Quickly learn the definitions and functions of key networking technologies, and how Netscout incorporates these technologies into products and solutions. These pages can help you understand benefits, what you can do with the technology, and how it works, with links to additional resources.

For education and training specific to Netscout products and solutions, please visit our Support and Services page.

In-depth guides and blogs written by talented network and security experts.

Learn About Cybersecurity

Cybersecurity fundamentals and modern techniques for safeguarding and defending electronic data from cyberattacks.

Learn About Network Monitoring

Key information on getting full network visibility to finally see and understand your entire network

Learn About DDoS Attacks

In a distributed denial-of-service (DDoS) attack, a network of computers work in tandem to overflow an access point and prevent legitimate users from accessing a service.

Learn About Mobile Network Monitoring and 5G

Understanding mobile network technologies to monitor and manage your entire network.

A-B

What is a Bot?

A computer bot – which is short for robot – is a software application programmed to execute specific tasks as part of another computer program or to simulate human activity. Bots are designed to automate tasks on their own without human intervention, thus eliminating cumbersome manual processes. These tasks are often highly repetitive and...

A computer bot – which is short for robot – is a software application programmed to execute specific tasks as part of another computer program or to simulate human activity. Bots are designed to automate tasks on their own without human intervention, thus eliminating cumbersome manual processes. These tasks are often highly repetitive and predefined and can be done far more quickly, reliably and accurately than a human.

What is a Botnet?

Botnet, a term derived from "robot network," refers to an assembly of computers that malware has compromised. These infected machines, individually known as "bots," are remotely controlled by an attacker, often referred to as the "bot-herder." This network of bots can launch synchronized, large-scale attacks on targeted systems or networks. Given...

Botnet, a term derived from "robot network," refers to an assembly of computers that malware has compromised. These infected machines, individually known as "bots," are remotely controlled by an attacker, often referred to as the "bot-herder." This network of bots can launch synchronized, large-scale attacks on targeted systems or networks. Given that a botnet can incorporate millions of bots, the bot-herder has the capacity to execute substantial and highly impactful criminal operations.

Bot-herders typically control the botnet remotely through a command-and-control server. This allows them to steal personal data and passwords, propagate spam messages, or launch other types of attacks, such as DDoS attacks, taking maximum advantage of the computing and bandwidth resources made available through the botnet.

What is a Breach?

A security breach is any incident that results in unauthorized access of data, applications, services, networks and/or devices by bypassing their underlying security mechanisms. A security breach occurs when an individual or an application illegitimately enters a private, confidential or unauthorized logical IT perimeter.

What is BSC?

BSC (Base Station Controller) is the part of a mobile telephone network that handles allocation of radio channels, receives measurements from mobile phones, controls handovers from one base transceiver station (BTS) to another, and stores database information for all sites.

What is Business Impact Analysis?

An analysis of an information system’s requirements, functions, and interdependencies used to characterize system contingency requirements and priorities in the event of a significant disruption.

What is Business Interruption?

Any event, whether anticipated (i.e., public service strike) or unanticipated (i.e., blackout) which disrupts the normal course of business operations.

Cybersecurity Awareness Month

Every October, the NETSCOUT team promotes the conversation around Cybersecurity Awareness Month. We share resources and expertise on how everyone, from end users to service providers, can improve their cyber literacy, keep up with the newest technologies, and join the industry.

Learn how to stay safe online with our helpful resources.

Cybersecurity Awareness Month

More questions? Talk to an expert.