Quickly learn the definitions and functions of key networking technologies, and how Netscout incorporates these technologies into products and solutions. These pages can help you understand benefits, what you can do with the technology, and how it works, with links to additional resources.
For education and training specific to Netscout products and solutions, please visit our Support and Services page.
In-depth guides and blogs written by talented network and security experts.
Learn About Cybersecurity
Cybersecurity fundamentals and modern techniques for safeguarding and defending electronic data from cyberattacks.
Learn About Network Monitoring
Key information on getting full network visibility to finally see and understand your entire network
Learn About DDoS Attacks
In a distributed denial-of-service (DDoS) attack, a network of computers work in tandem to overflow an access point and prevent legitimate users from accessing a service.
Learn About Mobile Network Monitoring and 5G
Understanding mobile network technologies to monitor and manage your entire network.
What is a Content Delivery Network (CDN)?
What is a Cyber Attack?
What is a Domain Name System (DNS)?
What is a Hacker?
What is an Application Layer DDoS Attack?
Application layer DDoS attacks are designed to attack the application itself, focusing on specific vulnerabilities or issues, resulting in the application not being able to deliver content to the user. Application layer DDoS attacks are designed to attack specific applications, the most common is web servers, but can include any application such SIP voice services and BGP.
What is an Extortion DDoS Attack?
A DDoS extortion attack, also known as a ransom DDoS (RDDoS) attack, occurs when cybercriminals threaten individuals or organizations with a DDoS incursion unless an extortion demand is paid. These demands call for payment in cryptocurrency in order to avoid traceability by law enforcement authorities. DDoS extortion/RDDoS attacks should not be confused with ransomware attacks, in which malicious software encrypts an organization’s systems and databases, preventing legitimate owners and users from accessing them until the ransom is paid.
Cybersecurity Awareness Month
Every October, the NETSCOUT team promotes the conversation around Cybersecurity Awareness Month. We share resources and expertise on how everyone, from end users to service providers, can improve their cyber literacy, keep up with the newest technologies, and join the industry.
Learn how to stay safe online with our helpful resources.