5G

Understanding mobile network technologies to monitor and manage your entire network.

A-B

What is ATLAS Security Engineering Response Team (ASERT)?

Arbor Security Engineering Response Team consisting of expert researchers and engineers charged with discovering and analyzing emerging threats and targeted campaigns.

What is an Attack Signature?

A characteristic byte pattern used in malicious code or an indicator, or set of indicators, that allows the identification of malicious network activities.

What is Authorization?

Access privileges granted to a user, program, or process or the act of granting those privileges.

What is Availability?

The most important aspect of information security, which focuses on maintaining the accessibility and resiliency of systems, applications, data, and infrastructure elements to authorized users in the face of attack. DDoS attacks are intended to have an adverse impact on availability.

What is Beamforming?

New millimeter-wave 5G radios and edge computing combine to deliver ultra-low latency, high bandwidth, and reliability. A 5G cell site is about the size of a large suitcase and can be more easily installed compared with 4G/LTE. Although the reach of 5G radios is not as far as 4G, being able to concentrate on a smaller area without wasting resources...

New millimeter-wave 5G radios and edge computing combine to deliver ultra-low latency, high bandwidth, and reliability. A 5G cell site is about the size of a large suitcase and can be more easily installed compared with 4G/LTE.

Although the reach of 5G radios is not as far as 4G, being able to concentrate on a smaller area without wasting resources on an unused field can lead to more-efficient deployments. This 5G capability is called beamforming—the ability to concentrate bandwidth over a focused area such as a pop-up hospital, allowing health care workers to quickly adapt, monitor, and change treatments for patients.

What is Blacklist?

A list of email senders who have previously sent span to a user.

Cybersecurity Awareness Month

Every October, the NETSCOUT team promotes the conversation around Cybersecurity Awareness Month. We share resources and expertise on how everyone, from end users to service providers, can improve their cyber literacy, keep up with the newest technologies, and join the industry.

Learn how to stay safe online with our helpful resources.

Cybersecurity Awareness Month

More questions? Talk to an expert.