NETSCOUT en Wed, 07 Dec 2022 09:00:00 -0500 Mastodon Stampede Decentralized social media platforms bring back old problems. Wed, 07 Dec 2022 09:00:00 -0500 Robert Picard Needles, Haystacks, and Performance Management for Manufacturers Finding network problems without performance management is like looking for needles in multiple haystacks. Tue, 06 Dec 2022 08:00:00 -0500 Anthony Cote How 5G Is Poised to Deliver Game-changing Enterprise Connectivity 5G is the foundation of connectivity for enterprises driven by a multilayered convergence of technology, business drivers, and market needs. Mon, 05 Dec 2022 09:00:00 -0500 Agnes Mends-Crentsil Adaptive DDoS Suppression for a Safer, More Resilient Internet Adaptive DDoS defenses can nullify even large-scale attacks before they reach a critical mass. Fri, 02 Dec 2022 09:00:00 -0500 NETSCOUT The Importance of Timely Connections: In Airports and in Your Network NETSCOUT performance management solutions help major airports ensure operations run smoothly—so holiday travelers can get to where they need to be. Thu, 01 Dec 2022 08:00:00 -0500 Brooke Jameson TCP Floods Are Again the Leading DDoS Attack Vector The evolution of DDoS is forcing network managers to rethink DDoS defenses. Wed, 30 Nov 2022 08:00:00 -0500 MIke Wetherbee Utilizing NETSCOUT Deep Packet Inspection Technology to Enrich AWS Security Logs Data Lake, Built in the Customer’s Account NETSCOUT is the launch partner of new the AWS announcement, Amazon Security Lake. Tue, 29 Nov 2022 14:30:00 -0500 NETSCOUT Overcoming the Barriers to Digital Transformation Digital transformation and the role packet intelligence plays. Mon, 28 Nov 2022 13:00:00 -0500 Robert Derby It Takes Two to Tango: Performance Monitoring for Your Applications and Network APM and NPM solutions are critically important for monitoring networks and applications. Tue, 22 Nov 2022 08:00:00 -0500 NETSCOUT The Unrelenting Rise of Botnets The new world of scalable botnets is leading to new types of security threats. Mon, 21 Nov 2022 08:00:00 -0500 NETSCOUT Security Product Integration Is Key to Stopping Unwanted Threats Security tool coordination is key to prevent malicious attacks from spreading. Thu, 17 Nov 2022 08:00:00 -0500 Erik Hjelmstad NETSCOUT a Platinum Sponsor at AWS re:Invent NETSCOUT continues to collaborate with AWS to provide first-of-its-kind network traffic visibility. Wed, 16 Nov 2022 12:15:00 -0500 Michael Segal Cyber Reflection Attackers use DDoS in response in sociopolitical events worldwide. Tue, 15 Nov 2022 10:00:00 -0500 NETSCOUT No Delays for the Holidays This holiday season, travelers are counting on airlines to get them to where they need to be. With NETSCOUT solutions, airlines can ensure peak network and application performance. Mon, 14 Nov 2022 10:30:00 -0500 Brooke Jameson Adverse Trendsetter DDoS activity in APAC reveals several unfortunate trends in the first half of 2022. Thu, 10 Nov 2022 08:00:00 -0500 NETSCOUT Performance, Protection, and Products Move Utilities to Private LTE P-LTE technology delivers the connectivity, bandwidth, and latency utilities need to manage their electrical networks with current and at least midterm application requirements. Wed, 09 Nov 2022 08:00:00 -0500 John English IDC Spotlight: Performance Monitoring of the Network Edge To assure performance and quality user experience, enterprises need to extend visibility, exert control, and enhance their digital services with scalable monitoring of the network edge. Tue, 08 Nov 2022 10:40:00 -0500 Eileen Haggerty Spend Less, Shop More, and Optimize the Online Store Retailers are offering massive incentives to entice stingy shoppers this holiday season—and with excess inventory cluttering the shelves, they can’t afford network and application downtime. Mon, 07 Nov 2022 10:30:00 -0500 Brooke Jameson Cybersecurity in the U.S. 2022 Midterm Elections Cybersecurity in the U.S. 2022 Midterm Elections Thu, 03 Nov 2022 09:00:00 -0400 NETSCOUT Pharmaceutical Leaders Under the Microscope Pharmaceutical leaders must take a closer look at their own approach to ensuring network connectivity and peak application performance. Wed, 02 Nov 2022 08:00:00 -0400 Brooke Jameson Parallel Battlegrounds Cyberattacker behavior in EMEA reflects sociopolitical upheaval across battle lines. Tue, 01 Nov 2022 11:00:00 -0400 NETSCOUT Prevention or Detection: Which Is More Important for Defending Your Network? It would be great if we could prevent all attacks on our networks. We know this isn’t possible, so detecting and investigating attacks is vitally important for defending them. Fri, 28 Oct 2022 08:00:00 -0400 Erik Hjelmstad Frost & Sullivan Names NETSCOUT 2022 Global Company of the Year NETSCOUT earns top award as Best Practices Leader in the global wireless network monitoring and service assurance industry. Thu, 27 Oct 2022 10:00:00 -0400 Agnes Mends-Crentsil Inspiring Interns: Guardians of the Connected World Internships are the stepping stones of a career path filled with growth and exposure to one’s desired field. For more than 10 years, NETSCOUT’s internship program has provided hundreds of college and graduate students with full-time paid work experience on their journey toward success. We are proud to have hosted more... Tue, 25 Oct 2022 13:30:00 -0400 NETSCOUT Current DDoS Attack Trends and Best Defenses The only thing that can prevent DDoS success is a well-designed network with intelligent DDoS mitigation systems. For many organizations, common myths can lead to poor choices and overconfidence when it comes to properly architecting a solution. Mon, 24 Oct 2022 13:45:00 -0400 Tricia Collins Rethinking DDoS Defenses The evolution of DDoS is forcing network managers to rethink DDoS defenses. Fri, 21 Oct 2022 08:00:00 -0400 Tricia Collins Is Network Slicing the Next Generation of Revenue Streaming? 5G network slicing provides ROI and new revenue streams for CSPs Thu, 20 Oct 2022 11:50:00 -0400 Lauren Womack An Ounce of Prevention Is Worth a Pound of Cure Proactive performance management with NETSCOUT nGenius solutions helps hospital stay ahead of application disruptions. Wed, 19 Oct 2022 12:15:00 -0400 Eileen Haggerty Comparably Recognizes NETSCOUT as Top Workplace NETSCOUT named top workplace for employee compensation and work-life balance. Tue, 18 Oct 2022 08:00:00 -0400 Beth Kirsch Back to Normal at SCTE! NETSCOUT enjoyed a bustling conference at SCTE, with lots of customer interest in our service assurance, advanced analytics, and security solutions. Mon, 17 Oct 2022 14:00:00 -0400 John English 5 Reasons to Protect the Performance and Security of Your Pharmaceutical Business Pharmaceutical companies: take a closer look at security measures and network and application performance management strategies. Thu, 13 Oct 2022 11:45:00 -0400 Brooke Jameson Show Me the Money Growth in DDoS attacks parallels increased digital banking options in LATAM. Wed, 12 Oct 2022 08:00:00 -0400 NETSCOUT Is the 5G Standalone Network Too Cloudy to See? Swisscom, working with Ericsson and NETSCOUT, has developed the first-ever network visibility solution for a cloudified 5G standalone network. Tue, 11 Oct 2022 11:00:00 -0400 John English Adversaries Take Aim at North American Cloud Service Providers Direct-path TCP-based DDoS attacks dominated North American cloud service providers in the first half of 2022. Elementary and secondary schools made the top 10 list of targets. Mon, 10 Oct 2022 12:20:00 -0400 NETSCOUT Inspiring Interns: Guardians of the Connected World NETSCOUT hosted more than 35 interns in the U.S. this past summer. Read the second in a series of blogs about their journeys. Fri, 07 Oct 2022 13:15:00 -0400 NETSCOUT You’re on ‘Mute’: Monitoring UCaaS Performance For innovative pharmaceutical leaders, reliable network connectivity is critical for maintaining uninterrupted communication Thu, 06 Oct 2022 08:00:00 -0400 Brooke Jameson Why Is It Important to Keep Software Up to Date? Ensure optimal security by keeping your software up to date. Wed, 05 Oct 2022 08:00:00 -0400 Office of the CISO How to Recognize and Report Phishing Learn how to recognize and report phishing with guidance from NETSCOUT’s Office of the CISO. Tue, 04 Oct 2022 08:00:00 -0400 Office of the CISO Why Should You Use Strong Passwords? Create strong passwords to get the most security bang for your buck. Fri, 30 Sep 2022 10:20:00 -0400 Office of the CISO Keep Your Accounts Secure with Multifactor Authentication Get multifactor authentication (MFA) recommendations to keep your account secure. Thu, 29 Sep 2022 09:45:00 -0400 Office of the CISO Avoiding the Network Naughty List Network monitoring is critical for retailers to ensure a seamless buyer’s experience in today’s digital marketplace. Wed, 28 Sep 2022 12:10:00 -0400 Brooke Jameson DDoS Threat Intelligence Report Reveals Troubling Attacker Behavior in 1H 2022 The latest DDoS Threat Intelligence Report examines trends and techniques from the first half of 2022 including DDoS innovations, adaptive campaigns, botnets, and the DDoS battleground in addition to regional analysis. Thu, 22 Sep 2022 12:15:00 -0400 NETSCOUT 5-Star Review and a 360° View Retailers expanding their operations know that good digital customer experiences on the front end go hand in hand with clear network visibility on the back end. Wed, 21 Sep 2022 08:00:00 -0400 Brooke Jameson The Secret to Successful 5G Standalone Service Migration 5G standalone in the cloud will require an effective service assurance monitoring strategy. Tue, 20 Sep 2022 08:00:00 -0400 Richard Fulwiler Revamped Threat Report Reflects Data Analysis, Formatting Improvements NETSCOUT’s 1H 2022 DDoS Threat Intelligence Report is on its way this month, complete with new data-analysis and formatting improvements. Thu, 15 Sep 2022 12:00:00 -0400 NETSCOUT 5G and Beyond: The Challenging Road to 6G Assuring the next generation of wireless will require a high degree of automation. Wed, 14 Sep 2022 10:40:00 -0400 Agnes Mends-Crentsil Is It Time to Rethink Your Network and Application Performance Management Strategy? Reasons to rethink your organization’s network and application performance management strategy Tue, 13 Sep 2022 08:00:00 -0400 Eileen Haggerty Inspiring Interns: Guardians of the Connected World NETSCOUT hosted more than 35 interns in the U.S. this past summer. Read the first in a series of blogs about their journeys. Fri, 09 Sep 2022 14:00:00 -0400 NETSCOUT Retailers Agree: Quality Is Key Retailers can agree that quality is the lynchpin of successful ecommerce operations. Assuring peak performance is critical for maintaining high-caliber shopping experiences for every buyer. Thu, 08 Sep 2022 12:00:00 -0400 Brooke Jameson Availability, Performance, and Security, Oh My! Improve visibility for your health care digital transformations and avoid performance and availability nightmares. Thu, 01 Sep 2022 12:15:00 -0400 Eileen Haggerty 5G is the New Reality—and Network Assurance Automation Is the New Necessity As CSPs continue to modernize and build out their networks to meet consumer demands for 5G services, they must also consider and modernize their network assurance strategies. Automation is key. Wed, 31 Aug 2022 09:00:00 -0400 Lauren Womack Decryption Is Key for Enhanced Security and Monitoring In Part 1 of my series on Transport Layer Security (TLS) decryption, I went over a few basics of encryption, discussed TLS 1.2, and concluded with the improvements that TLS 1.3 provided. In Part 2, I discussed TLS decryption in TLS versions 1.2 and 1.3. In this final installment of the series, I discuss why TLS is... Tue, 30 Aug 2022 12:30:00 -0400 Erik Hjelmstad Improve Your Network Security Posture with Deep Packet Inspection Deep packet inspection (DPI) provides the most meaningful content possible in network threat detection and response. Learn how. Mon, 29 Aug 2022 16:00:00 -0400 Robert Derby Why Pharma Leaders Rx-cited about Smart Edge Monitoring Pharmaceutical companies must proactively address visibility issues to facilitate swift collaboration and productivity in their field. Wed, 24 Aug 2022 09:00:00 -0400 Brooke Jameson 5G and IoT: Fueling Smart Cities Smart cities will have to deliver superior quality of service and experiences. Scalable monitoring is crucial. Tue, 23 Aug 2022 10:30:00 -0400 Agnes Mends-Crentsil Catching Up with the CARDBoard Project and DIA NETSCOUT funds local nonprofits with $30K to help close the digital divide in North Texas. Wed, 17 Aug 2022 12:45:00 -0400 Lauren Womack On the Road to Cloud-Native: Telco Operators’ Cloud Journey As telcos continue on their cloud journey, service assurance will need to be more predictive. Tue, 16 Aug 2022 09:45:00 -0400 Agnes Mends-Crentsil Assuring Digital Transformation Success for Banks Closing service-edge blind spots can help assure migration of financial applications to third-party private clouds. Mon, 15 Aug 2022 19:00:00 -0400 Eileen Haggerty The Great Transition Manage the transition to 5G Standalone cloudified network with maximum visibility for service assurance and maintain security in the cloud. Wed, 10 Aug 2022 09:30:00 -0400 John English Detect and Mitigate DDoS Attacks with NETSCOUT Arbor Insight Arbor Insight helps service providers with advanced network visibility for rapidly and effectively detecting and mitigating DDoS attacks. Tue, 09 Aug 2022 09:00:00 -0400 Andrew Green NETSCOUT Participates in VMware Explore 2022 Event NETSCOUT is participating in VMware Explore 2022, offering several opportunities to learn more about our tight technology partnership. Mon, 08 Aug 2022 10:00:00 -0400 Eileen Haggerty Visibility Helps Government Agency Achieve Success with Co-Lo Migration Use NETSCOUT visibility to fill the visibility gaps that come with migrating applications to co-locations. Fri, 05 Aug 2022 10:00:00 -0400 Eileen Haggerty Decryption Is Key for Enhanced Security and Monitoring TLS encryption makes networks more secure, but sometimes it is necessary to decrypt network traffic. NETSCOUT’s nGenius Decryption Appliance can do this, but exactly how does it work? Thu, 04 Aug 2022 13:00:00 -0400 Erik Hjelmstad Beware of Application-Layer Attacks Why DDoS actors are zeroing in on the application layer Wed, 03 Aug 2022 09:00:00 -0400 Gary Sockrider Private 5G Networks: No One Size Fits All Private 5G networks introduce complexities with multiple potential deployment scenarios, including multivendor solutions and the potential for partnerships. Tue, 02 Aug 2022 14:30:00 -0400 Steve Craycraft 5G Orchestration: A New Revenue Source for Mobile Operators 5G orchestration offers a quicker path to profit by automating specifically targeted services. Thu, 28 Jul 2022 11:45:00 -0400 Agnes Mends-Crentsil Want to Stage a Cyberattack? Anyone can attack with DDoS-for-hire services that offer free trials. Wed, 27 Jul 2022 09:00:00 -0400 Gary Sockrider Is Your Mobile Network’s Security Always On? CSPs' mobile networks need scalable, always-on security. Tue, 26 Jul 2022 11:00:00 -0400 Lauren Womack Insurer Improves Remote Workforce Visibility with NETSCOUT Smart Edge Monitoring Digital transformations, a hybrid workforce, and increases in health insurance claims combine to create gaps in troubleshooting visibility. See how one organization improved customer service and employee productivity with NETSCOUT Smart Edge Monitoring. Mon, 25 Jul 2022 12:30:00 -0400 Eileen Haggerty NETSCOUT Awards $30K to Area Nonprofits NETSCOUT’s community grant program continues to award time and money to local charities. Thu, 21 Jul 2022 12:00:00 -0400 Lauren Womack Improving Wireless Service Is Key to Reducing MNO Fees Cable/MSOs can reduce MNO fees by implementing an effective Wi-Fi service assurance solution with automated analytics. Wed, 20 Jul 2022 09:30:00 -0400 Praveen Chandel Direct-Path Flooding Attacks Are on the Rise Direct-path DDoS attacks can evade common mitigation techniques—and they are on the rise. Tue, 19 Jul 2022 11:00:00 -0400 Gary Sockrider How to Conform Hybrid Cloud Infrastructure to Your Business Needs NETSCOUT visibility across AWS Cloud WAN and Aruba SD-WAN empowers customers to modernize IT with confidence. Fri, 15 Jul 2022 11:45:00 -0400 Michael Segal Energy Company Implements Monitoring to Assure LTE Performance High-profile major investments in digital transformations need to operate flawlessly. See how one organization is building confidence in its private LTE project with service assurance visibility from NETSCOUT. Wed, 13 Jul 2022 09:30:00 -0400 Eileen Haggerty Making a Molehill out of a Mountain SPs need an automated solution that can sift through monitoring data to identify patterns and reveal the cause of disruptions to voice services. Tue, 12 Jul 2022 09:30:00 -0400 NETSCOUT Private 5G Networks Sound Good. Are They a Good Fit for Your Business? 5 Questions to Ask When Considering 5G Mon, 11 Jul 2022 12:00:00 -0400 Lauren Womack Can You Accurately Justify a Software Purchase? Cost/benefit analysis of software purchases is becoming a hot topic. Learn the difference between TCO, ROI, and EIA assessments and when to use them. Thu, 07 Jul 2022 12:30:00 -0400 MIke Wetherbee Making Artificial Intelligence the Smartest One in the War Room Due to the complexity of CSP’s networks, intelligent automation sequences are needed to improve war room efficiency. Wed, 06 Jul 2022 09:30:00 -0400 Greg Mayo With Cyberattacks on the Rise, Advanced NDR is Imperative Advanced NDR solutions allow security teams to rapidly triage alerts and delve into deeper packet-based investigations. Tue, 05 Jul 2022 09:30:00 -0400 NETSCOUT Hospital Lowers MTTR with Visibility as a Service The value of adding VaaS. Tue, 28 Jun 2022 12:30:00 -0400 Eileen Haggerty NETSCOUT Wins Top Honor at Global Infosec Awards Cyber Defense Magazine Names NETSCOUT “Market Leader in Network Detection and Response” at Global Infosec Awards 2022. Mon, 27 Jun 2022 14:10:00 -0400 NETSCOUT Lower the Cost of Downtime from UCaaS Disruptions UC&C and UCaaS have enabled business continuity over the last two years. However, when issues emerge that disrupt communication services, employee productivity can suffer. Visibility is key to quickly determining the root cause and avoiding expensive downtime. Fri, 24 Jun 2022 11:30:00 -0400 Eileen Haggerty 5G Network Planning: It’s a Lifecycle Thing 5G has introduced many new technologies and changes for mobile networks—from RAN to core to the data center edge. Can a technology lifecycle plan help CSPs effectively navigate this complex ecosystem? Thu, 23 Jun 2022 16:30:00 -0400 Agnes Mends-Crentsil MSOs Accentuate the Positive with Wi-Fi Service Assurance Prioritizing the Wi-Fi user experience reduces costly reliance on MNO resources. Wed, 22 Jun 2022 15:15:00 -0400 Jennifer Steele High Cost of Downtime in Health Care Patient health care impact avoided as NETSCOUT identifies source of PACS latency. Thu, 16 Jun 2022 12:00:00 -0400 Eileen Haggerty Attackers Show New Affinity for Server-class Botnets High-powered servers are being leveraged to launch targeted DDoS attacks against high-value targets. Wed, 15 Jun 2022 11:00:00 -0400 NETSCOUT Is Proactive DDoS Defense Worth the Cost? Forrester study shows positive impact of investment in proactive DDoS defense. Tue, 14 Jun 2022 08:30:00 -0400 MIke Wetherbee On-Premises Defense Is Required in Comprehensive DDoS Strategy Why on-premises DDoS protection is critical for multilayered DDoS defense. Fri, 10 Jun 2022 10:00:00 -0400 MIke Wetherbee You Can’t Manage What You Can’t See To gain an accurate picture of the network, IT needs both passive and active synthetic-based monitoring. Wed, 08 Jun 2022 11:30:00 -0400 Bruce Kosbab Increased Attacks Against Computer Verticals Undermine Digital Supply Chain Hackers increasingly are targeting digital supply chains. Understand why and learn how to protect your company. Tue, 07 Jun 2022 10:00:00 -0400 NETSCOUT Optimize VDI User Experience How NETSCOUT optimizes VDI user experience by leveraging DPI at scale. Mon, 06 Jun 2022 13:30:00 -0400 Saagar Popat 5G Is Hitting Home 5G technology improves mobile connectivity and enhances service experience. Fri, 03 Jun 2022 13:00:00 -0400 John English IDC Spotlight: Digital Experience Management IDC Spotlight report on the importance of digital experience management. Thu, 02 Jun 2022 15:00:00 -0400 Eileen Haggerty Defending the DNS Infrastructure Is Critical. Here’s Why. Protecting the DNS infrastructure against DDoS attacks is critical—for service providers, enterprises, and customers. Here’s why. Tue, 31 May 2022 14:00:00 -0400 MIke Wetherbee EMA Network Management Megatrends 2022 EMA’s “Network Management Megatrends 2022” benchmarks the state of enterprise network operations. Fri, 27 May 2022 11:45:00 -0400 Eileen Haggerty How Service Providers Can Collaborate on DDoS Mitigation Across Network Boundaries NETSCOUT Arbor products help protect against DDoS attacks by enabling ISP-to-ISP and ISP-to-customer collaboration. Thu, 26 May 2022 12:00:00 -0400 MIke Wetherbee NETSCOUT Earns 2022 Intellyx Digital Innovator Award NETSCOUT is honored with an Intellyx 2022 Digital Innovator Award. Tue, 24 May 2022 11:00:00 -0400 Eileen Haggerty Security Without Compromise In an online survey conducted by independent research firm TechValidate, NETSCOUT customers said Arbor DDoS protection is best-in-class and has positively impacted day-to-day operations and their bottom line. Mon, 23 May 2022 16:00:00 -0400 MIke Wetherbee Hybrid Workforce Success Depends on Flawless UC&C Performance Pinpointing problems quickly is the key to keeping UC&C and UCaaS services up and running. Fri, 20 May 2022 13:30:00 -0400 Bruce Kosbab Decryption Is Key for Enhanced Security and Monitoring TLS encryption makes networks more secure, but sometimes it is necessary to decrypt network traffic. NETSCOUT’s nGenius Decryption Appliance can do this, but exactly how does it work? Thu, 19 May 2022 17:00:00 -0400 Erik Hjelmstad Grow Enterprise Customer Revenue and Improve Subscriber Experience with Superior RAN Data RAN data enablement improves CSP subscriber experience and offers new enterprise services. Wed, 18 May 2022 15:00:00 -0400 Lauren Womack 5G Deployments, Wireless Hotspots Are Likely Culprits for Increased Attacks Threat actors have recognized that 5G and gaming hotspots create ample opportunity for DDoS attacks against wireless operators. Fri, 13 May 2022 11:00:00 -0400 NETSCOUT Enhancing NETSCOUT Visibility Without Borders With AWS Gateway Load Balancer Endpoint as a Target The combination of vSTREAM and the ability to use GWLB as a target simplifies packet acquisition from a variety of vantage points. Thu, 12 May 2022 18:00:00 -0400 Paul Barrett New Data Center? It is undeniable that cloud adoption has been on the rise during and post-COVID-19. Applications have been moved to the cloud, and software-as-a-service (SaaS) and unified-communications-as-a-service (UCaaS) use has skyrocketed. But what has that meant for the traditional private data center? One of the authorities in... Wed, 11 May 2022 11:30:00 -0400 Eileen Haggerty Two Simple Ways to Thwart DDoS Attacks A DDoS attack is coming your way. Learn how to thwart these attacks by blocking spoofed IP addresses and controlling access to services. Thu, 05 May 2022 12:00:00 -0400 Tom Bienkowski Government Agency Successfully Migrates Applications to AWS Cloud Avoid the pitfalls that can come with migrating applications to the cloud. See how NETSCOUT helped one government agency do just that. Wed, 04 May 2022 12:00:00 -0400 Eileen Haggerty Not All NDR Is Created Equal Not all network detection and response (NDR) solutions are equal. Learn the differences between endpoint detection and response (EDR) and NDR, the advantages of advanced NDR, and the benefits of NETSCOUT technology. Tue, 03 May 2022 14:00:00 -0400 Robert Derby Breaking the Cloud Connectivity Borders for 5G in 2022 Within the agile cloud landscape, service providers will realize seamless continuity in performance between existing 4G, the new 5G networks, and beyond only if end-through-end observability measures are considered from the onset. Tue, 26 Apr 2022 11:00:00 -0400 Agnes Mends-Crentsil Getting the Most from Your VMware NSX Environment To maintain the performance of applications and services across any SDN environment, including VMware NSX, IT needs consistent, end-to-end visibility. Mon, 25 Apr 2022 11:00:00 -0400 Eileen Haggerty Enhancing Government SecOps-NetOps Collaboration with NETSCOUT Smart Data Making government intelligence smarter with NETSCOUT: A case study Thu, 21 Apr 2022 11:00:00 -0400 Tim Boutin Inside Mobile Networks Mobile networks are complex, and communications service providers (CSPs) must deal with these complexities to support new and existing technologies while assuring and protecting the connected world. Wed, 20 Apr 2022 11:00:00 -0400 Agnes Mends-Crentsil Know Your DDoS Enemy In the security field, specifically regarding DDoS activity, knowing your enemy is vital for protecting your network from attacks. That’s where actionable threat intelligence can help. Tue, 19 Apr 2022 12:30:00 -0400 MIke Wetherbee NETSCOUT Showcases Partner NPower at ENGAGE 2022 NETSCOUT and Command Shift Coalition want to double the number of women of color in tech. Mon, 18 Apr 2022 13:15:00 -0400 Lauren Womack Zero-Trust: A New Approach for Securing Your Networks and Data Organizations are rethinking their security architecture, processes, and procedures to adopt zero-trust principles based on the NIST zero-trust security framework. Smart data is integral to meeting the framework’s foundational principles. Fri, 15 Apr 2022 12:00:00 -0400 Andrew Green DDoS Extortion Takes VoIP Providers Offline Cyberattackers focused their attention on VoIP providers in 2H 2021 as they launched DDoS attacks that took down services and cost providers millions of dollars. Wed, 13 Apr 2022 14:30:00 -0400 NETSCOUT Reliance on Hybrid Cloud and Apps Leads to Gaps in Visibility The complexity of hybrid infrastructures creates blind spots. Without adequate visibility into the network and applications, IT professionals struggle to assure service availability and performance everywhere. Wed, 13 Apr 2022 12:00:00 -0400 Eileen Haggerty Deploy NDR to Modernize Your Cybersecurity Strategy The White House recently released an executive order asking companies to deploy modern security tools on their computers and devices. Here’s where enterprises should start. Tue, 12 Apr 2022 15:00:00 -0400 Andrew Green Does a Faster Network Make for Safer Food? 5G networks fuel fourth agricultural revolution, accelerate improvements to supply chain. Fri, 08 Apr 2022 14:00:00 -0400 Lauren Womack X-Ray Vision for IT The complexity of today’s infrastructures creates blind spots, highlighting the need for greater visibility to assure service availability and performance everywhere. Wed, 06 Apr 2022 14:00:00 -0400 Eileen Haggerty Geopolitical Unrest Creates Breeding Ground for Cyberattacks Regional attack trends show threat actors continuing to make use of geopolitical events to launch DDoS attacks. Fri, 01 Apr 2022 10:00:00 -0400 NETSCOUT Remote Office Visibility Assures Quality End-User Experience and Application Performance Reduce MTTR and assure application performance with NETSCOUT Smart Edge Monitoring. Thu, 31 Mar 2022 12:00:00 -0400 Eileen Haggerty Resolving IIoT Manufacturing Delays with Smart Edge Monitoring NETSCOUT Smart Edge Monitoring reduces manufacturing plant loss by providing IIoT visibility. Wed, 23 Mar 2022 11:00:00 -0400 Tim Boutin Bad Actors Innovate, Extort, and Launch 9.7 Million DDoS Attacks NETSCOUT’s latest biannual Threat Intelligence Report shows bad actors launched 9.7 million DDoS attacks in 2021. Tue, 22 Mar 2022 09:00:00 -0400 NETSCOUT Overcoming Real-World UC&C and UCaaS Challenges Gaining insights into how organizations tackle UC&C and UCaaS problems can help others overcome real-world challenges. Wed, 16 Mar 2022 14:45:00 -0400 Eileen Haggerty Communications Service Providers Face New Challenges with Hybrid Cloud Environments Technological advances such as virtualization, edge computing, and the Internet of Things (IoT), all enabled by 5G networks, has spurred digital transformations across all industries and spaces. Tue, 15 Mar 2022 13:45:00 -0400 Lauren Womack Return to the Office, but Not to the Test Lab A test lab automation solution increases efficiency and enables remote work. Although returning to the office in some form is a welcome return to normal, staying out of the test lab should be a permanent change. Thu, 10 Mar 2022 08:00:00 -0500 Tom Lynch Farewell to 3G: A Eulogy Mobile operators are shutting down the 3G network to make spectrum available for 5G. Wed, 09 Mar 2022 08:00:00 -0500 Agnes Mends-Crentsil Company Reduces MTTR from 15 Hours to 15 Minutes with NETSCOUT Smart Edge Monitoring Reduce MTTR and assure applications with NETSCOUT Smart Edge Monitoring. Tue, 08 Mar 2022 11:00:00 -0500 Eileen Haggerty NETSCOUT Statement About Ukraine All of us at NETSCOUT are closely following the tragic events unfolding in Europe after the Russian invasion of Ukraine. Like everyone else around the world, we are shocked at the horror of the needless loss of life. In accordance with U.S. and U.K. sanctions, NETSCOUT stopped all sales, support, and services to... Thu, 03 Mar 2022 13:00:00 -0500 NETSCOUT Reliance on UC&C Tools Can Be a Productivity Boon or Bust Today’s growing reliance on UC&C and UCaaS tools has been a boon to worker productivity, but disruptions to network connectivity can jeopardize those benefits and ultimately be costly. Thu, 03 Mar 2022 10:00:00 -0500 Eileen Haggerty Ensuring Cloud Migration Success Requires Visibility Without Borders Enterprises such as ENGIE IT are turning to NETSCOUT for support in migrating applications, websites, databases, and storage to AWS to improve productivity and achieve business agility and resilience. Mon, 28 Feb 2022 10:00:00 -0500 Michael Segal Brave New World: MWC 2022 Barcelona This blog provides an overview of what key themes of MWC 2022 mean for Network Operations and Engineering Fri, 25 Feb 2022 11:00:00 -0500 John English A Look Back on Some Positives from 2021 We’ve closed out 2021—and are looking forward to a brighter, better 2022. We’re also reflecting on some of the positive changes our employees were able to bring into the world through our Heart of Giving program, despite the very real challenges of the past year. Heart of Giving The NETSCOUT Heart of Giving team... Thu, 24 Feb 2022 10:00:00 -0500 Lauren Womack UC&C-related Trouble Tickets Spell Big Trouble for Business With growing reliance on UC&C and UCaaS platforms, there has been a significant increase in the number of IT help desk tickets. Visibility is key to quickly determining the root cause. Wed, 23 Feb 2022 10:00:00 -0500 Eileen Haggerty Is 5G and MEC Deployment Causing Sleepless Nights? 5G MEC deployment will continue to drive the need for advanced analytics to provide automated assurance. Tue, 22 Feb 2022 14:00:00 -0500 John English Overcoming the Top 4 Challenges That Threaten Cyber Resiliency Enterprises need a robust cybersecurity resilience strategy that ensures business continuity before, during, and after a cybersecurity incident. That means collaboration between cybersecurity teams and IT is a must. Thu, 17 Feb 2022 10:00:00 -0500 NETSCOUT NETSCOUT Launches nGeniusEDGE Server NETSCOUT has released the new nGeniusEDGE Server, a preconfigured solution for visibility and insights to ensure high-quality employee digital experience from wherever those employees work. Wed, 16 Feb 2022 10:00:00 -0500 Eileen Haggerty Is Visibility the Key to Unlocking the Cloud in Healthcare? The key to unlocking the cloud in healthcare may be gaining real-time visibility into the complex and opaque IT systems on which that industry relies. Tue, 15 Feb 2022 10:00:00 -0500 NETSCOUT Enterprise Networks Are Constantly Changing. Are You Ready? As traditional network models are replaced with flexible edge architectures, having improved network visibility is key to maintaining and securing complex systems. Mon, 14 Feb 2022 14:00:00 -0500 NETSCOUT Keeping Score at the Super Bowl with 5G Mobile operators apply advanced analytics based on visibility and smart data to monitor 5G network performance at the Super Bowl. Fri, 11 Feb 2022 09:00:00 -0500 John English 5G, Artificial Intelligence, and the Future Workplace Learn how artificial intelligence can support the 5G network in analyzing and examining data for better efficiency and accuracy. Tue, 08 Feb 2022 10:00:00 -0500 Agnes Mends-Crentsil Technologies at the Edge Create New Service Assurance Issues for Enterprises Remote work and hybrid workforces are here to stay. Technology resources closer to the client edge for more responsive, secure networks need visibility to ensure quality end-user experience. Mon, 07 Feb 2022 10:00:00 -0500 Eileen Haggerty Closing the Digital Divide Closing the digital divide worldwide will require global and local actions. Thu, 03 Feb 2022 10:00:00 -0500 John English NETSCOUT Accelerates Moving VMware-based Workloads to Azure with Confidence NETSCOUT vSTREAM and nGeniusONE help you gain visibility over your on-premises and Azure VMware Solution environments, enabling operations teams to monitor and optimize the performance of your applications. Wed, 02 Feb 2022 09:00:00 -0500 Ron Lifton Digital Learning Gets an “F” When UCaaS Fails Although UCaaS is making remote learning possible, it comes with IT challenges. The tremendous shifts and growth in collaboration services resulting from remote students and workers on these systems creates monitoring hurdles. Tue, 01 Feb 2022 10:00:00 -0500 Eileen Haggerty Making 5G a Trusted Network Part II: Devices As the IoT universe expands to smart devices that can monitor and adjust complex operations in real-time, enterprises must be ready to implement network-based protection for both inbound and outbound attacks. Fri, 28 Jan 2022 09:00:00 -0500 Agnes Mends-Crentsil Moving Resources to the Edge Calls for More Thorough Service Assurance Ensuring reliable application performance for edge networks in digital-first initiatives underpinning work from home (WFH) and other remote locations is a must for today’s enterprises, requiring a new approach for borderless visibility. Wed, 26 Jan 2022 10:00:00 -0500 Eileen Haggerty Private 4G LTE: What Happens On-Site, Stays On-Site NETSCOUT partners with Southern Linc to secure service for the carrier’s private 4G LTE network. Tue, 25 Jan 2022 10:00:00 -0500 Agnes Mends-Crentsil A Smarter Network Starts With Smarter Data Driven by imperatives around digital transformation, the typical enterprise’s network isn’t growing simply in terms of the volume of data it processes—IDC estimates the size of the global datasphere will experience a compound annual growth rate of 23% through 2025—but in complexity, as well. According to a 2020 survey... Sat, 22 Jan 2022 15:00:00 -0500 NETSCOUT Open RAN: Treasures, Opportunities, and Challenges Open RAN promises to give a flawless user experience, but challenges with vendor interoperability could be an obstacle. NETSCOUT Chief Technology Officer and Senior Vice President Bruce Kelley distills the notion of what it means to open the RAN. Thu, 20 Jan 2022 11:00:00 -0500 Agnes Mends-Crentsil Overcoming Two Challenges the Edge Creates for IT Teams See the security and service assurance challenges the edge presents when CIOs and CISOs have turned to edge computing just as cyberattackers are focused on accessing the network via edge devices. Wed, 19 Jan 2022 10:00:00 -0500 Eileen Haggerty How IoT Devices Are Impacting Edge Architecture IoT-based DDoS attacks threaten edge computing and highlight the need for intelligent, automated edge protection. Tue, 18 Jan 2022 10:00:00 -0500 NETSCOUT How a Common Network Security Technology Stack Aligns IT & Cybersecurity As cyberattacks increase in frequency and complexity, it’s vital that security and network operations teams work collaboratively and adopt a common network security technology stack. Fri, 14 Jan 2022 09:00:00 -0500 NETSCOUT NETSCOUT Enhances Network and Service Visibility with ServiceNow Integration The integration of NETSCOUT and ServiceNow increases network and service visibility for IT and Operations to assure high quality subscriber experience for employees and facilities teams. Thu, 13 Jan 2022 09:00:00 -0500 NETSCOUT Too Many UC&C and UCaaS Tools, Too Little Visibility Some would say unified communications and collaboration (UC&C) platforms and unified-communications-as-a-service (UCaaS) platforms have been absolutely imperative during these challenging times, where remote work has become a means of conducting daily business. Others have been less enthralled with this shift, but no... Wed, 12 Jan 2022 10:00:00 -0500 Eileen Haggerty How Application Layer Attacks Impact Edge Architecture As enterprises increasingly embrace the edge, cyberattackers are placing greater focus on it as well, highlighting the need for intelligent, automated edge protection. Tue, 11 Jan 2022 10:00:00 -0500 NETSCOUT NetOps and SecOps Collaborate to Identify and Remediate Vulnerabilities Learn how organizations can leverage NETSCOUT Smart Data from InfiniStreamNG appliances for both performance assurance and security protection activities. Fri, 07 Jan 2022 10:00:00 -0500 Eileen Haggerty Understanding the Visibility Challenges to Supporting Remote Work The last nearly two years saw workforce shifts drive significant security and IT updates to accommodate remote work. With the explosion of devices in use, vulnerabilities have increased, requiring visibility and planning. Thu, 06 Jan 2022 09:00:00 -0500 Eileen Haggerty Healthcare SaaS Provider Ensures Application Performance with NETSCOUT Read how NETSCOUT VaaS helped a healthcare IT company use nGeniusONE service assurance solutions to ensure quality customer experience for its SaaS applications. Wed, 05 Jan 2022 09:00:00 -0500 Eileen Haggerty Enabling NetOps-SecOps Collaboration NetSecOps: Why collaboration is needed and the power of network-derived data to reduce mean time to response (MTTR) Wed, 29 Dec 2021 10:00:00 -0500 Robert Derby How Can Organizations with Hybrid Workforces Protect User Experience? Today’s IT environments are so complex it’s difficult to determine whether problems are occurring at the client edge, network edge, or data center/cloud service edge. Smart edge monitoring will help. Tue, 28 Dec 2021 08:00:00 -0500 Tim Boutin Are You Getting the Most Bang for Your IT Buck? VaaS experts can identify opportunities for expanded use of your enterprise technology, saving you money and increasing productivity while extending the value of your technology investments. Mon, 27 Dec 2021 10:00:00 -0500 Tracy Steele Apache Log4j Vulnerability Read about the Apache Log4j/Lo4Shell timeline and a recommended strategy to solve for this vulnerability. Mon, 20 Dec 2021 11:30:00 -0500 Tom Bienkowski Not All Security Providers Are Created Equal Enterprises that work with ISO-certified security partners often see important benefits, such as fewer security breaches within their IT environment, which in turn reduces possible damage and resulting costs. Mon, 20 Dec 2021 10:00:00 -0500 NETSCOUT Why Collaboration is Needed (And Lacking) Between IT & Security Teams Enterprise network and security teams must collaborate to reduce risk to their organizations. Fri, 17 Dec 2021 10:00:00 -0500 NETSCOUT NETSCOUT Integration with AWS Security Hub Helps Improve the Corporate Security Posture in the Hybrid Cloud NETSCOUT collaborated with AWS to provide first-of-its-kind, end-through-end visibility across the hybrid cloud to efficiently mitigate security risks while decreasing operational overhead. Wed, 15 Dec 2021 10:30:00 -0500 Michael Segal NETSCOUT Unveils New UCaaS Monitoring Capabilities for Collaboration Platforms to Support IT Productivity and Improve End-User Experiences NETSCOUT has released new UCaaS monitoring capabilities for collaboration platforms including Zoom, Cisco Webex, and Microsoft Teams to support IT productivity and improve end-user experiences. Tue, 14 Dec 2021 10:00:00 -0500 Eileen Haggerty NETSCOUT Research Reveals That Issues With Unified Communications and Collaboration Tools are Responsible for Over 50% of All Helpdesk Tickets NETSCOUT has released new research that shows activity and trends of enterprise-level organizations related to their use of UC&C platforms since the onset of the COVID-19 pandemic. Mon, 13 Dec 2021 10:00:00 -0500 Eileen Haggerty NETSCOUT’s Test Optimization Group Annual Employee Potluck Benefits Make-A-Wish New Jersey NETSCOUT Test Optimization Solutions group celebrates annual tradition of donating to Make-A-Wish NJ Thu, 09 Dec 2021 13:30:00 -0500 Lauren Womack Why Cyber Resiliency Has Transitioned From A Security Initiative To A Business Strategy Cyber Resiliency is needed as Triple Extortion attacks combine with Ransomware-as-a-Service (RaaS) and DDoS to increase the odds of the extortion payment. Thu, 09 Dec 2021 12:30:00 -0500 NETSCOUT Working on the Edge: Overcoming Network Uncertainty IT professionals today are increasingly on edge. Or more precisely, they’re working on the edge. According to a recent Eclipse Foundation survey, adoption of edge computing is on the rise, with 54 percent of organizations either using or planning to use edge computing technologies within 12 months and another 30... Wed, 08 Dec 2021 10:00:00 -0500 Eileen Haggerty Ensure Performance and User Experience During Application Migrations Learn how to assure performance during application migrations. Tue, 07 Dec 2021 10:00:00 -0500 Eileen Haggerty What Are the Weak Links in the Connectivity Supply Chain—and Why Is NETSCOUT Seeing So Many More Attacks? As explained in a previous blog, “What Is the Connectivity Supply Chain, and Why Do Attackers Care?”, NETSCOUT has been tracking increased distributed denial of service (DDoS) attacks against the connectivity supply chain—the moniker we’ve given to the technologies and services that enable companies and individuals to... Fri, 03 Dec 2021 10:00:00 -0500 Tom Bienkowski Making 5G a Trusted Network NETSCOUT’s Dr. Vikram Saksena describes the key elements enterprises must consider to strengthen 5G network security. Thu, 02 Dec 2021 09:00:00 -0500 Agnes Mends-Crentsil To Cloud or Not to Cloud? That is No Longer the Question. Our world has experienced a massive shift to online work and play, which has accelerated an already-rapid adoption of cloud services. A recent Accenture study found that 92 percent of organizations already are at least somewhat in the cloud, and that as of 2020, approximately 50 percent of all corporate data was stored... Wed, 01 Dec 2021 10:00:00 -0500 Eileen Haggerty NETSCOUT Achieves AWS Migration and Modernization Competency NETSCOUT has achieved both Networking and AWS Migration and Modernization Competencies, which demonstrates unique skills in areas across industries, use cases, and workloads. Tue, 30 Nov 2021 10:00:00 -0500 Michael Segal Is IT Staff Turnover Putting Your Network in Peril? According to a recent survey, the annual rate of staff turnover among technical employees is nearly 20 percent. A VaaS provider can train your IT personnel, offering invaluable knowledge transfer. Tue, 30 Nov 2021 09:00:00 -0500 Tracy Steele Almost Everything You Ever Wanted to Know About 6G but Were Too Busy to Ask What Is 6G? Learn how it will build on the advances 5G has made in speed and capacity—and more. Thu, 18 Nov 2021 09:00:00 -0500 Lauren Womack Why 5G Networks Need Embedded Security By embedding security capabilities within the 5G mobile network, CSPs gain several benefits, including the ability to identify and mitigate threats more quickly; correlation of threats across multiple monitoring locations; gaining a complete view of endpoint behavior; and ensuring that security capabilities grow with the network as needed. Wed, 17 Nov 2021 09:00:00 -0500 NETSCOUT Say Hello to the Edge The adoption of edge computing is exploding. A recent market report predicts spending on edge computing will reach nearly $11 billion by 2026, representing an increase of 29.4 percent over a six-year period starting in 2020. A growing number of enterprises are embracing next-gen infrastructures to meet evolving needs... Tue, 16 Nov 2021 09:00:00 -0500 Eileen Haggerty You Can’t Fix What You Don’t Know VaaS managed monitoring services can help IT organizations overcome staff shortages and training issues. Mon, 15 Nov 2021 09:00:00 -0500 Eileen Haggerty 5G Expanded Services: Blessing, Threat, or Both? Next-generation mobile technologies are enabling new services to be delivered by mobile networks—and with those new services come new security threats and challenges for CSPs and their customers. Thu, 11 Nov 2021 09:00:00 -0500 NETSCOUT Shifting Work and Retail Trends: Focus on Remote Connectivity The key for comprehensive visibility is to combine packet data and synthetic test technologies for monitoring at the many edges of complex, multi-cloud environments. Wed, 10 Nov 2021 09:00:00 -0500 Eileen Haggerty What Is the Connectivity Supply Chain, and Why Do Attackers Care? Cyberattackers are waging a war against the underpinning of all interconnected devices—the connectivity supply chain. The good news is that organizations can take several steps to protect themselves. Tue, 09 Nov 2021 10:30:00 -0500 Tom Bienkowski What Do Students Learn at Hackathons? Since 1999, when the term “hackathon” was coined, exponentially increasing numbers of students and working professionals have been attending hackathons worldwide. But what is a hackathon? Simply put, the goal of a hackathon is to produce a working prototype of something—usually software or websites, but it can be any... Mon, 08 Nov 2021 13:00:00 -0500 Lauren Womack NETSCOUT Internship Program Expands to Include More Programming for Students NETSCOUT has an internship program that’s been running for more than a decade. In summer 2021, NETSCOUT introduced a pilot Intern Cohort program, expanding the formal programming for these interns. Mon, 08 Nov 2021 10:00:00 -0500 Lauren Womack Government Agency Assures User Experience with Visibility Into Judicial and Healthcare Services See how a government agency assured user experience for its constituents with visibility into its judicial document management system and web-based COVID-19 vaccination registration portal. Fri, 05 Nov 2021 10:00:00 -0400 Eileen Haggerty With Cyberattacks on the Rise, Cyber Intelligence Is a Must Unique cyber intelligence technology detects and investigates suspicious activities in real time and retrospectively, identifying threats before they spread. Thu, 04 Nov 2021 09:00:00 -0400 NETSCOUT Who’s Watching Over Your Network and Applications After Hours? As workforces have adopted work-from-home postures and reliance on network connectivity and business applications has become greater than ever, IT is under pressure to ensure systems are operating around the clock. Wed, 03 Nov 2021 10:00:00 -0400 Tracy Steele 7 Reasons Why 5G Needs Artificial Intelligence to Succeed 5G is pulling in data at a rate with which humans cannot keep up. AI promises to be the best way to leverage the information from that data and ensure smart business outcomes. Tue, 02 Nov 2021 09:00:00 -0400 Agnes Mends-Crentsil Why Firewalls Are Targets for DDoS Attacks Firewalls are targets for state exhaustion DDoS attacks. The only way to stop those attacks is to implement an intelligent DDoS mitigation solution that operates in a stateless or semi-stateless manner. Mon, 01 Nov 2021 09:00:00 -0400 Tom Bienkowski Managing Converging UCaaS Technology Transformations The key for managing multivendor UCaaS environments is NETSCOUT Visibility Without Borders and real-time, vendor-neutral voice and video analytics. Fri, 29 Oct 2021 09:00:00 -0400 Tim Boutin NETSCOUT CIO Presents at Wall Street Journal CIO Summit NETSCOUT’s CIO Thor Wallace presented “Modern IT: NETSCOUT’s Digital Transformation” at a recent Wall Street Journal CIO Summit. Thu, 28 Oct 2021 10:00:00 -0400 Lauren Womack Is IT Troubleshooting and Maintenance Sapping All Your Time? A round-the-clock proactive monitoring managed service offers IT a “hands free” way to monitor, service-triage, and gain critical data insights into business, industry, voice, video, and SaaS application performance issues. Tue, 26 Oct 2021 15:36:55 -0400 Tracy Steele Amazon VPC Routing Enhancements Allow NETSCOUT to Inspect Traffic Between Subnets in a VPC Amazon VPC routing enhancements with Amazon VPC Traffic Mirroring allows NETSCOUT to acquire traffic that traverses VPC boundaries and subnets within VPCs and route it to vSTREAM appliances for real-time analysis. Tue, 26 Oct 2021 10:00:00 -0400 Ray Krug Lessons from the Pandemic: A New Urgency for NetOps-SecOps Alignment When the pandemic pushed enterprise networks to evolve rapidly to serve increased users with increased services, security threats evolved too. NetOps and SecOps teams need to work together more effectively than ever. Mon, 25 Oct 2021 10:00:00 -0400 Lauren Womack 3 Aspects to Managing Systemic Cyber Risk Learn about the three aspects to managing systemic cyber risk that are required for the preservation of a digital ecosystem Fri, 22 Oct 2021 10:00:00 -0400 NETSCOUT 5G Demand Is Here: Is Your 5G Network Ready? 5G Technology allows communication service providers (CSPs) to deliver the fast, seamless service consumers and enterprises demand. Thu, 21 Oct 2021 10:00:00 -0400 Lauren Womack NETSCOUT Visibility as a Service Provides Turnkey Protection for Critical IT Services NETSCOUT Visibility as a Service (VaaS) is a managed service offering, which provides 24x7 testing, monitoring, troubleshooting, and reporting for customers' critical IT services and applications. Wed, 20 Oct 2021 10:00:00 -0400 Tracy Steele Cybersecurity Careers Are Exciting and Fulfilling! Cybersecurity is more important than ever, and there is a wide variety of jobs in the field. Tue, 19 Oct 2021 09:00:00 -0400 Lauren Womack Is a Career in Cybersecurity Right for You? Part one of a two-part series In honor of this week’s theme for Cybersecurity Awareness Month, Explore. Experience. Share. – Cybersecurity Career Awareness Week, we interviewed some of our Guardians about their careers in cybersecurity. See what it’s like to be a Guardian of the Connected World at NETSCOUT and why... Mon, 18 Oct 2021 11:30:00 -0400 Lauren Womack Why Are VPNs Such PrimeTargets for DDoS Attacks? Work-from-home strategies make VPNs an increasingly attractive target for DDoS attacks. The best protection is an intelligent DDoS mitigation solution that operates in a stateless or semi-stateless manner. Thu, 14 Oct 2021 09:00:00 -0400 NETSCOUT Stop a Ransomware Attack Before You Get the Note National Cybersecurity Awareness Week 2 asks us to “Fight the Phish!” Learn how to detect and block indicators of compromise (IoC) on your network. Tue, 12 Oct 2021 09:00:00 -0400 NETSCOUT NWDAF with Smart Analytics Based on Smart Data To reap the full benefits from automation and analytics, CSPs need to operate based on a single data source that is vendor-, technology-, and cloud-agnostic. NETSCOUT Smart Data and Omnis Analytics can help. Mon, 11 Oct 2021 12:30:00 -0400 NETSCOUT Threat Intelligence Plays Vital Role in Modern Cybersecurity Strategies Companies that do business on the internet or use network connections in any way, shape, or form are vulnerable to cyberattack. And let’s face it, that includes pretty much everyone these days. According to the 1H 2021 NETSCOUT Threat Intelligence Report, there were nearly 5.4 million distributed denial-of-service... Thu, 07 Oct 2021 09:00:00 -0400 NETSCOUT Maximizing ARP Funding to Strengthen IT Security and Performance in K-20 Schools Students have just returned to classrooms all over the United States in what will now be the third academic year affected by the COVID-19 pandemic. The impact on the education ecosystem unfolded in front of our eyes, with emergency purchases of devices for students to attend school remotely, tools for efficient... Wed, 06 Oct 2021 09:00:00 -0400 Eileen Haggerty 4 Things to Focus on for Cybersecurity Awareness Month With the arrival of National Cybersecurity Awareness month, now is a good time to think about the measures we should all be taking to improve our security practices. Mon, 04 Oct 2021 09:00:00 -0400 Deb Briggs How Can Healthcare Providers Protect IoT devices with Network Packet Visibility? Cyberattacks and threats against healthcare organizations increased exponentially during the COVID-19 pandemic. See how one organization implemented network packet visibility to help protect its Internet of Things (IoT) devices. Fri, 01 Oct 2021 09:00:00 -0400 Eileen Haggerty NETSCOUT and Palo Alto Networks Announce Security Solutions Integration NETSCOUT and Palo Alto Networks announce their fully integrated security solutions are now available to support security operations centers in detecting, analyzing, and mitigating security threats in complex hybrid environments. Wed, 29 Sep 2021 09:00:00 -0400 NETSCOUT Six Months of Threat Actor Innovation…. Our new infographic illustrates how the long tail of cybercrime innovation swept through the lockdown days of the COVID-19 pandemic to infiltrate the bulk of 2021. Tue, 28 Sep 2021 10:00:00 -0400 Carol Hildebrand Work-From-Home Is Likely Here to Stay—What’s Your Strategy For User Experience? IT needs to rethink monitoring strategies to identify key instrumentation vantage points and more effectively troubleshoot end-user experience and application performance issues. Mon, 27 Sep 2021 10:30:00 -0400 Eileen Haggerty 5 Steps for Improving Collaboration Between IT and Security Teams With today’s rapidly expanding threat landscape, aligning IT and security teams to build better communications and cooperation is critical. Fri, 24 Sep 2021 10:00:00 -0400 NETSCOUT Are DDoS Threats Keeping You Awake at Night? DDoS attacks will continue to increase in volume, complexity, and impact. SPs need modern DDoS threat mitigation strategies that protect the integrity of service and enhance the business. Thu, 23 Sep 2021 10:30:00 -0400 NETSCOUT Packet Data Adds Increasing Value to Next-Gen Cybersecurity A recently published report from the SANS Institute highlighted the growing value of network-derived data for enterprise cybersecurity teams tasked with protecting increasingly distributed corporate infrastructures. Wed, 22 Sep 2021 12:30:00 -0400 Steve Horneman The Long Tail of Attacker Innovation Given the unprecedented nature of the past 18 months, NETSCOUT’s ATLAS Security Engineering and Response Team (ASERT) fully expected that their “up and to the right” mantra would prove correct for the first half of 2021, as the team observed a record-setting 5.4 million attacks. And as the findings from the 1H 2021... Tue, 21 Sep 2021 09:00:00 -0400 Carol Hildebrand In a Remote Work World, UC&C Performance is a Top Priority Learn how a law firm addressed end-user experience issues with their document management application and unified communications services to protect client revenue opportunities. Mon, 20 Sep 2021 13:00:00 -0400 Eileen Haggerty (5)G Also Stands for Green! Carriers are spending billions to enable 5G services. Can they help the environment and underserved populations while generating ROI for their investments? Yes. Fri, 17 Sep 2021 10:00:00 -0400 John English NWDAF Will Be Key to 5G Network Performance. But What Is It? Learn about Network Data Analytics Function (NWDAF), a new function in the 5G core network responsible for providing network analysis information to network and application functions upon request. Thu, 16 Sep 2021 14:00:00 -0400 NETSCOUT Collaboration Makes the Cybersecurity Dream Work One thing network and security professionals can wholeheartedly agree on is that malicious attacks by bad actors are a constant threat. And defending against them isn’t simple. Attackers have access to a constantly expanding toolbox of innovative techniques—and at the same time, the growth of cloud-based services and... Wed, 15 Sep 2021 09:30:00 -0400 Tom Bienkowski Why Do IT and Cybersecurity Teams Struggle to Collaborate? The ability to meet the demands of today’s evolving work environment, while minimizing security risks, will depend on how well IT and security teams become fully aligned. Tue, 14 Sep 2021 12:30:00 -0400 Carol Hildebrand The New Network Has No Boundaries What happens when your network is no longer yours? Behind the scenes, and behind the screens, at companies large and small, your network is increasingly something that exists outside of your control. The systems that power corporate work have fundamentally changed, as existing trends toward mobile workforces, cloud... Mon, 13 Sep 2021 15:00:00 -0400 NETSCOUT Building a Healthy User Experience for Telemedicine Learn how one healthcare provider protected the performance and availability of its telemedicine application during the COVID-19 pandemic to assure a quality patient experience. Mon, 13 Sep 2021 10:00:00 -0400 Eileen Haggerty Delivering High-Performance Applications with Private 5G Networks To ensure deployments and business outcomes, enterprises must have visibility into critical private 5G service performance. Fri, 10 Sep 2021 10:30:00 -0400 NETSCOUT Four Network Security Challenges to Watch For The growing reliance on hybrid IT infrastructures that support cloud-based applications and a largely remote workforce is creating network security and performance challenges for many enterprises. According to research from a recent white paper by The Enterprise Strategy Group (ESG), 85 percent of organizations believe... Thu, 09 Sep 2021 10:00:00 -0400 Tom Bienkowski Visibility For a Multicloud World High-level overview of how Smart Edge Monitor provides a unique, valuable approach to service assurance and end-user experience monitoring in complex, multicloud environments. Wed, 08 Sep 2021 10:30:00 -0400 Eileen Haggerty Peru Under Attack A year in review: Detailed DDoS attack data for Peru Fri, 03 Sep 2021 22:00:00 -0400 Carol Hildebrand Private 5G is Here, Are You Ready? Private #5G deployments are on the rise across many industries--are they right for you? Wed, 01 Sep 2021 15:00:00 -0400 NETSCOUT It’s “Game On” With NETSCOUT Live Streaming Video Assurance The global pandemic had a commercially disastrous effect on the entertainment industry, with media coverage chronicling declines in cinema, theater, concert, and other live-event businesses worldwide. In several of these sectors, government assistance was the only lifeline keeping some businesses on autopilot until the... Tue, 31 Aug 2021 10:30:00 -0400 Tim Boutin Beating the High Cost of Manufacturing Downtime Global heavy-equipment manufacturer minimizes downtime by using NETSCOUT Smart Edge Monitoring to gain visibility into production applications used in the factory and hosted in the data center. Wed, 25 Aug 2021 10:05:08 -0400 Eileen Haggerty Digital Transformation Opens Door to Stateful DDoS Attacks State-based DDoS attacks are on the rise. Intelligent DDoS mitigation systems protect against such attacks by using a stateless network edge security stack. Wed, 25 Aug 2021 09:50:07 -0400 Tom Bienkowski Why “The Computer Is Running A Little Slow Today” In Your Healthcare’s Contact Center Learn how one healthcare group improved end-user experiences at contact centers across the organization. Mon, 23 Aug 2021 10:13:33 -0400 Tim Boutin Mexico Under Attack A year in review: Detailed DDoS attack data for Mexico Fri, 20 Aug 2021 09:00:00 -0400 Carol Hildebrand Scaling Private 5G Networks to Support Intelligent Automation Interest in private 5G networks is gaining momentum. As enterprises scale up their 5G deployments, they need pervasive network visibility to validate these models. Wed, 18 Aug 2021 14:30:00 -0400 John English State Agency Assures Quality Employee Experience with NETSCOUT Assuring a quality user experience for remote employees is key to business continuity and remote workforce success. See how one state agency is assuring quality end-user employee experience for its distributed workforce with NETSCOUT solutions. Tue, 17 Aug 2021 11:11:00 -0400 Eileen Haggerty Network Protection: It’s More Than a SecOps Imperative Only a collaborative effort of all internet community stakeholders will succeed in protecting our networks from increasing cyberthreats. Mon, 16 Aug 2021 15:30:00 -0400 NETSCOUT Colombia Under Attack A year in review: Detailed DDoS attack data for Colombia Fri, 13 Aug 2021 09:00:00 -0400 Carol Hildebrand Movin’ On Up… to the Cloud and Network Edge As rapid adoption of cloud services and expansion of the network edge put greater strains on IT, the need for network analytics solutions to improve visibility and control increases. Wed, 11 Aug 2021 09:00:00 -0400 NETSCOUT Want Your UC&C System to Live Up to Expectations? As users have become increasingly reliant on UC&C systems, the need to ensure these communications are reliable, while at the same time remaining completely secure, is paramount. Mon, 09 Aug 2021 10:00:00 -0400 NETSCOUT Chile Under Attack A year in review: Detailed DDoS attack data for Chile Fri, 06 Aug 2021 09:30:00 -0400 Carol Hildebrand How Edge Monitoring Will Support Successful 5G Rollout Smart data and a centralized view of performance from RAN to edge to core are vital for service providers as they roll out their 5G networks. Thu, 05 Aug 2021 09:00:00 -0400 John English Growing Reliance on UC&C Systems Puts IT Pros to the Test In order to manage the performance and security needs associated with complex UC&C systems, IT needs a holistic view into the interconnected broader environment. Wed, 04 Aug 2021 09:00:00 -0400 Carol Hildebrand Today’s New Business Normal Creates Threat Opportunities In the wake of COVID-19, enterprises need to develop short- and long-term strategies to counteract shifting threats to networks and applications. Tue, 03 Aug 2021 09:00:00 -0400 Carol Hildebrand Will the Tokyo Games Be a Target for Cyber Extortionists? Modern-day games such as the summer event in Tokyo require a massive digital infrastructure, from telecommunications to digital scoring and video streaming. That makes them juicy targets for cybercriminals. Mon, 02 Aug 2021 09:00:00 -0400 NETSCOUT Brazil Under Attack A year in review: Detailed DDoS attack data for Brazil Fri, 30 Jul 2021 09:00:00 -0400 Carol Hildebrand The United States Under Attack A year in review: Detailed DDoS attack data for the United States Thu, 29 Jul 2021 12:14:04 -0400 Jack Olson NETSCOUT Launches Industry-First Smart Edge Monitoring NETSCOUT has reimagined service assurance for the hybrid enterprise with NETSCOUT Smart Edge Monitoring—a new, patent-pending architecture that combines smart data analytics with synthetic transaction testing. Wed, 28 Jul 2021 09:00:00 -0400 NETSCOUT Ready Now for 5G CBRS? To prepare for deployment of 5G CBRS, cable/MSOs must have visibility into the full lifecycle of CBRS/Wi-Fi rollouts—from the network design to full operation—while maintaining network excellence. Mon, 26 Jul 2021 09:00:00 -0400 NETSCOUT United Kingdom Under Attack A year in review: Detailed DDoS attack data for the United Kingdom Fri, 23 Jul 2021 11:00:00 -0400 Carol Hildebrand Insourcing IT Operations: No Longer a Fully “In-House” Transition Managing insourced data center operations transitions with NETSCOUT service edge visibility Thu, 22 Jul 2021 09:00:00 -0400 Tim Boutin Paying It Forward NETSCOUT Guardians support each other’s career development with grassroots mentoring program. Wed, 21 Jul 2021 09:00:00 -0400 NETSCOUT Open Doesn’t Mean It’s Easy O-RAN promises best-of-breed solutions to mobile operators for TCO and service agility but brings with it the complexity of a multivendor cloudified RAN. Tue, 20 Jul 2021 09:30:00 -0400 John English The Power of ISP Collaboration for DDoS Mitigation The power of ISP collaboration for DDoS mitigation—three ways ISPs can assist customers and improve mitigation efforts. Mon, 19 Jul 2021 09:30:00 -0400 MIke Wetherbee United Arab Emirates Under Attack A year in review: Detailed DDoS attack data for United Arab Emirates Fri, 16 Jul 2021 09:30:00 -0400 Carol Hildebrand Educational Services Are Under Cyberattack. Here’s How to Get Help The widespread implementation of distance learning in response to COVID-19 has sparked a widespread increase in DDoS and ransomware attacks on educational institutions. Here’s how to protect yourself. Thu, 15 Jul 2021 11:00:00 -0400 NETSCOUT The High Cost of Cybercrime Is Getting Higher If cybercrime organizations could be publicly traded, we’d have an instant new multibillion dollar industry sector. Indeed, cyberthreats have become so pervasive that U.S. President Joe Biden recently signed an executive order aimed at improving federal cybersecurity in the wake of multiple significant cyberattacks... Tue, 13 Jul 2021 14:00:00 -0400 Carol Hildebrand Public Schools Look to Federal Funding to Offset COVID-19 Spending As remote learning strains educational tech systems nationwide, U.S. public school districts are using CARES Act dollars to improve the quality of digital services for students and teachers. Mon, 12 Jul 2021 09:00:00 -0400 Andy Sicard Spain Under Attack A year in review: Detailed DDoS attack data for Spain Fri, 09 Jul 2021 09:00:00 -0400 Carol Hildebrand It Takes Two to Tango As enterprises increasingly rely on software-defined data centers and public and private cloud architecture, it’s paramount to bring network and security teams together to meet growing security challenges. Wed, 07 Jul 2021 10:00:00 -0400 Carol Hildebrand Saudi Arabia Under Attack A year in review: Detailed DDoS attack data for Saudi Arabia Fri, 02 Jul 2021 08:30:00 -0400 Carol Hildebrand The New Challenges of Monitoring 5G Networks 5G presents enormous opportunity—along with big challenges for service providers. Learn about 5G network monitoring and performance challenges and how to solve them in a new ebook from Light Reading. Thu, 01 Jul 2021 10:30:00 -0400 Agnes Mends-Crentsil To Adapt or Not to Adapt? A successful move to a subscription-based business model hinges on your ability to get the sales team on board. Wed, 30 Jun 2021 10:00:00 -0400 Agnes Mends-Crentsil Hackathons: Fun for the Whole Family NETSCOUT dads and kids pitch in on student hackathons that help build interest in IT careers across underrepresented communities. Tue, 29 Jun 2021 10:00:00 -0400 Karen McCloskey Continuous Monitoring with NETSCOUT Omnis Cyber Investigator and AWS Security Hub Integration between NETSCOUT Omnis Cyber Investigator and AWS Security Hub enables IT teams to effectively detect, validate, investigate, and respond to cyberthreats, whether on-premises or in the cloud. Mon, 28 Jun 2021 10:00:00 -0400 NETSCOUT Jordan Under Attack A year in review: Detailed DDoS attack data for Jordan Fri, 25 Jun 2021 10:00:00 -0400 Carol Hildebrand Are You Prepared for AI Malware? Artificial intelligence has provided malware authors with a range of new opportunities. Is your organization prepared to meet the challenge as adversaries change tactics and employ new techniques? Wed, 23 Jun 2021 10:00:00 -0400 NETSCOUT Making Hackathons a Family Affair NETSCOUT dads and kids pitch in on student hackathons that help build interest in IT careers across underrepresented communities. Mon, 21 Jun 2021 10:00:00 -0400 Karen McCloskey Germany Under Attack A year in review: Detailed DDoS attack data for Germany Fri, 18 Jun 2021 10:00:00 -0400 Carol Hildebrand The Families That Hack Together NETSCOUT dads and kids pitch in on student hackathons that help build interest in IT careers across underrepresented communities. Thu, 17 Jun 2021 10:00:00 -0400 Karen McCloskey Top Three Tactics for Optimizing DDoS Resiliency Testing DDoS attacks are on the rise exponentially—in terms of both frequency and size. Protect your business by proactively testing the resilience of your systems. Wed, 16 Jun 2021 10:00:00 -0400 NETSCOUT Work-from-Home Trend Puts SaaS in the Crosshairs When remote employees report suboptimal workflow performance in SaaS services, IT must find the cause. Implementing cloud monitoring instrumentation at remote locations is one way to address the challenge. Tue, 15 Jun 2021 10:00:00 -0400 NETSCOUT Visibility Extended to Remote Medical Buildings for Protecting Healthcare Services Overview of how a healthcare company protected the performance and availability of healthcare services, as well as end-user experience for doctors, nurses, and clinicians in a newly added medical building. Mon, 14 Jun 2021 10:00:00 -0400 Eileen Haggerty France Under Attack A year in review: Detailed DDoS attack data for France Fri, 11 Jun 2021 10:00:00 -0400 Carol Hildebrand Health Care Provider Gains Critical DDoS Protection and Performance Visibility for Patient Services During COVID-19 See how a leading health care organization protected performance and availability for patient services at the DMZ of its data centers with DDoS protection outside and service assurance inside for the VPN. Wed, 09 Jun 2021 10:00:00 -0400 Eileen Haggerty ISO Certifies NETSCOUT’s Security Management Practices Third-party accreditation from the International Standards Organization confirms NETSCOUT’s security management program is comprehensive and follows leading practices to protect customers from unauthorized access or compromise. Tue, 08 Jun 2021 09:00:00 -0400 NETSCOUT Making Analytics Smarter: How Smart Data Fuels Effective Analytics When smart data is used to create smart analytics, service providers can make the most of data lakes, enabling data stakeholders to answer their troubleshooting, analytical, and executive questions. Mon, 07 Jun 2021 09:00:00 -0400 Richard Fulwiler Egypt Under Attack 2020 a year in review: Detailed DDoS attack data for Egypt Fri, 04 Jun 2021 09:00:00 -0400 Carol Hildebrand Cyberattacks Escalate, Putting Enterprises on the Defensive NETSCOUT’s 16th annual Worldwide Infrastructure Security Report (WISR) finds DDoS extortion attacks grew by a whopping 125 percent in 2020. Thu, 03 Jun 2021 10:30:00 -0400 Carol Hildebrand A year in review: Detailed DDoS attack data for Taiwan 2020 - A year in review: Detailed DDoS attack data for Taiwan Fri, 28 May 2021 10:00:00 -0400 Carol Hildebrand It’s Time to Rethink Remote-Work Quick Fixes The distributed network will soon be the backbone of service deliveries across sectors. To ensure business continuity, companies must have real-time visibility into their entire network infrastructure to plan, run, and evaluate the risks to their operations. Thu, 27 May 2021 10:00:00 -0400 NETSCOUT Triple-Extortion Tactics on the Rise for Ransomware Gangs Cybercriminals have hit the ransomware trifecta by melding file encryption, data theft, and DDoS attacks. Learn more about this growing threat. Thu, 27 May 2021 10:00:00 -0400 Carol Hildebrand Remote Working Changes Are Here to Stay—Are Your Network Vulnerabilities? DDoS attacks broke records in 2020, thanks to COVID-19, surpassing 10 million. With remote work looking to be a permanent choice for many workers, businesses must find permanent, distributed network security solutions that protect their people and their service performance. Wed, 26 May 2021 11:00:00 -0400 NETSCOUT 4 Post-Pandemic Cybersecurity Trends Cyberattackers are taking advantage of shifts in business connectivity, finding new ways to exploit security vulnerabilities. This evolving threat environment makes it necessary to increase cybersecurity vigilance. Mon, 24 May 2021 12:21:55 -0400 Tom Bienkowski A year in review: Detailed DDoS attack data for South Korea 2020 - A year in review: Detailed DDoS attack data for South Korea Fri, 21 May 2021 13:00:00 -0400 Carol Hildebrand Increased Online Reliance Opens Door to Cyberattacks In 2020, service providers managed enormous spikes in legitimate network traffic such as streaming video, video conference calls, and gaming while simultaneously defending a huge increase in DDoS attacks targeting critical network infrastructure and services. Wed, 19 May 2021 10:00:00 -0400 Carol Hildebrand Ensuring Cloud Migration Success As enterprises lift and shift applications from on-premises to public cloud platforms, it is critical that users have reliable access and high performance throughout and after the migration. Tue, 18 May 2021 10:00:00 -0400 NETSCOUT Japan Under Attack Detailed DDoS attack activity data and statistics for Japan in 2020 Fri, 14 May 2021 10:00:00 -0400 Carol Hildebrand A United Front: How NetOps and SecOps Can Improve Security Network infrastructure and security concerns are converging. As DDoS, ransomware, and malware attacks continue to proliferate, NetOps and SecOps teams need to work together to ward off cyberattacks. Thu, 13 May 2021 11:45:00 -0400 Carol Hildebrand Healthcare Sector: An Enticing Target for Cyberattackers Digital transformation in the healthcare industry has presented healthcare providers with a new set of challenges in protecting patients' records and avoiding major service disruptions. But prescrip-tions are out there. Tue, 11 May 2021 12:23:27 -0400 NETSCOUT India Under Attack 2020: A year in review: Detailed DDoS attack data for India Fri, 07 May 2021 10:00:00 -0400 Carol Hildebrand Manufacturer Brings Smart Visibility to Microsoft Azure Migration with NETSCOUT Learn how one multibillion-dollar food products manufacturer used nGeniusONE visibility and service assurance solutions before, during, and after its migration to Microsoft Azure. Wed, 05 May 2021 10:00:00 -0400 Eileen Haggerty What Is a Reflection/Amplification DDoS Attack? Like all DDoS attacks, reflection/amplification attacks are designed to overwhelm the targeted systems, causing disruption or out-and-out shutdown of services. Tue, 04 May 2021 10:00:00 -0400 NETSCOUT Is a Private 5G Network Right for Your Company? Enterprises today have a wealth of choices when it comes to implementing a 5G network. Building your own private 5G network may make sense, depending on the business requirements. Mon, 03 May 2021 10:00:00 -0400 John English Australia: DDoS Attacks Down Under A year in review: Detailed DDoS attack data for Australia Fri, 30 Apr 2021 10:00:00 -0400 Carol Hildebrand Manufacturer Assures Both Availability and Quality End-User Experience for Remote Workers Learn how one worldwide equipment manufacturer delivers quality remote-employee experience with nGeniusONE Service Assurance and Arbor Edge Defense DDoS protection solutions from NETSCOUT. Wed, 28 Apr 2021 10:00:00 -0400 Eileen Haggerty Top Ten Industries Under Attack The top 10 vertical industries under attack in the second half of 2020 further highlight the enormous impact COVID-19 had on DDoS attack activity. Tue, 27 Apr 2021 09:00:00 -0400 Carol Hildebrand Top Four Tactics for DNS Infrastructure Defense The Domain Name System (DNS) infrastructure is a critical part of your network. Learn how to defend against DDoS attacks that can bring it down. Mon, 26 Apr 2021 11:00:00 -0400 MIke Wetherbee 5G Providers: Is Vendor Harmony at Stake for Enterprises? 5G edge and enterprise 5G are game changers—but if you want to win, you’ll need to build a much deeper partnership ecosystem across enterprises, service providers, cloud providers, and system integrators. Thu, 22 Apr 2021 10:00:00 -0400 Agnes Mends-Crentsil Surging DDoS Attacks Drive Growing Demand for Third-Party Protection Services A record-breaking number of DDoS attacks in 2020 has driven a surge in demand for services from managed security service providers (MSSPs). Tue, 20 Apr 2021 08:57:18 -0400 Carol Hildebrand NETSCOUT Visibility Improves End-User Service Quality for U.S. Military Branch A branch of the U.S. government used NETSCOUT’s nGeniusPULSE for visibility into the end-user experience of hundreds of thousands of personnel in locations around the globe. Wed, 14 Apr 2021 09:00:00 -0400 Eileen Haggerty Latest NETSCOUT Threat Intelligence Report Highlights Unprecedented DDoS Attack Activity As the latest Threat Intelligence Report shows, the COVID-19 pandemic was the clear catalyst for this year’s unprecedented DDoS attack activity. Vital pandemic industries such as ecommerce, streaming services, online learning, and healthcare all experienced increased attention from malicious actors targeting the very online services essential to remote work and online life. Tue, 13 Apr 2021 10:00:00 -0400 Carol Hildebrand Staying Ahead of Shifting ISP Security and Visibility Needs When it comes to traffic visibility and DDoS defense, ISPs need a secure and service-optimized architecture that balances performance, security, cost, revenue, and customer experience. Mon, 12 Apr 2021 09:00:00 -0400 NETSCOUT ENGAGE 21 Security Summit Kicks Off on April 20 Mark your calendars for NETSCOUT’s free ENGAGE Security Summit on Tuesday, April 20-21, 2021. Thu, 08 Apr 2021 11:00:00 -0400 NETSCOUT ENGAGE 21 Changes the Game ENGAGE 21, NETSCOUT’s annual technology and user summit, will once again go virtual with an agenda designed to help companies overcome challenges, and thrive in today’s connected world. Wed, 07 Apr 2021 10:00:00 -0400 NETSCOUT NETSCOUT to Partner with Dell Technologies OEM Solutions NETSCOUT today announced a collaboration with Dell Technologies OEM Solutions to deliver solutions designed for medium-to-large-sized enterprises looking for agile, cost-efficient solutions to address their data center and digital transformation needs Tue, 06 Apr 2021 10:00:00 -0400 NETSCOUT Make It Smarter: 5G Networks in the City As cities get smarter, their networks will evolve to support the growing need for pervasive wireless technologies, open data, and trusted security. Visualize how a smart city powered by 5G could look through this dynamic infographic from NETSCOUT. Mon, 05 Apr 2021 11:00:00 -0400 Agnes Mends-Crentsil Cybersecurity in a Remote Work World Pandemic-driven work-from-home policies are likely to persist well into 2021, and for many, remote work will become a permanent change for a growing portion of the global workforce. That massive shift has triggered significant activity across the global threat landscape, as adversaries pounced on vulnerabilities... Wed, 31 Mar 2021 13:00:00 -0400 NETSCOUT To Pay or Not to Pay—That Is the Ransomware Question Ransomware attacks are on the rise. Today’s attackers are highly sophisticated, using techniques and encryption that is virtually unbreakable. But paying the ransom is a bad idea. Tue, 30 Mar 2021 11:00:00 -0400 Carol Hildebrand End-User Service Quality Improves with NETSCOUT Visibility Learn how an insurance company used NETSCOUT’s nGeniusONE to help improve call quality for customers during enrollment time. Mon, 29 Mar 2021 11:00:00 -0400 Eileen Haggerty Is Your VPN Gateway Vulnerable to DDoS Attacks? VPN gateways are a crucial link for business performance, which makes them a ripe target. Taking steps to protect these gateways is prudent. Tue, 23 Mar 2021 12:30:00 -0400 NETSCOUT Building a Cybersecurity Strategy for the COVID-19 Vaccine The emergence of effective COVID-19 vaccines represents an extraordinary scientific achievement—as well as a global challenge when it comes to the logistics involved in getting needles into arms. And bad actors are paying attention. Always fans of the opportunistic pivot, cybercriminals know that if it’s important to us, it’s an opportunity for them. Mon, 22 Mar 2021 10:31:14 -0400 NETSCOUT Overcoming the Challenges of Cloud Migration Microservice applications are fast becoming an IT preference because of the increased agility and scalability they offer. And with rising adoption, more and more organizations are migrating these microservice applications to the public cloud. According to the DevPro Journal, the global cloud microservice market is... Wed, 17 Mar 2021 10:00:00 -0400 NETSCOUT Healthcare Organization Resolves DICOM Access Issue Thanks to nGeniusONE Service Assurance See how a leading healthcare provider used its NETSCOUT nGeniusONE Service Assurance solution to triage and diagnose the cause of access issues to the DICOM imaging service for a recently acquired hospital. Mon, 15 Mar 2021 10:00:00 -0400 Eileen Haggerty How to Get the Most from Hybrid Cloud A recent Forbes article from NETSCOUT CTO Bruce Kelley explains why successful hybrid cloud strategies start by putting the user experience front and center. Thu, 11 Mar 2021 11:00:00 -0500 Bruce Kelley AWS Expands Support for Virtual Private Cloud Traffic Mirroring, Enhancing NETSCOUT Visibility AWS Expands Support for Virtual Private Cloud Traffic Mirroring Enhancing NETSCOUT Visibility Wed, 10 Mar 2021 09:00:00 -0500 Bruce Kelley Healthcare IT on Call: Dealing with Overburdened Systems Lack of visibility across the healthcare IT infrastructure hinders IT’s ability to measure the performance of the network and services. End-through-end visibility is key to identifying issues or disruptions. Mon, 08 Mar 2021 10:00:00 -0500 NETSCOUT Financial Services Company Assures Services to Customers and Employees During Data Center Transformation See how a financial technology and stock exchange organization used its nGeniusONE Service Assurance solution to gain visibility into its data center transformation to Cisco ACI and AWS Cloud. Tue, 02 Mar 2021 09:00:00 -0500 Eileen Haggerty Remote Work: A Wake-up Call for Digital Infrastructure Regardless of the technologies deployed, organizations must provide a single, unified management and security control plane that supports the changing needs of remote workers without sacrificing the user experience. Mon, 01 Mar 2021 15:00:00 -0500 NETSCOUT For Many, Remote Work Is Here to Stay. Can IT Deliver on User Expectations? Although a large percentage of the global workforce today is working remotely, the future of this trend is uncertain. One thing that is certain is the need to assure end-user experience. Wed, 24 Feb 2021 11:00:16 -0500 Eileen Haggerty Demo: Blocking Ransomware and DDoS Extortion Attacks A comprehensive cyberattack solution requires the kind of first-line (inbound) and last-line (outbound) protection NETSCOUT Arbor Edge Defense provides. Learn more in this video. Tue, 23 Feb 2021 11:00:00 -0500 NETSCOUT 5G and Visibility: There Is No Plan B! Operators must be able to easily monitor their 5G networks and understand their unique characteristics to assure continuous performance and innovate in a 5G world. Mon, 22 Feb 2021 11:00:00 -0500 Agnes Mends-Crentsil How do you respond to a DDoS Extortion Attack? As ransom DDoS attack threats become more prevalent, organizations must take concrete steps to mitigate the risk. Wed, 17 Feb 2021 11:30:00 -0500 NETSCOUT COVID Pandemic Highlights 5G Benefits As COVID-19 dramatically changed the way we live and work, 5G’s advances have shone even more brightly. In some ways, 5G has been the technology we needed to help cope with this pandemic and its aftermath. Tue, 16 Feb 2021 13:30:00 -0500 NETSCOUT Avoiding Our Own IT Stock Market Crash In this world of connected, autonomous systems, we need pervasive observability to understand interdependencies, identify emerging anomalous behavior, and retain control. Wed, 10 Feb 2021 10:00:00 -0500 Paul Barrett The Genie Is Out of the Bottle: Business Continuity in a Locked-Down World At the start of 2020, when the word corona was associated primarily with astronomy or alcoholic beverages, digital transformation within the financial services sector was already well underway—driven by, among other things, the need for mobile app provision, the rise of open banking, and the move to hybrid cloud... Tue, 09 Feb 2021 10:00:00 -0500 Darren Anstee Does Automation Really Eliminate Human Error? Automated systems may behave exactly as requested—but that doesn’t mean the results are error-free. Here’s why maintaining a high level of observability is critical for avoiding the possibly catastrophic consequences of coding errors in the systems themselves. Mon, 08 Feb 2021 11:00:00 -0500 Paul Barrett What Is a DDoS Extortion Attack? Also known as ransom DDoS (RDDoS) attacks, DDoS extortion attacks occur when cybercriminals threaten individuals or organizations with a DDoS incursion unless an extortion demand is paid. These demands call for payment in cryptocurrency in order to avoid traceability by law enforcement authorities. Wed, 03 Feb 2021 10:30:00 -0500 Carol Hildebrand Aon’s Successful Journey to Global Network Visibility See how Aon, a global professional services firm, used NETSCOUT nGeniusONE service assurance to ensure recent data center and unified communications transformations met the quality-of-service levels its clients expect. Wed, 27 Jan 2021 10:00:00 -0500 Eileen Haggerty Service Provider DDoS Attacks Are on the Rise DDoS attacks represent a clear and present danger to service provider networks and services. Industry intelligence is key for keeping up with and staying ahead of perpetrators. Mon, 25 Jan 2021 11:00:00 -0500 Tom Bienkowski Preparing for the Next Wave of 5G/IoT Innovation Bruce Kelley, Senior Vice President and Chief Technology Officer of NETSCOUT discusses 5G innovation with Stephanie Chang, Global Editorial Director, The Trust, Wall Street Journal. Wed, 20 Jan 2021 13:30:00 -0500 Agnes Mends-Crentsil What to Watch in 2021 The technologies vital to the world increasingly are being attacked, making vigilance and state-of-the-art security tools essential to protect against incursions. Tue, 19 Jan 2021 10:00:00 -0500 Carol Hildebrand Smart Visibility: The Key to 5G Innovation Smart visibility enables CSPs to gain better control and make better decisions. The insights gained can allow carriers to innovate with confidence and maximize opportunities. Fri, 15 Jan 2021 14:00:00 -0500 Heather Broughton Healthcare Organization Pinpoints Access Issue for Oncology Application Learn how a healthcare organization used their nGeniusONE service assurance solution to troubleshoot and identify the source of a problem impacting their oncology information system application. Thu, 14 Jan 2021 10:00:00 -0500 Eileen Haggerty Making Complex Simple: How to Deliver Exceptional User Experience to Remote Workers Digital business models are predicated on two expectations: Simple and easy. But while your customers and workforce expect simplicity, any IT professional can tell you that delivering on those expectations is incredibly complex. Fri, 18 Dec 2020 12:40:43 -0500 NETSCOUT Threat Actors Target Remote Learning During COVID-19 The widespread implementation of distance learning in response to COVID-19 has also sparked a widespread increase in DDoS and ransomware attacks on educational institutions. Here’s how to protect yourself Thu, 17 Dec 2020 14:00:00 -0500 NETSCOUT NETSCOUT Introduces Cybersecurity Forensics for AWS Cloud Workloads NETSCOUT introduces cybersecurity forensics for AWS cloud workloads, offering packet-based threat hunting and incident response in AWS Wed, 16 Dec 2020 10:00:00 -0500 NETSCOUT Protecting Healthcare in Pandemic Times Becker’s Hospital Review talks to two NETSCOUT experts about the challenges and safety measures for healthcare IT systems to protect application performance and avoid DDoS attacks. Tue, 15 Dec 2020 11:30:00 -0500 NETSCOUT Moving Beyond COVID: How CSPs Can Prepare for the Next Normal Learn how NETSCOUT Smart Data and smart analytics can provide vital insights to address today’s problems and tomorrow’s opportunities. Mon, 14 Dec 2020 14:00:00 -0500 John English The Increasing Need for Orchestrated Mitigation of Complex DDoS Attacks Protecting services and customers from the quick-hitting but complex multivector DDoS attacks of today’s threat landscape require an orchestrate mitigation strategy built to match these challenges. Wed, 09 Dec 2020 15:00:00 -0500 Tom Bienkowski Service Providers: Are You Cloud Confident? Learn the key benefits of cloud native environments during this exciting transition for communication service providers. Mon, 07 Dec 2020 14:00:00 -0500 Lori Angelot NETSCOUT Real-Time Monitoring of VoIP Performance over SD-WAN Critical to Project Success Leading manufacturer calls on NETSCOUT virtual visibility solution to ensure SD-WAN conversion for expanded remote-office network. Thu, 03 Dec 2020 10:00:00 -0500 Tim Boutin Survey Pinpoints Key UC&C Issues Affecting Remote Worker Productivity The vital link between UC&C performance and worker productivity was highlighted in a recent NETSCOUT-sponsored survey of 300 I.T. decision-makers. Wed, 02 Dec 2020 08:00:00 -0500 NETSCOUT Hospital Adds New Visibility to Assure Cerner EMR and VoIP Learn how one healthcare organization improved the performance and availability of their critical Cerner electronic medical records (EMR) application and voice services using NETSCOUT solutions. Tue, 24 Nov 2020 09:00:00 -0500 Eileen Haggerty TrueCall Is Ready for Its 5G Closeup Learn how NETSCOUT’s TrueCall can close gap coverage and provide spectral analysis for improved 5G RAN success. Mon, 23 Nov 2020 09:00:00 -0500 John English Omdia Ranks NETSCOUT #1 in DDoS Prevention Appliance Market According to global research company Omdia, NETSCOUT is the top-ranked vendor in the DDoS Prevention Appliance Market, with 22 percent market share Fri, 20 Nov 2020 10:00:00 -0500 Tom Bienkowski AWS – NETSCOUT Alliance Helps Enterprises Migrate to AWS with Confidence Learn how NETSCOUT’s collaboration with AWS enables enterprises to migrate to the cloud with complete confidence. Thu, 19 Nov 2020 10:00:00 -0500 Michael Segal 5 Things You Didn’t know About DDoS Attacks—That Can Cost You As organizations consider the steps needed to mitigate the risk from DDoS attacks and maintain resilience and availability, they should keep five key areas in mind. Wed, 18 Nov 2020 09:00:00 -0500 Tom Bienkowski Something Wicked This Way Comes The NETSCOUT Security Operations Center (SOC) team shares observations from mitigating the global Lazarus Bear Armada (LBA) campaign of Distributed Denial of Service (DDoS) extortion that began in mid-August Wed, 11 Nov 2020 08:00:00 -0500 Carol Hildebrand AWS Gateway Load Balancer Enhances NETSCOUT Visibility in AWS With continuous innovation during the last few years, cloud migration is moving from the early adoption stage to mainstream use. As more and more enterprises develop their cloud migration plans, we feel Amazon Web Services (AWS) is the logical choice because of its global footprint and reputation for excellence. Of... Tue, 10 Nov 2020 11:00:00 -0500 Bruce Kelley Smart Analytics: Assuring Continuity on the Journey to 5G As service providers embark on their complex journey to 5G, there is a growing need for smart analytics to inform how strategies should be shaped. Mon, 09 Nov 2020 10:00:00 -0500 Heather Broughton NETSCOUT Will Extend Its Visibility Without Borders into IBM Cloud for Telecommunications Carrier service providers (CSPs) are rapidly moving to cloud platforms to realize digital transformation goals and innovate with technologies such as 5G, 5G Enterprise, virtualization, business analytics, and the Internet of Things (IoT). By using platforms that optimize their ability to deploy capabilities such as... Thu, 05 Nov 2020 08:00:00 -0500 Bruce Kelley Biotech Company Accelerates Rollout of New Data Center Architecture A biotech company with thousands of global employees had adopted SaaS for several business application services. However, IT was finding gaps in the visibility and control necessary for assuring end-user experience. Wed, 04 Nov 2020 14:00:00 -0500 Eileen Haggerty Smart Visibility Helps Carriers Keep Services Running and Networks Safe Having smart visibility is key to the successful implementation of new technology and new services as well as assuring and securing the ongoing delivery of existing services. Tue, 03 Nov 2020 10:00:00 -0500 NETSCOUT Four Reasons Why Wire Data Insights Help Citrix VDI Performance Learn how third-party tools help Citrix admins need to clear visibility roadblocks between IT silos. Mon, 02 Nov 2020 09:00:00 -0500 Babak Roushanaee Five Similarities Between DDoS Extortion and Ransomware Attacks — and One Big Difference Malicious threat actors are using Trickbot malware to target hospitals and healthcare providers, often leading to ransomware attacks, data theft, and the disruption of healthcare services. That campaign is not alone, however. The global Lazarus Bear Armada (LBA) DDoS extortion campaign that began in September has also expanded to include healthcare providers. Thu, 29 Oct 2020 13:03:08 -0400 Carol Hildebrand Financial Services Company Improves User Experience While Planning Digital Transformation A large financial services company with recent digital transformations in its data center, virtualization capabilities, and cloud infrastructure needed a way to pinpoint end-user performance issues with Citrix and voice services. Thu, 29 Oct 2020 10:00:00 -0400 Eileen Haggerty The Importance of Regular DDoS Testing Distributed denial of service (DDoS) attacks are nothing new, but the methods, volume, and intensity of those attacks are ever-evolving. Organizations must periodically test their DDoS defense capabilities to protect against attacks. Mon, 26 Oct 2020 15:00:00 -0400 Carlos Morales Cyber Threat Alliance’s Michael Daniel on Election Security NETSCOUT’s Hardik Modi discusses election security with Michael Daniel, former cybersecurity advisor for the Obama administration and CEO of the Cyber Threat Alliance. Thu, 22 Oct 2020 21:00:00 -0400 Carol Hildebrand Optimizing Performance and Availability of Microsoft Teams Collaboration Services: Visibility Is Key Learn how NETSCOUT provides visibility for optimizing performance and availability of the widely deployed Microsoft Teams collaboration services. Tue, 20 Oct 2020 14:00:00 -0400 Eileen Haggerty Here’s How DDoS Attackers Exploited a Pandemic A new Threat Intelligence Report infographic connects the dots to show just how motivated attackers exploit global pandemic vulnerabilities Mon, 19 Oct 2020 10:00:00 -0400 NETSCOUT U.S. Medical Center Improves Healthcare Delivery and Critical Application Performance with NETSCOUT U.S. medical center improves healthcare delivery and critical application performance with NETSCOUT, helping it to navigate through additional patient care and R&D challenges that surfaced as a result of COVID-19. Thu, 15 Oct 2020 14:00:00 -0400 Tim Boutin Is Your VPN Up to the Task? With so many people working from home, company VPNs are often strained and performance-compromised. The need for effective monitoring is greater than ever. Wed, 14 Oct 2020 14:00:00 -0400 NETSCOUT Visibility for Optimizing Performance and Availability of Zoom Collaboration Services Learn how NETSCOUT provides visibility for optimizing performance and availability of the increasingly popular Zoom collaboration services. Wed, 07 Oct 2020 09:00:00 -0400 Eileen Haggerty Healthy Connectivity: The Key to Telehealth and Telemedicine Now more than ever, effective network monitoring is the key to ensuring quality and reliability for telehealth and telemedicine. Mon, 05 Oct 2020 10:00:00 -0400 Steve Horneman Manufacturer Ensures End-User Experience with ISP Services and AWS Cloud A global manufacturer, using an ISP hosting environment and AWS Cloud, needed to protect the quality of experience for their key business applications for employees at headquarters, plants and home offices. Thu, 01 Oct 2020 10:30:00 -0400 Eileen Haggerty Visibility Into Healthcare’s Voice and Epic Services Helps Improve Quality A top-ranked, academic health center needed to assure quality performance of their Voice Services and their Epic electronical records application and turned to NETSCOUT. Wed, 30 Sep 2020 09:00:00 -0400 Eileen Haggerty Latest NETSCOUT Threat Intelligence Report Shows How Cybercriminals Exploit a Pandemic The latest threat intelligence trends and research on global DDoS attacks activity from NETSCOUT’s ASERT team. Tue, 29 Sep 2020 09:00:00 -0400 NETSCOUT Logistics Company Staves Off DDoS Attacks, Ensuring Delivery Global transportation and logistics company staves off DDoS attacks by using a single, provider-agnostic service from NETSCOUT. Thu, 24 Sep 2020 10:30:00 -0400 MIke Wetherbee Top Ten Industries Under Attack NETSCOUT's upcoming 1H 2020 Threat Intelligence Report digs into top attack targets across vertical industries. Tue, 22 Sep 2020 10:30:00 -0400 NETSCOUT Evolution’s the Watchword for 5G in Financial Services When it comes to 5G and the financial services or retail banking industries, the operative word is evolution. By adding innovation to existing progress, 5G offers the financial industry the opportunity to accelerate innovation in a mobile-centric business model. Thu, 17 Sep 2020 21:00:00 -0400 Agnes Mends-Crentsil Optimizing Application Performance for a Multicloud World As a certified Advanced VMware Technology Alliance Partner, NETSCOUT has extended its leading visibility and troubleshooting analytics platform to the NSX environment. Tue, 15 Sep 2020 09:00:00 -0400 NETSCOUT How a Financial Services Company Accelerated Cloud Migration with Actionable Visibility Learn how a leading financial services company gained much needed visibility into applications running on its complex hybrid cloud infrastructure, including proactively monitoring and troubleshooting application performance in VMware Cloud on AWS. Fri, 11 Sep 2020 09:00:00 -0400 Michael Segal Is the U.S. Vote Vulnerable to DDoS Attacks? DDoS attacks are potentially threatening our election system. Mitigating those risks is vital to our nation and the health of our democracy. Wed, 09 Sep 2020 09:00:00 -0400 Carol Hildebrand Bank Thwarts Merciless DDoS Attack Multinational bank thwarts merciless DDoS attach using mitigation solutions and expertise from NETSCOUT. Tue, 01 Sep 2020 08:30:00 -0400 NETSCOUT How One Bank Delivered Flawless User Experience Over VPN A major US-based bank with 70 million customers faced IT challenges when it had to transition employees into a home-based workforce at the peak of the COVID-19 pandemic. Tue, 25 Aug 2020 16:48:11 -0400 Eileen Haggerty 5G Has its Head in the Cloud Find out how NETSCOUT Smart Data can provide the visibility needed to achieve 5G cloud success. Mon, 24 Aug 2020 10:00:00 -0400 Bruce Kelley Hospital Assures Performance and Availability Across ISP Circuits A major US-based children’s hospital assured flawless application performance and IoT device security during several data center transformations. Thu, 20 Aug 2020 12:44:29 -0400 Eileen Haggerty Why Targeted Decryption Increases Network Visibility Encryption is a requirement to send and receive data over the Internet. Learn about the types of traffic typically decrypted, and why. Mon, 17 Aug 2020 10:30:00 -0400 NETSCOUT Healthcare Organization Improves Telemedicine End-User Experience for Medical Staff and Patients NETSCOUT helps a major healthcare organization improve the telemedicine experience for employees and patients. Thu, 13 Aug 2020 09:00:00 -0400 Eileen Haggerty NETSCOUT Student Hackathon goes Global with a Virtual Event Facing the COVID-19 pandemic, NETSCOUT volunteers across the globe pulled together a hugely successful virtual hackathon. Mon, 10 Aug 2020 16:19:16 -0400 Karen McCloskey International IP Transit Provider Boosts Revenue with Enhanced Network Visibility An IP transit provider gained much-needed visibility into customer traffic using NETSCOUT visibility solutions, helping to drive investments in additional capacity and ensuring an optimized customer experience. Wed, 05 Aug 2020 09:00:00 -0400 MIke Wetherbee Achieving 5G Readiness: One Size Does Not Fit All Regardless whether taking a 5G standalone or non-standalone approach, CSPs will need multipurpose, high-fidelity, real-time visibility across all layers of the network. Mon, 03 Aug 2020 09:00:00 -0400 NETSCOUT Leading CCaaS Provider Leverages nGeniusONE for Service Delivery Quality NETSCOUT visibility supports end user experience with Contact Center as a Service deployments Tue, 28 Jul 2020 14:39:38 -0400 Tim Boutin Keeping Elections Safe from Cyberattack Technology plays a huge role in suppressing votes, and distributed denial of service (DDoS) attacks pose a real threat. Here is how to prepare. Mon, 27 Jul 2020 09:00:00 -0400 MIke Wetherbee Service Provider in Western Europe Helps Customers Protect Their VPN Even as Network Traffic Explodes A large service provider protects VPN security concerns by using a NETSCOUT multilayer approach to threat management and mitigation. Wed, 22 Jul 2020 08:00:00 -0400 MIke Wetherbee 5G: Healthcare’s Next Big Breakthrough In a recent Forbes article, Bruce Kelley, CTO and SVP of NETSCOUT, Service Provider, outlines some important ways that 5G networks will revolutionize healthcare. Mon, 20 Jul 2020 09:00:00 -0400 Bruce Kelley Government Agency Resolves VPN Performance Issues with NETSCOUT Visibility A government agency leveraged NETSCOUT visibility to resolve slow VPN performance issues and ensure quality performance for its many employees working from home during the COVID-19 pandemic. Wed, 15 Jul 2020 08:00:00 -0400 Eileen Haggerty Why Radio Frequency Propagation Modeling Matters in a 5G World With careful 5G network planning, communications service providers have unique opportunities to optimize CapEx while fulfilling requirements for low-band, new midband, and millimeter wave spectrums. Tue, 14 Jul 2020 09:00:00 -0400 Agnes Mends-Crentsil Leading Financial Institution Assures Remote Banking Operations for Customers Learn how NETSCOUT Service Dashboard views were used to provide real-time analysis of Citrix traffic flows to improve VDI performance, enhance end-user experience, and assure customer service delivery. Wed, 08 Jul 2020 10:00:00 -0400 Tim Boutin At-Home Workers Depend on Your VPN Services. Are They Reliable? As employees have shifted to working from home, IT is under pressure to ensure they have access to VPN services and the business applications they need to do their jobs. Mon, 06 Jul 2020 10:00:00 -0400 NETSCOUT Delivering Virtual Desktop Interface Service that Delights Users Pandemic work-at-home activity elevated the virtual desktop interface (VDI) as a crucial technology. Learn what VDI is, what the challenges are, and how to provide seamless VDI connections. Wed, 01 Jul 2020 09:00:00 -0400 Babak Roushanaee NETSCOUT-Oracle collaboration Helps IT Deliver Services at the Speed of Digital Business NETSCOUT’s vSTREAM™ and virtual nGeniusONE® are now available from the Oracle Cloud Marketplace, offering Oracle Cloud customers best-in-class application visibility and the ability to leverage authentic information contained in application and network traffic for real-time telemetry. Mon, 29 Jun 2020 08:00:00 -0400 NETSCOUT Are You Vulnerable to a DDoS Attack? DDoS attacks have skyrocketed during the COVID-19 pandemic. Remaining vigilant and prepared to defend against cyberthreats is absolutely vital. NETSCOUT’S free Cyber Threat Horizon portal can help. Mon, 22 Jun 2020 09:30:00 -0400 NETSCOUT Why Does My Video Conference Look So Grainy? With more and more people working from home, video conferencing is on the rise. Poor video quality can render these collaboration tools useless, however. Here’s how to overcome the issues. Mon, 15 Jun 2020 11:00:00 -0400 Ray Krug School’s Offline Online learning has been a big area of technology investment for educational institutions, which highlights something that we at NETSCOUT have seen: While intellectual property remains a key target, the use of DDoS attacks to threaten the availability of educational services is rife. Thu, 11 Jun 2020 11:00:00 -0400 Hardik Modi Can’t Dial Out? You’re Not Alone Many businesses provide phone connectivity via UC&C systems, whose complexity can increase the potential for problems such as dial-out failures. NETSCOUT provides tips for improving the UC&C end-user experience. Mon, 08 Jun 2020 12:30:00 -0400 Ray Krug Philanthropy for Uncertain Times NETSCOUT’s employee-driven Heart of Giving grant programs changed things up to help those affected by the COVID-19 pandemic. Thu, 04 Jun 2020 15:22:24 -0400 Karen McCloskey The Verizon Data Breach Investigations Report and easyJet By pulling data from 81 contributing organizations worldwide, the annual Verizon Data Breach Investigations Report (DBIR) not surprisingly generates some pretty comprehensive results. (NETSCOUT is one of those data providers, continuing what our ASERT research team has been doing for a long time.) So how do you get the... Tue, 26 May 2020 10:30:00 -0400 NETSCOUT What to Do When Your Call Quality Drops In today’s work-at-home environment, many employees rely on UC&C tools to maintain connectivity and conduct day-to-day operations. When those services become impaired or unavailable, business grinds to a halt. Tue, 19 May 2020 22:30:00 -0400 Ray Krug Pandemic Life Online: What Is Everybody Doing? In Part 2 of NETSCOUT’s report on global internet traffic growth related to COVID-19, we explore how VPN use, streaming video, and more has changed during the pandemic. Thu, 14 May 2020 11:45:00 -0400 Tom Bienkowski COVID-19 Network Traffic Patterns: A Worldwide Perspective from Our Customers NETSCOUT surveyed ISPs around the globe to track internet traffic growth related to COVID-19. Here’s how the world’s networks are faring. Wed, 13 May 2020 11:30:00 -0400 Tom Bienkowski Smart Data: The Key to 5G Assurance and Security For service providers, the key to overcoming 5G challenges and delivering a superior end-user experience comes down to understanding what is happening in the network. This requires extensive visibility. Mon, 11 May 2020 09:00:00 -0400 NETSCOUT NETSCOUT Security Operations Center – Tales from the Trenches The NETSCOUT Security Operations Center uses a combination of technology, expertise, process, and collaboration in fending off complex DDoS attacks. These stories of particularly challenging attacks help to emphasize the role of the experts behind the platform in delivering fast and effective mitigation to customers. Tue, 05 May 2020 18:00:00 -0400 NETSCOUT From Purpose-Built to OCP-Based Platforms Open Compute Project hardware has closed the gap between off-the-shelf and purpose-built network packet brokers. Learn about the benefits of a disaggregated approach. Wed, 29 Apr 2020 11:00:00 -0400 NETSCOUT How to Build Airtight Collaboration with Your SOC Arbor Cloud protects network and VPN infrastructure that have become mission-critical during the COVID-19 pandemic. Learn the best current practices when using Arbor Cloud. Mon, 27 Apr 2020 14:00:00 -0400 NETSCOUT 5G Analytics Session at ENGAGE 20 ENGAGE 20, NETSCOUT’s annual user conference,will provide timely insights and educational opportunities to support service provider teams in managing their current challenges while continuing to plan for the future. Fri, 24 Apr 2020 13:00:00 -0400 NETSCOUT Three Ways to Improve Customer Experience with Smart Data By Bruce Kelley, NETSCOUT senior vice president and Chief Technology Officer, Service Provider Delivering superior customer experience is the Holy Grail of nearly all service industries. According to Forbes, companies that lead in customer experience outperform laggards by nearly 80 percent, and 84 percent of companies... Thu, 23 Apr 2020 15:15:00 -0400 NETSCOUT Defending against DDoS Attacks ... Learn more at ENGAGE 20 During ENGAGE 20, NETSCOUT’s virtual user conference, participants will learn how the Arbor smart visibility portfolio can provide them with the tools they need to protect their networks. Wed, 22 Apr 2020 08:00:00 -0400 NETSCOUT Top 5 Tips for VPN Safety These days, VPN gateways are your business lifeline—here’s what we recommend to keep home-user access safely up and running Mon, 20 Apr 2020 13:00:00 -0400 Carol Hildebrand Virtual ENGAGE 20: Insights and Solutions to Help Enterprises Deliver Top Performance We have re-imagined ENGAGE 20, NETSCOUT’s annual user conference, as a virtual event. Join us to see our roadmap for the future, attend virtual boot camps, and learn from technology sessions tailored to your needs. Thu, 16 Apr 2020 15:30:00 -0400 NETSCOUT Top 5 VPN Performance Tips These days, VPN gateways are your business lifeline—here’s what we recommend to keep home user access safely up and running. Wed, 15 Apr 2020 13:00:00 -0400 Carol Hildebrand Engage 20 Goes Virtual We have re-imagined ENGAGE 20, NETSCOUT’s annual user conference, as a virtual event. Join us to see our roadmap for the future, attend virtual boot camps, learn from technology sessions tailored to your needs. Tue, 14 Apr 2020 11:45:00 -0400 NETSCOUT How to Protect VPN Availability and Ensure Business Continuity With a high number of workers remotely accessing the back-office systems that keep a business running, defending VPN endpoints is key to the availability of the critical systems necessary for businesses continuity. Mon, 13 Apr 2020 13:00:00 -0400 NETSCOUT Telemedicine Service Assurance in the Age of COVID-19 With the help of NETSCOUT, one hospital ramped up its telemedicine application to support increased demand during the COVID-19 pandemic. Thu, 09 Apr 2020 13:00:00 -0400 Eileen Haggerty Satellite Companies, ISPs Feeling the Heat from Hackers Satellite companies and ISPs must be ever vigilant and improve their security and risk posture. Wed, 08 Apr 2020 13:00:00 -0400 Carol Hildebrand Five Ideas to Make Work-From-Home Work for Everybody COVID-19 has rapidly changed not only the routine of our daily lives, but how and where we work. How do you deliver reliable, high-availability access to business applications customer-facing services when everybody is remote? Mon, 30 Mar 2020 17:00:00 -0400 Eileen Haggerty NETSCOUT’s Cyber Threat Horizon for Enhanced Business Continuity COVID-19 has changed everything, including the cyberattack landscape. That’s why NETSCOUT is offering Cyber Threat Horizon™, a free online tool that provides critical insights for those who care about DDoS attacks, network availability, and business continuity. Tue, 24 Mar 2020 13:30:00 -0400 Tom Bienkowski Digital Transformation Under Attack From cloud and IoT to increased risk to customer-facing systems, the 15th WISR survey outlines top security threats and concerns for enterprises. Mon, 23 Mar 2020 16:00:00 -0400 Carol Hildebrand Calling Government Contact Center No Longer a Taxing Experience for Residents The number of citizens filing taxes electronically has been on the rise globally since its introduction in the mid-1980s, and with good reason. Citizens like the convenience, while governments like the idea of cutting costs associated with the mandatory storage of physical tax returns. Not surprisingly, however... Thu, 19 Mar 2020 14:00:00 -0400 Eileen Haggerty Security Skills Gap Drives MSSP Growth Many service providers have carved out a niche as outsourced MSSPs. Their continued success depends on their ability to solve the skills gap and thwart attacks on their own networks Fri, 13 Mar 2020 19:00:00 -0400 Carol Hildebrand UC&C SaaS Company Puts Customer Quality First with Visibility to Cloud Solutions A growing UCaaS company makes customer quality a priority with solutions from NETSCOUT. Thu, 12 Mar 2020 18:00:00 -0400 Eileen Haggerty Manufacturer Improves Quality of Experience at Remote Sites A growing consumer manufacturer improves quality of experience for employees and users in their remote offices with solutions from NETSCOUT. Fri, 06 Mar 2020 10:00:00 -0500 Eileen Haggerty Three Tactics for UC&C Success UC&C offers companies the ability to drive productivity, streamline processes, and foster better business outcomes, making UC&C performance mission-critical. Thu, 27 Feb 2020 12:00:00 -0500 Eileen Haggerty Mobile World Congress Post-Cancellation Blues It didn’t happen at MWC 2020! Here I was, getting all excited about this year’s Mobile World Congress (MWC) and the big focus on 5G, and then the event was cancelled. “With due regard to the safe and healthy environment in Barcelona and the host country today, the GSMA has cancelled MWC Barcelona 2020 because the... Tue, 25 Feb 2020 22:30:00 -0500 John English Cybersecurity a High Priority Across Insurance Industry Strong economic growth across the global insurance industry has driven a commensurate uptick in cybersecurity spending over the past several years. According to an Ovum report, the global insurance sector is showing the strongest growth in IT spending seen in the last 36 months, and managing security, identity, and... Fri, 21 Feb 2020 14:30:00 -0500 Eileen Haggerty Top Ten Under Attack Our upcoming 2H 2019 Threat Intelligence Report digs into top attack targets across vertical industries Fri, 14 Feb 2020 17:00:00 -0500 NETSCOUT Transforming the Contact Center to Drive Business Success Unified communications and collaboration technology is transforming the contact center. But to ensure the best customer experience, companies need to deliver flawless performance across all UC&C components. Learn how packet data can deliver a holistic view into UC&C services, revealing problems impacting contact center performance. Thu, 13 Feb 2020 14:00:00 -0500 Eileen Haggerty Sightline Signaling Alert Sharing Drives Cooperative DDoS Mitigation at Internet Scale Sightline Signaling helps coordinate cooperative inter-provider mitigation of large-scale, high-impact DDoS attacks. Sightline Signaling alert sharing ensures that all the relevant information can be shared by mitigation partners, swiftly, accurately, and securely. Tue, 28 Jan 2020 11:00:00 -0500 NETSCOUT NETSCOUT’s Arbor Sightline with Sentinel Brings Intelligent DDoS Protection to the Network Edge In the digital world, business increasingly functions at the network edge, from massive Internet of Things (IoT) deployment to cloud-based networks and the breathtaking potential of 5G technology. At the same time, service providers and enterprises face a rapidly evolving cyber threat landscape that saw 4.8 million... Wed, 22 Jan 2020 11:00:00 -0500 NETSCOUT Top Three Tactics to Revamp IT Network Ops for the Digital World As digital transformation reshapes how businesses operate across today’s highly competitive global landscape, CIOs face increasing pressure to build data-driven operational practices that support enterprise goals. But traditional IT practices aren’t built for next-generation environments that sprawl across on-premises... Thu, 16 Jan 2020 14:00:00 -0500 Steve Horneman Three UC&C Trends to Watch in 2020 Our experts have found three key UC&C trends that will impact enterprises in 2020 and beyond. Wed, 08 Jan 2020 11:00:00 -0500 NETSCOUT NETSCOUT Trends 2020: Security Internet Service provider networks carry an enormous amount of traffic, so it’s not surprising that they are at the forefront of combating security threats. Our experts have pinpointed several trends to watch out for in 2020. Mon, 23 Dec 2019 14:00:00 -0500 NETSCOUT How to Get the Service You Expect from UCaaS Unified communications as a service (UCaaS) offers important cost savings for organizations that outsource these services to the cloud, but assuring the highest quality of service remains a critical objective. Wed, 18 Dec 2019 17:00:00 -0500 Ray Krug Attendee Snapshot: Total Telecom Congress Get a snapshot of one attendee’s view of Total Telecom Congress Tue, 17 Dec 2019 15:00:00 -0500 NETSCOUT NETSCOUT Extends Its Visibility Without Borders into Google Cloud with Packet Mirroring NETSCOUT harnesses Google Cloud Packet Mirroring for real-time data analysis and assure Enterprise Security and Application Performance Management in Google Cloud. Mon, 09 Dec 2019 21:00:00 -0500 NETSCOUT Turns to NETSCOUT To Ensure Application and Service Performance on AWS Hybrid Cloud selected NETSCOUT Virtual nGeniusONE™ and vSTREAM™ and Amazon Virtual Private Cloud Ingress Routing Enhancements and Traffic Mirroring to control performance and security blind spots within and between its data centers and Amazon Web Services. Wed, 04 Dec 2019 16:00:00 -0500 NETSCOUT NETSCOUT Harnesses Amazon VPC Ingress Routing Enhancements for Smart Data Intelligence NETSCOUT harnesses Amazon VPC Ingress Routing enhancements for real-time analysis for service and security assurance. Tue, 03 Dec 2019 16:30:00 -0500 Bruce Kelley The Next Big DDoS Event Is Just Around the Corner. Or Is It? It has been nearly two years since we entered the terabit attack era. When will the next big attack come, and what should we expect? Tue, 26 Nov 2019 13:30:00 -0500 Steinthor Bjarnason Innovation and Product Development Is Accelerating—On the Wrong Side Business leaders are under intense pressure to innovate—if they’re not moving forward, they’re falling behind. So it’s not surprising to find that the engine of any successful businesses today is speed. Open, virtual, and agile are the name of the game. New processes are replacing the old, driving faster innovation... Wed, 20 Nov 2019 10:52:20 -0500 Steinthor Bjarnason Was Memcached a Turning Point? In the era of Memcached and terabit attacks, we’re finally seeing a better focus on securing infrastructure, especially anything that is open to the internet. It’s about time. Mon, 18 Nov 2019 12:00:00 -0500 Steinthor Bjarnason Mirai’s Botnet Tsunami The DDoS threat landscape changed forever when the source code for the Mirai IoT botnet was released. What’s changed, what can be done about it, and how can you protect your organization? Wed, 13 Nov 2019 15:19:35 -0500 Darren Anstee 5G: Ready or Not, Here It Comes Experts at this year’s WSJPro Cybersecurity Executive Summit in London discuss the impact of 5G. Mon, 11 Nov 2019 13:00:00 -0500 David Pitlik How to Gain Visibility in Cloud Deployments—and Why It Matters With multicloud deployments on the rise, organizations face increased complexity with network performance and security. NETSCOUT solves this problem in a single pane of glass. Wed, 06 Nov 2019 09:28:56 -0500 NETSCOUT NETSCOUT SOC: Tales From the Trenches Read about how NETSCOUT’s Arbor Cloud SOC team scales to deal with today's level of threat. Tue, 05 Nov 2019 11:00:00 -0500 NETSCOUT Cybersecurity in the Fourth Industrial Revolution: Reducing Risk in Times of Rapid Change Experts at this year’s WSJPro Cybersecurity Executive Summit in London shared their thoughts and insights into the ever-present cybersecurity concerns that go hand in hand with rapid transformation efforts. Wed, 30 Oct 2019 12:00:00 -0400 NETSCOUT Visibility is Key to Service Assurance in Hybrid Environments As service providers look to deliver advanced services utilizing 5G, NFV, and edge computing, they’ll require a more holistic, end-to-end view that spans the multiple domains in which their services now live. Mon, 28 Oct 2019 13:30:00 -0400 John English NetOps, SecOps, and DevOps: Merger Material? Smart organizations are shifting from a reactive approach to one that more closely integrates teams like DevOps and NetOps with security—a strategy that balances technology innovation and risk mitigation. Thu, 24 Oct 2019 15:30:00 -0400 Carol Hildebrand Overcoming the Cloud Migration Blues Migrating to the cloud can be challenging. Smart data based on network and application traffic can solve that problem, delivering end-to-end visibility. Wed, 23 Oct 2019 10:00:00 -0400 David Pitlik Security from the Top Down: Five Steps for C–Suites Experts at this year’s WSJPro Cybersecurity Executive Summit in London discuss the impact of cybersecurity at the C-suite level. Wed, 16 Oct 2019 10:03:00 -0400 David Pitlik Can New Law Enforcement Put a Dent in the DDoS Problem? DDoS attacks are on the rise, despite increasing pressure from law-enforcement agencies around the world. Why? They’re cheap, easy, and pervasive, and the payoff can be big. Tue, 15 Oct 2019 10:00:00 -0400 NETSCOUT Worried Yet? Experts Name 7 Top Cybersecurity Concerns We asked attendee’s at this year’s WSJPro Cybersecurity Executive Summit in London about their biggest security concerns. Here’s what we heard. Wed, 09 Oct 2019 13:30:00 -0400 David Pitlik Overcoming the Challenge of Managing Multigenerational Networks Along with the new capabilities it brings to end users and machines, 5G changes how wireless networks are built and managed. Visibility without borders helps CSPs see through the generational layers. Mon, 07 Oct 2019 13:00:00 -0400 John English Cybersecurity: The Next Space Race? In the world’s race to secure cyberspace, experts identify four top priorities. Wed, 02 Oct 2019 11:00:00 -0400 David Pitlik Beyond Information Sharing: Why Governments and the Private Sector Must Partner to Combat Cybersecurity Threats Experts gathered at this year’s WSJPro Cybersecurity Executive Summit in London discuss the need for increased government-private sector collaboration for cybersecurity. Tue, 01 Oct 2019 10:00:00 -0400 David Pitlik Looking to Assure Unified Communications Quality? Visibility Is Key. Visibility is key to assuring successful unified communications. Tue, 24 Sep 2019 13:00:00 -0400 David Pitlik Overcoming 5G Challenges: It’s a Life Cycle Thing What does 5G life cycle visibility mean? It helps to look at the role service assurance plays in each of the different phases of the 5G life cycle to get a clearer picture of how end-to-end visibility can help carriers overcome the challenges they face in a 5G world. Mon, 23 Sep 2019 13:00:00 -0400 Heather Broughton 5G Is Coming. Do You Have the Visibility You Need to Assure Your Network? 5G is on its way. But do you have the tools for providing visibility to 5G, interoperation and lab testing, and monitoring and troubleshooting? Wed, 18 Sep 2019 13:00:00 -0400 John English DDoS Attacks Hit Hard in September September DDoS attacks have taken down the world’s second-largest website, a popular online game, and even the communications channels of the Hong Kong protesters—just for starters. Mon, 16 Sep 2019 11:00:00 -0400 Steinthor Bjarnason Introducing Cyber Threat Horizon Situational awareness in the connected world is understanding what threats are targeting companies like yours or companies you’re interested in (your partners, customers) so you can better protect your organization. Wed, 04 Sep 2019 11:00:00 -0400 NETSCOUT VMware and NETSCOUT Partner for Visibility Without Borders NETSCOUT vSTREAM is now available as a native solution within the VMware NSX environment, creating a virtual infrastructure that can run on any application in any cloud environment with full high-fidelity visibility and consistent security. Tue, 27 Aug 2019 15:05:09 -0400 NETSCOUT The Mainstreaming of Cybercrime NETSCOUT Threat Intelligence Report 1H 2019 reveals new findings on IoT vulnerabilities, cybercrime innovation, nation-state actors, and rising DDoS attacks Mon, 05 Aug 2019 12:00:00 -0400 Hardik Modi 5G and Beyond: Hybrid Networks are Here to Stay Monolithic and homogeneous networks are no longer capable of addressing our growing and increasingly diverse connectivity needs. Wed, 31 Jul 2019 09:28:25 -0400 NETSCOUT The Dark Side of Governments: A Growing Threat of APT Groups The use of state-sponsored APT groups is increasingly valuable tool for global covert operations. Mon, 15 Jul 2019 10:00:00 -0400 NETSCOUT Automate your way out of complexity. And benefit from it. Guest blogger Monica Paolini talks about the complexity and challenges as networks evolve to 5G and how to improve ROI on their networks. Tue, 09 Jul 2019 14:00:00 -0400 NETSCOUT DDoS Attacks Growing Ever-More Sophisticated and Efficient DDoS attacks continue to be a foundational element of the threat landscape. And as is the case with other threat vectors, DDoS tools have become increasingly commoditized. Mon, 01 Jul 2019 14:00:00 -0400 NETSCOUT DDoS Attacks, and Attackers, Continue to Evolve NETSCOUT’s 14th Worldwide Infrastructure Security Report (WISR) highlights the ongoing game of whack-a-mole between defenders and attackers. The reality is, once a new exploit is identified, it never goes away. Thu, 27 Jun 2019 10:00:00 -0400 NETSCOUT AWS Traffic Mirroring Contributes to NETSCOUT’s Smart Data Intelligence Amazon VPC traffic mirroring helps NETSCOUT to seamlessly extend our packet capturing capabilities to AWS and gain visibility without borders into applications. Tue, 25 Jun 2019 23:00:00 -0400 Russ Currie Appledore Perspective: NETSCOUT Transformed Appledore Research discusses NETSCOUT’s transformation into a diversified supplier of radio planning, subscriber analytics, and intelligent service assurance solutions to the telecommunication market. Tue, 25 Jun 2019 14:00:00 -0400 NETSCOUT ESG Perspective: NETSCOUT ENGAGE19 Explores Visibility Without Borders NETSCOUT recently held its Customer Event: ENGAGE19 in Nashville TN. There were approximately 800 attendees from over 350 companies coming to hear about the latest from NETSCOUT. Wed, 19 Jun 2019 17:00:00 -0400 NETSCOUT Digital Transformation Strategies Are Under Attack From SaaS to third-party data center and cloud services, NETSCOUT’s 14th annual Worldwide Infrastructure Security Report shows an increase in infrastructure targets as enterprises move to cloud Mon, 17 Jun 2019 09:00:00 -0400 NETSCOUT The Power of Location in Networks Without Borders Removing the borders in our communication networks allows operators to extract the value of location in ways that are not possible in today’s networks, where function is still tied to a fixed location within the network architecture. Wed, 22 May 2019 16:16:36 -0400 NETSCOUT Improving User Experience By Understanding Dropped Calls Providers measure call drops based on the failure codes received from the handset or network, but this method often leaves out crucial information. Thu, 02 May 2019 09:00:00 -0400 NETSCOUT Optimizing Application Performance and User Experience with NETSCOUT for Azure Find out about how NETSCOUT solutions seamlessly integrate with Microsoft Azure VTAP for greater insight into application and network performance. Wed, 17 Apr 2019 08:00:00 -0400 NETSCOUT Reducing Mean-time-to-Repair (MTTR) Updated for 2019 Cable providers are doing much more these days than just delivering broadcast TV channels: operators are now focused on integrating a collection of IP-based services such as voice, Internet services as well as supporting tablets and other connected devices for video-on-demand and video streaming... Mon, 08 Apr 2019 16:00:00 -0400 NETSCOUT Cloud in the Crosshairs Read the latest on global DDoS mitigation from NETSCOUT's 14th Annual Worldwide Infrastructure Security Report, a global survey of network, security, and IT decision makers across enterprise and service provider organizations. Wed, 20 Mar 2019 09:00:00 -0400 Carol Hildebrand Dawn of the Terrorbit Era NETSCOUT Threat Intelligence Report 2H 2018 Reveals New Findings on IoT Vulnerabilities, Nation State Actors, Increase in DDoS Numbers, and Attack Size. Tue, 26 Feb 2019 07:00:00 -0500 Hardik Modi 5G Checklist for Network Operations and Engineering With 5G trials underway throughout the world, are network operations and engineering teams ready to manage the rollout of 5G networks and technology? Wed, 13 Feb 2019 10:00:00 -0500 John English The Added Complexity of Cloud Visibility Today’s growing trend towards cloud adoption has opened the door to tremendous opportunities, but has also presented significant visibility challenges for IT. Mon, 11 Feb 2019 09:00:00 -0500 Michael Segal The Key to Industrial Internet of Things Transformation–Visibility! Industrial Internet of Things is dramatically changing production capabilities and efficiencies. This has led many manufacturers to view the Industrial Internet of Things (IIoT) as a game-changer because of its promise to enhance operational efficiency and help to scale up automation processes. Wed, 30 Jan 2019 09:00:00 -0500 Eileen Haggerty NETSCOUT Interview: Adam Bixler When it comes to cyber threats, enterprises face a constantly evolving threat landscape. Security expert Adam Bixler has some tips on how to effectively respond and how NETSCOUT Arbor Edge Defense can help. Tue, 29 Jan 2019 10:00:00 -0500 Carol Hildebrand Value of Virtual Probes in Closed Loop Automation Virtual Network Probes (Vprobes) will play a critical role in the future of service assurance, according to the latest from Appledore Research. Mon, 14 Jan 2019 15:00:00 -0500 NETSCOUT NETSCOUT Predicts: Security Trends for 2019 As the global cyber threat landscape continues to evolve, our security experts have a few predictions to help you plan and prioritize for security in 2019. Wed, 02 Jan 2019 17:30:00 -0500 Carol Hildebrand NETSCOUT Predicts: 5G Trends for 2019 There’s no doubt that the low latency, high bandwidth of 5G will be a game-changer in today’s rapidly transforming digital world. However, service providers need to be smart when it comes to planning and rolling out this multimillion investment. Thu, 27 Dec 2018 15:24:08 -0500 NETSCOUT The Need for Visualization in Mobile Operator Virtualization In order to stay competitive, service providers are coming to recognize the enormous potential for NFV to transform their networks, drive cost efficiencies, and empower new services. Tue, 18 Dec 2018 15:00:00 -0500 John English Achieving Service Assurance across Multi-Cloud Environments Assuring business services across changing, multi-cloud infrastructure offers businesses strategic advantages in flexibility and a better end-user experience. Tue, 11 Dec 2018 21:00:00 -0500 Eileen Haggerty A Brave New Mobile World Fueled by Smart Data & Intelligence As cellular service providers increasingly must compete in today’s brave new world of over-the-top (OTT) services and a mobile broadband explosion that features all-you-can-eat, unlimited data plans, mobile carriers can no longer operate on previous business models. Tue, 04 Dec 2018 15:30:00 -0500 John English Are You Up to the Challenge of Software Defined Networking? Today’s successful enterprise requires a ‘fast and flat’ network that can provide the business agility to quickly spin-up compute and storage resources to deliver applications wherever and whenever they are required. Yet the abstraction of storage, compute and networking, whether on premise or in the cloud, transforms the provisioning for and delivery of business services and applications. The adoption of SDN and public cloud infrastructure will change how we configure and consume business services in ways we are only beginning to realize. Tue, 27 Nov 2018 12:05:57 -0500 NETSCOUT Virtualization Needs Visibility The only truly affordable and practical way to operate a 5G network is to virtualize and automate, change network design, and increasingly manage the network and services from the edge. Mon, 26 Nov 2018 15:00:00 -0500 John English Why 5G Networks and Services Create an SD-WAN Opportunity for Service Providers 5G is a true enabler of SD-WAN because it provides high bandwidth and (ultra) low latency in locations where fixed-line networks may not be available, but to ensure the high quality experiences expected, service providers will need to be able to monitor their 5G networks to assure SD-WAN services. Mon, 19 Nov 2018 14:00:00 -0500 Heather Broughton Big Data Analytics Will Drive Better Business Insights Through E2e Network Visibility Today's operators are migrating from hardware-based networks to software-based networks, and the technologies driving this change are SDN and NFV. Migrating to a software-mediated network introduces several challenges. Operators need to make this network transformation today to address competitive web-scale disruption, exponential data traffic increases, and rising cost pressures, all while maintaining a high quality of service. Thu, 15 Nov 2018 09:00:00 -0500 NETSCOUT NETSCOUT Shines a Light on the Journey to NFV with the Latest Frost & Sullivan Award Frost & Sullivan recently chose NETSCOUT for its service provider solutions award for Visionary Innovation Leadership in the Network Data Analytics Industry. Tue, 13 Nov 2018 15:00:00 -0500 Heather Broughton Accelerating the Move to NFV and Cloud Infrastructure with Confidence NETSCOUT’s service assurance solution for virtualization helped an African mobile operator accelerate their move to NFV and Cloud infrastructure with confidence. Mon, 05 Nov 2018 09:52:46 -0500 John English Customer Profile: Xtel Communications With Arbor Sightline and Arbor Threat Mitigation System in Xtel’s environment, the network operation center is able to respond to events swiftly. Tue, 30 Oct 2018 10:00:00 -0400 Jamal Bethea Reinventing MNO Service Assurance: From Solution to Strategy As many MNOs have discovered, building an intelligent network architecture is a critical success factor to DX-driven business strategies. And to get there, it’s time to build a modern service assurance strategy capable of supporting this key business asset. Mon, 29 Oct 2018 21:00:00 -0400 John English Election Security: Making Sure Information is Accurate and Available Failing to take these challenges seriously risks ceding the narrative of accurate information to adversaries. Once that narrative is lost, it can be very hard to recover. Wed, 24 Oct 2018 15:15:00 -0400 Mike McNerney Five Things to Know About NETSCOUT Arbor Edge Defense NETSCOUT AED redefines the cyber security stack to serve as the first and last line of defense against multiple types of inbound and outbound threats. Learn more about AED and what it can do for your network. Mon, 22 Oct 2018 16:00:00 -0400 NETSCOUT Service Assurance Evolves for Hybrid Networks To deliver service agility in today's hybrid networking environment, a new level of service assurance must be included in network design principles. Mon, 22 Oct 2018 09:00:00 -0400 NETSCOUT Know your network. Extracting the benefits of virtualization To gather the knowledge they need and leverage it to optimize their networks, service providers need to change the way they run their networks, concurrently along multiple dimensions. Wed, 17 Oct 2018 09:00:00 -0400 NETSCOUT IoT Botnets: The Dark Side of Open Source Without question, open-source software has been a boon to developers everywhere. Once viewed as a kind of anarchy in the commercial software world, its early proponents have long since been vindicated, as open source gained mainstream respectability on the strength of popular platforms like Linux, Apache and Firefox... Tue, 16 Oct 2018 21:00:00 -0400 Tom Bienkowski Cloud First No More, Cloud Smarter Instead According to an article on, “The new strategy will update the Obama administration’s “Cloud First” policy, established in 2010, to better reflect where agencies and the technology are today. Seven years ago “was a time when cloud computing was still new,” Federal Chief Information Officer Suzette Kent said... Mon, 15 Oct 2018 09:00:00 -0400 Babak Roushanaee The Expansion of 5G Will Necessitate Service Assurance The promise of 5G is enticing. There’s no doubt that the low latency, high bandwidth of 5G will be a game-changer in today’s rapidly transforming digital world. However, for service providers, the challenge is in justifying the multi-billion dollars of investments in new network equipment required without sufficiently... Wed, 10 Oct 2018 09:00:00 -0400 Bruce Kelley Cybersecurity and Elections: What can be done? Elections systems are like banks, in that our faith in their security matters almost as much as the actual security itself. As we are beginning to learn, if you undermine that faith, you can do a lot of damage. One only needs to turn on cable news for a few minutes to realize that our nation’s adversaries have proven... Tue, 09 Oct 2018 21:00:00 -0400 Mike McNerney The Federal Government Wants to Cloud Smart(er) The U.S. government just issued a request for comment on its plan for cloud computing adoption across the federal government. The government says it’s time to move from Cloud First to Cloud Smart. Tue, 25 Sep 2018 12:52:51 -0400 Kevin Whalen Keeping a UK Government Digital Organisation Running When was the last time your critical services were audited for performance and security? This blog discusses a multidisciplinary approach to how this might be achieved. Efficient applications mean more productivity, more productivity leads to lower cost. Thu, 20 Sep 2018 11:43:46 -0400 Adam Woolhouse Using Smart Data for Operational Intelligence As business success increasingly hinges on how well organizations access and analyze data, it is not surprising to find companies pursuing smart data architectures that enable them to leverage data faster and more effectively. Done right, smart data helps improve customer experiences and loyalty, save money, protect... Wed, 19 Sep 2018 17:20:00 -0400 John Dix Improving Performance and Service Delivery Dominate Top Priorities in Hybrid Cloud Most companies have begun migrating workloads to the cloud. But did you know that speeding up operations, optimizing costs, and improving performance and service delivery are the top goals of IT professionals? That’s just one of several key findings of a new survey conducted by IEEE Computer Society of behalf of... Thu, 13 Sep 2018 13:49:47 -0400 NETSCOUT Entering the Terabit Era: Get Ready For Bigger DDoS Attacks According to NETSCOUT’s ATLAS Security Engineering and Response Team (ASERT), the maximum size of DDoS attacks increased 174% in the first half of 2018 over the same period in 2017. Wed, 05 Sep 2018 13:22:29 -0400 Kevin Whalen Why CDNs Don’t Solve Your DDoS Problem A false sense of security is the worst thing that can happen to your business. Large Content Delivery Networks have reached truly global size, the underlying technologies have made it possible to implement “clouds” of services, and the “cloud” now is becoming synonymous with the internet itself. Wed, 29 Aug 2018 13:15:46 -0400 Marco Gioanola Realizing the Full Value of DevOps The ultimate business promise of agile development and continuous deployment is applications that deliver stronger customer engagement and increased productivity from better enterprise services. Fri, 24 Aug 2018 17:15:36 -0400 Ron Lifton Is Your Information Close Enough to the Edge? Moving cloud, compute and processing power to the edge of the network will support the ultra-low latency requirements of 5G applications, such as connected cars, which run at the network edge. Thu, 23 Aug 2018 17:36:39 -0400 Heather Broughton Virtualization Picks Up the Pace for 5G Crawl, Walk, and Run Deployments The application of virtualization technologies including network functions virtualization (NFV) and software defined networking (SDN) to 5G networks is essential if 5G is to be deployed and operated at a sustainable cost. Fri, 17 Aug 2018 15:01:10 -0400 John English What is Smart Data? How Does it Help? Successful data-driven businesses strive to improve data quality while reducing data organization and prep time. Read about what smart data is and how it helps. Mon, 13 Aug 2018 14:59:34 -0400 John Dix Introducing NETSCOUT’s Threat Intelligence Report NETSCOUT’s Arbor Active Threat Level Analysis System (ATLAS®) has actively monitored the global internet threat landscape since 2007. Today, it provides us with visibility into approximately one-third of the global internet. Tue, 07 Aug 2018 09:31:33 -0400 Hardik Modi Top Data Roadblocks for Digital Businesses Data has become the lifeblood of digitally driven businesses, as organizations look for new ways to improve customer experiences, increase operational efficiency, and create data-driven products and services. But as many companies have discovered, leveraging data is easier said than done. Mon, 06 Aug 2018 13:44:38 -0400 John Dix A Kink in the Blockchain As Internet of Things (IoT) devices proliferate across nearly every aspect of our personal and business lives, many of these implementations will be utilizing basic blockchain services. According to IDC, by 2019, 20 percent of all IoT deployments will have basic levels of blockchain services enabled. Mon, 09 Jul 2018 18:46:26 -0400 NETSCOUT Are You Prepared for DDoS? (Not A Checklist) In the 13th Annual Worldwide Infrastructure Security Report (WISR) from NETSCOUT Arbor, survey respondents were asked to identify the security measures they had in place against DDoS attacks. Among enterprise respondents, 82% identified firewalls and 57% had intrusion detection/prevention systems (IDS/IPS). In contrast, only 28% had Intelligent DDoS Mitigation Systems. Tue, 03 Jul 2018 00:47:08 -0400 Kevin Whalen Top Business Goal: Faster Deployment of Apps and Services As digital transformation drives the rapid pace of technology innovation, IT professionals are under increasing pressure to speed the development and deployment of applications and services – all while maintaining quality and cutting costs. In today’s connected world, delivering a better customer experience is key to business success. Thu, 28 Jun 2018 13:58:30 -0400 Michael Segal An Apple a Day: Virtualized Application Service Assurance As healthcare services, such as electronic medical records (EMR) and radiology services, are increasingly digitized, the need for network and application reliability is becoming a matter of life and death. Further complicating the challenge IT professionals face, more and more healthcare organizations are deploying virtualized network services and adopting “as-a-service” models. Tue, 26 Jun 2018 16:45:56 -0400 Eileen Haggerty Be Vigilant of the Cyber Reflection A common question I receive is “Why do DDoS attack keep occurring?” My answer is two-fold. One. It’s so easy to execute. Whether it be Do It Yourself DDoS attack tools, or DDoS Attack for Hire Services, anyone without any technical skills can execute a DDoS attack. Mon, 25 Jun 2018 14:53:29 -0400 Tom Bienkowski Legal Guardians: Supporting the Connected World of NETSCOUT As businesses today embrace digital transformation, the need to assure the performance of the technologies that lie at the heart of the connected world has never been more important. NETSCOUT has made a name for itself throughout the marketplace, supporting the “Guardians of the Connected World” who are responsible for the ever more complex networks and applications that we have come to rely on daily. Thu, 21 Jun 2018 13:03:38 -0400 Jeff Levinson Revamping HTTP and DNS for a Brave New 5G World As the brave new world of 5G approaches, HTTP and DNS are being revamped to meet the needs of our evolving digital universe. These protocols have served us well, and with these considered modifications, will continue to support our connected world. Mon, 18 Jun 2018 13:10:11 -0400 NETSCOUT LPWA Will Have to Suffice Until 5G Arrives The growth of Internet of Things (IoT) applications is exploding. Industry analysts predict IoT connected devices will grow to almost 31 billion worldwide by 2020, and more than 75 billion by 2025. Mon, 11 Jun 2018 13:39:42 -0400 Martin Klapdor The Horse Race for Multi-cloud Services Dominance In today’s digital universe, multi-cloud is the strategy of choice for enterprises of all shapes and sizes. Enterprises and large organizations require the scale and flexibility that cloud provides to grow their businesses and remain competitive. Wed, 06 Jun 2018 19:05:49 -0400 Michael Segal Smart Contracts Still Require Blockchain Service Assurance According to recent research, the global blockchain market is expected to be worth $20 billion by 2024. The future success and acceptance of smart contracts rests largely on the ability of blockchain operators to control all network interfaces and connected applications. Mon, 04 Jun 2018 13:03:36 -0400 Martin Klapdor Off is Not an Option: Automating Digital & Wireless Testing The Internet of Things (IoT) is fast encroaching on nearly every aspect of our lives. In fact, Business Insider magazine predicts there will be more than 55 billion IoT devices by 2025, up from approximately nine billion in 2017. Thu, 31 May 2018 13:23:25 -0400 Daniel Klimke Smart Data is Key for New Revenue Opportunities A recent market research report predicts global IIoT will reach approximately $232 billion by 2023, growing at a CAGR of around 8.06 percent between 2018 and 2023. Wed, 30 May 2018 16:53:15 -0400 Martin Klapdor The Rise and Fall of Memcached About 3 months ago, the Internet experienced the largest DDoS attack ever, reaching the unprecedented level of 1.7 Tbps. This was shortly followed by another attack reaching 1.3 Tbps and numerous smaller attacks. Tue, 29 May 2018 12:42:24 -0400 NETSCOUT The Rise of Network Virtualization Demands Service Assurance The rollout of network functions virtualization tools is likely to be a gradual process, as providers take a considered approach that identifies the specific applications or services that are appropriate for their virtual infrastructure. Thu, 24 May 2018 17:02:14 -0400 John English Moving Data Center Capabilities to the Edge of the Network According to a recent IDC study, 45 percent of all data created by IoT devices will be stored, processed, analyzed and acted upon close to or at the edge of a network by 2020. Wed, 23 May 2018 14:11:54 -0400 John English Monitoring SD-WAN and Other Overlay Networks SD-WAN is the software defined networking solution for the edge and remote locations. It introduces another variable in the service delivery chain, and networking and application professionals must have a suitable visibility solution before deploying it. Mon, 21 May 2018 13:58:44 -0400 Babak Roushanaee Moving Beyond Log Data In a recent Forbes article, IDC predicts the world will be creating 163 zettabytes of data per year by 2025. This is a ten-fold increase in worldwide data creation from the current rate of 16.3ZB. Tue, 15 May 2018 14:04:48 -0400 NETSCOUT Everything I Learned, I Learned from My Mom Forget Kindergarten… everything I’ve learned, I learned from my Mom. At first meeting, my Mom would not strike one as a force to be reckoned with. She was small in stature and quiet in nature. Her dream was to have a big, loving family – which she accomplished. As I was growing up as the youngest of twelve, these are... Mon, 07 May 2018 12:55:54 -0400 Janel Ryan As NFV Becomes Reality, Network and Service Assurance Needed Network Function Virtualization (NFV) is well on its way to widespread adoption. Recent research predicts carrier NFV investments top $37 billion in 2021 and have a compound annual growth rate (CAGR) of 30 percent between 2016 and 2021. North America is forecast to lead the way, accumulating $13 billion in NFV-related... Thu, 03 May 2018 13:54:06 -0400 NETSCOUT Fake It Until You Become It We all know the phrase, “fake it until you make it.” And if you’re honest with yourself, you think, “that’s great until people figure out I’m faking it.” As it happens, faking it may help you become it. This idea originates with social psychologist, Amy Cuddy. Through her research on non-verbal expressions, she... Thu, 03 May 2018 01:09:30 -0400 Janel Ryan Digital Transformation is Coming to a Store Near You The way people shop has been changing. Over the past several years, Digital transformation (DX) has dramatically impacted the retail sector in a big way. According to recent studies, 90 percent of pre-purchasing research happens online. And 90 percent of shoppers use their smartphones in stores while they shop. These... Tue, 01 May 2018 13:17:11 -0400 Ron Lifton Customer Success Story: DQE Communications Customizing Network Solutions for Business Growth DQE Communications is one of the leading providers of commercial fiber optic networking to businesses in southwestern Pennsylvania. Offering a level of network service and support that’s unequaled by any other area provider, DQE provides businesses, governmental... Mon, 30 Apr 2018 13:45:56 -0400 NETSCOUT Growing Reliance on Multi-cloud Boosts Need for Smart Data As the cloud computing market has soared, businesses have begun incorporating a mix of cloud services to meet their Digital Transformation (DX) objectives. Multi-cloud and hybrid cloud environments are fast becoming the option of choice. In fact, according to a recent Information Age article, 451 Research determined... Thu, 26 Apr 2018 17:47:56 -0400 Michael Segal Largest DDoS Attack Service Shut Down DDoS-for-Hire services, like Webstresser, run rampant in the underground marketplace and their services are often negligible in price. Many of the services list disclaimers in an attempt to mislead the illegal nature of the service. Thu, 26 Apr 2018 17:15:09 -0400 NETSCOUT Data Breaches and Infrastructure Under Attack Because DDoS attacks and data breaches are so different in nature, conventional security infrastructure components used to combat breaches – perimeter firewalls, intrusion detection/preventions systems (IDI/IPS) and the like – are comparatively ineffective at mitigating DDoS attacks. Wed, 25 Apr 2018 13:48:32 -0400 Tom Bienkowski Attacks on Encrypted Services Encryption is one of the most basic necessities in the security arsenal. It’s what makes it possible for banks to offer online banking and funds transfers, or for consumers to make purchases online using their credit or debit cards. It’s what protects the public’s online interaction with government agencies or health... Mon, 23 Apr 2018 13:13:16 -0400 Tom Bienkowski Delivering the Edge Computing Promise Edge computing, driven by the rapid proliferation of the Internet of Things (IoT) and 5G technology, is poised to change the world as we know it. According to the IDC FutureScape: Worldwide IoT 2018 Predictions, by 2020, IT spend on Edge infrastructure will near 18 percent of the total spend on IoT infrastructure... Wed, 18 Apr 2018 18:34:46 -0400 John English Intelligently Automated DDoS Defense Many business organizations struggle to detect and mitigate Distributed Denial of Service (DDoS) attacks in a timely and efficient manner. The cost of downtime, which for most organizations can run more than $500 per minute, is not the only risk. DDoS is increasingly being used as part of broader attack campaigns which... Mon, 16 Apr 2018 14:11:58 -0400 Kevin Whalen The Business of Botnets The Mirai attacks against Dyn in 2016 drew widespread attention to botnets. Yet compared to how cybercriminals are using botnets today, the Dyn attacks may come to seem rather amateurish. Criminals are quickly learning how to leverage botnets running sophisticated malware as the infrastructure for massive, illegitimate... Wed, 11 Apr 2018 12:38:58 -0400 Kevin Whalen Availability is Everything With the increase in multi-vector attacks, security experts agree that reducing the risk from DDoS attacks requires a defense-in-depth or layered approach utilizing multiple, synchronized mitigation approaches. Mon, 09 Apr 2018 12:32:47 -0400 Kevin Whalen The Tiger Effect, 2.0? The Masters kicks off today and by far the biggest story in Augusta Georgia this year is the unlikely comeback of Tiger Woods. He is, by far, the most important person in the sport. How excited are golf fans at the thought of his return? In the last tournament he played a few weeks ago, it had higher TV ratings than... Thu, 05 Apr 2018 12:30:14 -0400 Kevin Whalen The Six Phases of a DDoS Incident Response Plan Any enterprise that interacts with its customers and stakeholders online — which is just about everyone these days — needs to have robust defenses to detect and mitigate distributed denial of service (DDoS) attacks. It’s just as important, however, to have an equally robust incident response plan and process specific... Wed, 04 Apr 2018 13:29:56 -0400 Kevin Whalen Automation Puts Time on Your Side During a DDoS Attack During a DDoS attack, time is unforgiving. A few seconds can mean the difference between a successful mitigation and costly network downtime. Anything that accelerates your mean time to detect (MTTD) and respond (MTTR) to an attack is to your advantage. Mon, 02 Apr 2018 12:35:43 -0400 Talbot Hack DDoS Defense: The Need For Speed – Arbor Networks In DDoS defense, speed is critical. Unlike malware which can lie dormant within an organization for months, massive “fast flood” attacks can materialize in an instant and ramp up to hundreds of gigabits in a matter of seconds. Applications can appear to be working fine, and then suddenly become unavailable for no... Thu, 29 Mar 2018 00:42:02 -0400 Tom Bienkowski DDoS Managed Service Among the options available for protection against DDoS attacks, some enterprises turn to content delivery networks or CDNs — globally distributed networks serving web content such as streaming video to end users. Being distributed in nature and having bandwidth to spare, some CDNs offer DDoS protection for the... Mon, 26 Mar 2018 14:16:56 -0400 Kevin Whalen GDPR Has Changed the Stakes for Network Availability Much of the discussion about GDPR focuses on the sticker shock of potential fines, which are only part of the significant changes this regulation introduces for businesses that collect or process personal data. Overshadowed by this discussion is a key provision at the heart of GDPR, Article 32, the Security of... Wed, 21 Mar 2018 13:50:44 -0400 Tom Bienkowski 503 “Service Unavailable”…Busy Server or DDoS Attack? Busy server? Maybe not. A "service unavailable" notification could be the result of an application-layer DDoS attack targeting your servers and critical infrastructure. Mon, 19 Mar 2018 14:31:23 -0400 Tom Bienkowski The Consequences of DDoS Attacks are Rising What is at risk in a DDoS attack on an enterprise website or network? Certainly, there is a financial risk, as revenue will likely be lost as a direct result of the attack. There is the cost of remediation, and affected customers may have to be compensated. There is a legal risk if confidential user data is compromised... Wed, 14 Mar 2018 12:41:14 -0400 Kevin Whalen No Sooner Did the Ink Dry: 1.7Tbps DDoS Attack Makes History In January 2018, NETSCOUT Arbor published our 13th Annual Worldwide Infrastructure Report (WISR 2018). This year’s report noted that the largest DDoS attack was 650 Gbps; which was down from the prior year of 800 Gbps. The report also noted that though the largest DDoS attack was 650Gbps, the overall mix of attack... Mon, 12 Mar 2018 13:37:40 -0400 Tom Bienkowski Managed DDoS Service: What Separates Good from Great The case for a managed DDoS protection and mitigation service is well established. Partnering with a provider that can oversee the system’s operation takes a big IT issue off your plate, augments your staff resources, and gives you access to specialized DDoS expertise. But not all managed DDoS services are alike. How... Wed, 07 Mar 2018 13:14:20 -0500 Kevin Whalen Why Packet Flow Switches Should Be Like Social Media No travel this week, so I’ve been getting caught up and up to date in all my social media venues and online content. In doing so, I watched the premier of a new show called Living Biblically, long story, but interest stems from a family connection by marriage and the show was quite entertaining – that last part is in... Tue, 06 Mar 2018 12:50:31 -0500 Brian Philips Applying NFV to DDoS protection As with any new technology, Network Function Virtualization (NFV) has its own adoption cycle driven by business realities. Once a subject of hype, NFV is a reality for service providers in 2018. NETSCOUT Arbor sees a lot of customers either deploying or evaluating NFV in earnest; quite a few are already using it to... Mon, 05 Mar 2018 12:47:34 -0500 Kirill Kasavchenko What's the Difference Between NFV and SDN? Many service providers have embarked on a major initiative to migrate their IP networks from purpose-built platforms to virtualized, software-based platforms heralding a new era of “programmable networks.” Service providers are increasingly looking to implement Network Function Virtualization (NFV) and Software Defined Network (SDN) technologies Fri, 02 Mar 2018 15:01:00 -0500 NETSCOUT Service Intelligence: Cloud Migration's Secret Weapon To attain cloud migration nirvana, companies must successfully navigate a host of challenges, including retaining visibility and control over service quality and performance. Fri, 02 Mar 2018 14:00:00 -0500 NETSCOUT Digital Transformation Demands Service Assurance Guarantees The push for digital transformation can come from the CEO, the CIO, or some other area, but regardless of where the spark ignites, IT will need to change because this much is clear: To be successful, IT’s inwardly focused reactive model will have to give way to an outwardly focused stance that involves taking more... Thu, 01 Mar 2018 16:00:00 -0500 NETSCOUT How Hybrid Cloud Drives Digital Transformation I ran across an article in Network World that did a beautiful job of laying out the intertwined nature of the growth of hybrid cloud and digital transformation. The author points out that in the 21st century, every business is a software business, and one built for speed and innovation. Agile software development and... Thu, 01 Mar 2018 13:00:00 -0500 NETSCOUT There is No Peacetime: Volumetric Attacks Continue Unabated DDoS attacks don’t observe holidays. They don’t take breathers. They don’t honor white flags. There are no truces, no prisoner swaps, no treaties or negotiations. Thousands of attacks are taking place at this very moment around the world with no sign of let-up. Peace is clearly not at hand. NETSCOUT Arbor’s 13th annual... Wed, 28 Feb 2018 19:30:17 -0500 Gary Sockrider Evolution of HTTP and DNS for 5G HTTP (Hypertext Transmission Protocol) is the internet communication protocol our browser uses to send information between our internet-enabled device (laptop, smartphone, Apple® watch, etc.,) and the web page it is communicating to. DNS (Domain Name System) is the protocol that translates internet addresses to find the various sites and information we seek. Wed, 28 Feb 2018 16:00:00 -0500 NETSCOUT When Will Artificial Intelligence Exceed Human Performance? While experts may disagree the timing of when Artificial Intelligence (AI) will replace humans in various activities, there is no doubt that AI will play a large part in society going forward. A recent article in MIT Technology Review suggests adoption will be “lumpy” with some industries, making progress faster than... Wed, 28 Feb 2018 16:00:00 -0500 NETSCOUT Getting the Network Ready to Meet IoT Expectations All IoT devices are not created equal. Aside from the widely varying bandwidth and latency requirements from Fitbit, to a refrigerator sensor, to robotics, and to autonomous automobiles, there are also widely varying service priorities. While a heart or blood glucose level monitor will take up very little bandwidth in... Wed, 28 Feb 2018 14:00:00 -0500 NETSCOUT Response to the NTIA Draft Report on DDoS and Botnet Attacks On Dec. 1, 2016, the Commission on Enhancing National Cybersecurity introduced a set of goals for the new administration, and protecting the nation’s infrastructure and commerce against DDoS and Botnet attacks was high on the list. A Presidential Executive Order from May 2017 re-emphasized this priority, seeing the... Mon, 26 Feb 2018 12:50:42 -0500 Arabella Hallawell How Big Data Can Improve Network and Application Intelligence with 5G There is no doubt that data has become the new currency for service providers. However, data lakes are already becoming flooded with so much data that they can be unusable and there is no indication that this trend will slow or stop. As Alan Carlton points out in his article on Big Data and 5G, “The 5G standards... Mon, 26 Feb 2018 12:00:00 -0500 NETSCOUT Blockchain DX is the Best Healthcare Rx Blockchain is turning into a blockbuster technology for the healthcare industry. In a survey of 200 healthcare executives done by IBM, healthcare institutions are investing heavily in Digital Transformation (DX) blockchain pilots, with nine in ten respondents planning to invest by 2018 across various business areas... Fri, 23 Feb 2018 17:00:00 -0500 NETSCOUT ERP, IoT, and Cloud Success Depends on Service Performance Anybody who has ever torn a ligament knows just how important connective tissue is. As it turns out, the same also applies to Digital Transformation (DX). According to a recent article from Information Management, companies are investing in big data, enterprise resource planning (ERP), and Internet of Things (IoT)... Fri, 23 Feb 2018 14:00:00 -0500 NETSCOUT Why the Internet of Energy Requires Service Assurance Keeping the lights on might sound straightforward, but for energy providers, limiting outages and ensuring a high-quality customer experience is now intertwined with the cloud; software-defined data centers; blockchain and industrial Internet of Things (IoT). As these technologies and accelerators of Digital... Thu, 22 Feb 2018 17:00:00 -0500 NETSCOUT CIOs and Digital Disruption: The Big Picture It’s not a stretch to say that the CIO job is transforming in lockstep with the massive wave of technologies triggering a digital tsunami in the way businesses operate. From the Internet of Things (IoT) to cloud computing, mobile, analytics, and robotics, the new path to success lies in a company’s ability to transform... Thu, 22 Feb 2018 11:00:00 -0500 NETSCOUT Intelligent Automation is Needed for DDoS Defense The number of organizations reporting revenue losses as an impact of DDoS attacks almost doubled in 2017, with 10% of enterprises estimating that a successful DDoS attack would cost in excess of $100,000. Read More Wed, 21 Feb 2018 18:00:00 -0500 NETSCOUT The Digital Economy is Transforming the Retail Landscape Online options, digital wallets, and proximity technology are just a few of the ways the retail shopping landscape is being radically altered. Digital transformation (DX) is well and fully underway in the retail world, changing the way shoppers shop and retailers sell. More and more retailers are taking advantage of... Wed, 21 Feb 2018 17:09:56 -0500 NETSCOUT GDPR is Explicit About Protecting Availability Scheduled to take effect on 25 May 2018, the General Data Protection Regulation (GDPR) calls for unprecedented changes in the way organizations collect, process and protect the personal data of EU citizens. With all the information and talk about GDPR, there are a couple misconceptions that I have come across when... Wed, 21 Feb 2018 16:25:01 -0500 Tom Bienkowski Digital Transformation is Impacting the Public Sector There’s no question that the public sector frequently trails the private sector when it comes to innovation and the utilization of technology. The sheer size and complexity of most government agencies makes it incredibly difficult to keep up with the latest advancements. That said, the importance of improving services... Wed, 14 Feb 2018 13:33:07 -0500 NETSCOUT How to Manage Self-Service Provisioning Is self-service ubiquitous? Tell that to the state government of New Jersey, where pumping your gas is still against the law. But elsewhere, yes, self-service is one of the cornerstones of digital transformation. According to the National Institute of Standards and Technology (NIST), one of the five essential... Wed, 14 Feb 2018 13:00:00 -0500 NETSCOUT Engaging in a Healthy Transformation Information is literally the lifeblood of nearly every organization. And for the healthcare industry in particular, ensuring the uninterrupted flow of information is absolutely critical for the effective diagnosis and treatment of patients. While digital transformation (DX) has become an imperative across nearly every... Wed, 07 Feb 2018 16:00:00 -0500 NETSCOUT SD-WAN changing the game for service and security assurance In British detective shows, a large number of closed-circuit TV (CCTV) cameras in cities across the U.K. are always a reliable source of evidence. But there are inevitable gaps in camera placement, where suspects move about unseen. What does this have to do with network and application service assurance in the age of... Wed, 07 Feb 2018 01:30:00 -0500 NETSCOUT Unified Visibility is Smarter Visibility Security and service assurance engineers sometimes seem to speak a different language. They look at the computer and network systems they are responsible for from different perspectives. The monitoring fabrics for each function are often completely separate. These dual packet monitoring systems create a “Tower of Babel... Mon, 05 Feb 2018 15:00:00 -0500 Peter Vinsel Adding Automated Service Assurance and Traffic Monitoring Lower cost. That’s perhaps the top benefit behind why Software-Defined WAN (SD-WAN) service is being adopted by many enterprise organizations. It’s clear that dividing traffic between expensive MPLS WAN circuits and less expensive Internet connections does reduce costs. But there are other big benefits that come with... Wed, 31 Jan 2018 15:00:00 -0500 NETSCOUT Keeping The Lights On If there’s one industry where being kept in the dark is a very bad thing, it’s the energy and utility sector. Keeping the lights on and limiting outages is an imperative for energy providers. This has led suppliers to examine how digital transformation (DX) can improve their ability to maintain service availability to... Wed, 31 Jan 2018 13:00:00 -0500 NETSCOUT Banking on DX to Meet Needs of a Changing Financial World Few industries have been impacted more profoundly by technology innovations then the world of financial services. Despite the risk-averse nature of the business, this critically important sector has embraced digital transformation (DX) in response to customer demands for a seamless, secure, Omni-channel experience, as... Wed, 24 Jan 2018 12:30:16 -0500 NETSCOUT Fixing Service Failures with Real-Time Solutions Before turning to address the concept of repairing service failures with real-time solutions, the conflict of definitions about what real-time means in an on-demand world needs to be clarified so enterprises and service providers share the same expectations of what can be achieved. So-called real-time tools are not... Thu, 18 Jan 2018 18:31:00 -0500 NETSCOUT Why SD-WAN can create an SP network tailor-made While service providers have been the traditional providers of connectivity services to enterprises, they have been somewhat limited to the commodity market of providing connections. The move to virtualization and ultimately telco cloud, which is enabled by network functions virtualization (NFV) and software-defined... Thu, 18 Jan 2018 18:00:00 -0500 NETSCOUT How your service assurance strategy can improve If you have been to any industry conference for Service Providers or Network Operators recently, you could not have missed the buzz around SD-WAN (Software-Defined Wide-Area Networking). It has seemingly popped up out of nowhere and become all the rage. While it is relatively new in the service provider lexicon, it is... Thu, 18 Jan 2018 18:00:00 -0500 NETSCOUT Digital Transformation for Manufacturing The manufacturing industry has long been committed to technology innovations that help manage demand for products around the world. With facilities in every corner of the globe, manufacturers are increasingly reliant on connectivity to ensure supply chains are operating at their peak. This is borne out in a recent... Wed, 17 Jan 2018 17:00:00 -0500 NETSCOUT Building a Best-of-Breed Multicloud Strategy Best-of-breed strategies have long since fallen out of favor in the enterprise, because the work required to stitch together the components proved to be too difficult. But best of breed is back with cloud. Companies today are hell-bent on buying the ideal SaaS, PaaS, and IaaS cloud services for the job, and while APIs... Mon, 08 Jan 2018 13:52:15 -0500 NETSCOUT The Digital Transformation Train Has Left the Station If your organization isn’t already knee deep into digital transformation (DX) by now, then you’re the exception and not the rule. A recent study commissioned by NETSCOUT revealed that nearly eight in ten (79%) IT and business decision makers who were surveyed in the U.S., UK, Germany, and France believe that DX is an... Mon, 01 Jan 2018 18:00:00 -0500 NETSCOUT Is ‘Virtual’ Packet Brokering Possible? Achieving visibility of network traffic in the physical vs. virtual environments requires fundamentally different approaches. In the physical world, you have access to physical ports on switches and routers. As packets traverse the wire, you can tap the traffic as you desire—it’s easy to ‘capture’ traffic either at the... Thu, 14 Dec 2017 12:57:04 -0500 Peter Vinsel Carriers Can Transform Enterprise Infrastructure with 5G As enterprises look to equip their workers with rich new functionality, they are increasingly relying on networks to provide resilient low latency connectivity that supports the different requirements of a wide portfolio of enterprise applications. Starting from the relatively simple proposition of hosting data and... Wed, 06 Dec 2017 13:07:16 -0500 NETSCOUT Putting the User Experience First In the early days of IT, computing departments lived in ivory towers, dispensing reports to users when the mainframe felt like it. As enterprise technology evolved, user needs remained in the back seat, with application development cycles that trickled out new features on an IT department schedule that ranged from... Tue, 05 Dec 2017 17:25:26 -0500 NETSCOUT Managing the Hybrid Cloud Written by Russ Currie As VP of Enterprise Strategy, Russ is responsible for working with enterprise customers, partners and field personnel to ensure that NETSCOUT’s products and solutions are meeting the needs of our customers and the market. Russ has over 15 years working at NETSCOUT where he has held many technical... Tue, 05 Dec 2017 13:01:34 -0500 Russ Currie Data is the new oil, but the refinery process is hard work There is no shortage of data available to Communications Service Providers. But the challenge is making that data accessible, usable, and actionable. Multiple, unstructured and structured, dissimilar data sets, constructing and correlating data, accessibility to data, and slow processing making real-time data... Mon, 27 Nov 2017 17:11:04 -0500 John English Running UK Gov Digital Org? Written by Adam Woolhouse Adam Woolhouse has worked in IT network monitoring and cyber security for 22 years and is now Regional Director at NETSCOUT currently managing the sales team for UK government and the Nordics. Of course, the answer to the title question is that you are, but let’s consider some of the... Mon, 27 Nov 2017 12:36:06 -0500 Adam Woolhouse 3 Barriers to AI Adoption Across the Enterprise A takeaway from this CIO article by a PwC principal and Chief Technologist is that AI is long ways from crossing the chasm but early uses by enterprises demonstrate automation can improve efficiency and productivity. One aspect of automation is software development or scripting that can be prone to human error, creating the need for a 360-degree view of business services and their dependencies. With visibility across all service components and user populations, it is possible to orchestrate workflows smarter. Wed, 22 Nov 2017 17:50:48 -0500 NETSCOUT Building an IoT Early Warning System What is one thing cloud computing and the Internet of Things have in common? They both challenge your company’s ability to maintain the level of control IT has worked so hard to master. Using cloud computing to support IoT initiatives makes it that much harder to ensure things are working the way they should, adding... Tue, 21 Nov 2017 13:47:53 -0500 NETSCOUT Maintaining IoT Stability When Our Clothes Are Connected The Internet of Things has captured the imagination of companies in a range of industries because it promises everything from new ways to earn customer devotion to opportunities to create new revenue streams. Harvard Business Review goes as far as to say that “the evolution of products into intelligent, connected... Tue, 21 Nov 2017 13:17:40 -0500 NETSCOUT 90% of Enterprises to Use Cloud Services by 2021 Clearly, cloud platforms have become table stakes for digital transformation efforts, as over 90% of companies will use cloud platforms by 2021. But surprisingly, companies are somewhat unlikely to build a comprehensive plan for cloud migration, often lowering cloud's value and ROI. With hybrid cloud the reality for at least the next decade, it makes sense to manage cloud migration at the enterprise level in order to ensure the entire environment can support technologies like blockchain and AI. Tue, 14 Nov 2017 18:13:09 -0500 NETSCOUT Cloud computing, the Rx for health care The cloud enables speed, scale, and resiliency for the healthcare industry. But private, public, hybrid and multi-cloud add additional layers of IT complexity. Therefore, gaining pervasive visibility -- on-premises and off-premises -- is required to speed problem resolution and fuel healthcare innovation. Anything less hampers the efforts of IT professionals as they struggle with limited analyses of individual elements and IT resources in isolation. Only with a contextual and end-to-end view of the entire IT infrastructure will the full potential of incredibly promising healthcare services be achievable. Tue, 14 Nov 2017 01:30:00 -0500 NETSCOUT Rise of Software-driven Packet Broker Solutions By enabling customers to smoothly transition to software-driven packet broker solutions, NETSCOUT has demonstrated visionary excellence with the nGenius® 5000 Series Packet Flow Switch (PFS) and earned Frost & Sullivan’s 2017 Visionary Innovation Leadership Award. Wed, 08 Nov 2017 15:00:00 -0500 NETSCOUT Can Network and Security Operations be Friends? This blog post is the third in a series that examines the results of a recent network security infrastructure survey conducted by SANS Institute[1]. It highlights key takeaways for network and security operations professionals to consider. Despite advances in cybersecurity and application performance management, today... Wed, 08 Nov 2017 12:14:14 -0500 NETSCOUT Three key observations from SCTE Cable-Tec 2017 With SCTE Cable-Tec 2017 in the rear view mirror, the bags unpacked, and the expense reports filed, it seems like a good time to sit down and pen some reflections from the event. Afterall, when over 10,000 cable professionals converge for a conference, one is bound to walk away with some distinct impressions. To start... Tue, 07 Nov 2017 13:59:09 -0500 Mike Serrano What is Your Security’s Org Chart? This blog post is the fourth in a series that examines the results of a recent network security infrastructure survey conducted by SANS Institute[1]. It highlights key takeaways for network and security operations professionals to consider. When viewed as a network schematic, most architectures appear relatively... Mon, 06 Nov 2017 13:28:53 -0500 NETSCOUT Safe Shopping Online The holiday season is practically around the corner and everyone wants to be the best gift-giver [even if they won’t admit to it at first]. Mega-sale here, buy-one-get-one-free there – it’s pure madness! I’m not even mentioning the lines still forming at the malls even if stock with greater variety is available online... Tue, 31 Oct 2017 16:04:25 -0400 IT Security Team 10 Internet of Things (IoT) Success Stories by Industry Learn about how different industries are using IoT, including government, energy, agriculture, healthcare and consumer goods. Mon, 30 Oct 2017 16:34:33 -0400 NETSCOUT Software-driven Disaggregation Comes to Network Visibility With NETSCOUT the adoption of software-defined networking and disaggregation of switch hardware and operating system software promises much in simplicity, automation, orchestration, rapid provisioning and customer choice. Mon, 30 Oct 2017 13:00:00 -0400 NETSCOUT AI, IoT, and the hybrid cloud Cloud/IoT/AI implementations can vary widely by industry, and some sectors are more advanced than others. Use cases include Smart Agriculture, Intelligent Construction (heavy equipment), Connected Manufacturing, and Connected Healthcare. The world of IoT and AI platforms is young and in flux, with known and unknown companies offering solutions. It does not take much of an imagination to recognize that everything will be generating a stream of data that crosses the cloud, and AI-enabled Infrastructure is part of the IT solution stack that allows enterprises to compete and remain relevant to their customers. Fri, 27 Oct 2017 13:00:00 -0400 NETSCOUT Managing Complexity in the Cloud As modern computing evolves, companies may need to adjust their language, talking of clouds, rather than the cloud. Most organizations these days have been moving to multi-cloud environments that better support unique operating requirements. That move creates an additional layer of IT infrastructure complexity, though... Fri, 20 Oct 2017 04:00:00 -0400 NETSCOUT Securing IoT’s Today our lives are “smarter” and more interconnected than ever before, thanks to the many devices known as the “Internet of Things (IoT).” Our televisions are internet-enabled and allow us to “speak” to them and request our favorite shows or movies. We have security cameras that can send us alerts via text message... Thu, 19 Oct 2017 18:53:16 -0400 IT Security Team I am part of the 1% I am part of the 1%, just not THAT one percent. According to SC Magazine, women make up 1% of the C-level executives in the cybersecurity workforce. With October being Cybersecurity awareness month, I wanted to share how I got here in this field. Tue, 17 Oct 2017 12:53:48 -0400 Deb Briggs Simplicity in Return for Accountability Week two of National Cyber Security Awareness Month (NCSAM) will showcase how organizations can protect against the most common cyber threats. The week will also look at resources to help organizations strengthen their cyber resilience. Wed, 11 Oct 2017 18:36:38 -0400 Kevin Whalen Business Analytics and Assurance Digital transformation has given birth to a variety of new digital business models, which rely on an increasingly global and connected world. Digital transformation thrives on flexibility and agility, requiring companies to seamlessly and confidently operate across this connected world. To succeed, enterprises must not... Tue, 10 Oct 2017 17:42:04 -0400 Michael Segal The Second Wave of Packet Broker Disaggregation Written by Dr. Jim Metzler Dr. Jim Metzler is widely recognized as an authority on both network technology and its business applications. In over 28 years of professional experience, Jim has assisted numerous vendors refine their product and service strategies, and helped tens of enterprises evolve their network... Wed, 04 Oct 2017 13:00:00 -0400 NETSCOUT Connected Cars Offer Massive IoT Opportunity The low latency, five-nines reliability, likely 100 percent coverage, and ability to provide 10 times the bandwidth per connection to 10 times the number of connections, makes 5G technology perfectly suited for many IoT applications. A 5G network can deliver 50-megabits-per-second connectivity everywhere once networks... Tue, 03 Oct 2017 14:11:28 -0400 NETSCOUT Natural Disasters and Cybersecurity One would think that in something as catastrophic as a natural disaster, people would unite and help one another. With hundreds of charities and online fundraisers for aid and assistance on alert, hackers have not slowed down. Mon, 02 Oct 2017 09:44:13 -0400 Greta Milingyte Understanding Mobile Habits of Millennials with Better Data From the first phone call placed in 1876 through the end of the 20th Century, service provider networks were built to support a limited number of services (mainly telephony and TV). Today, all bets are off. YouTube serves up 1 billion hours of video a day worldwide. By 2021, the number of devices connected to IP... Fri, 29 Sep 2017 12:00:00 -0400 NETSCOUT Leading the Digital Transformation: Whose Role Is It? No matter the industry vertical, digital transformation (DX) is essential for businesses of all sizes to remain competitive. Digital technologies are changing the global corporate strategy, with the majority of organizations planning at least some integration built into their business. More than ever, DX is intertwined... Thu, 28 Sep 2017 16:04:34 -0400 NETSCOUT The Foundations for Digital Transformation Digital Transformation (DX) continues to sweep across all industries, driving the shift from physical to digital assets. Underpinning DX is the transition to an information-driven economy where data is the new currency and almost all aspects of business are rooted in software. Nowhere is this more applicable than in... Mon, 25 Sep 2017 17:31:53 -0400 John English Virtualisation NFV and SDN have been positioned as a panacea for enterprise and network operators large and small. The power of virtualisation would remove costly, purpose built hardware and replace it with commodity, common off the shelf (COTs) storage and compute Thu, 14 Sep 2017 14:30:40 -0400 Mike Serrano Handling Stealthy DDoS Attacks From simple beginnings in the late nineties, DDoS attacks became bigger and badder throughout the early 2000s. Now, a more sophisticated kind of DDoS campaign is putting victims at even more risk. Stealthy, subsaturating attacks often signal more damaging network intrusions that can be difficult to spot. In their early... Mon, 11 Sep 2017 15:00:00 -0400 NETSCOUT Self-Service Analytics for All Trying to capture insights from the deluge of traffic data descending on service provider networks can sometimes feel like walking outside in a rainstorm holding out a paper cup. There’s so much data, in so many different places, and it’s cumbersome to access and manipulate when you’re relying on writing database or... Thu, 31 Aug 2017 10:30:00 -0400 NETSCOUT How IoT and Big Video Make the Case for 5G Investments Although 5G networks still remain some years away from commercial deployment, pilot projects and extensive testing are well underway and it is clear that the technology will be deployed globally within a decade. Naturally, this will be an enormous task and cost billions but it will also be a different type of network... Tue, 29 Aug 2017 16:00:00 -0400 NETSCOUT How to Avoid Network Invisibility The move to the cloud and an increasingly virtual infrastructure are radically changing service provider network topologies. And for many very good reasons. But along with the amazing benefits of cloud, virtualization, software-defined networking (SDN) and other disruptive technologies and architectures, beware. As... Wed, 16 Aug 2017 10:00:00 -0400 NETSCOUT Artificially Intelligent Networks Will Expand Revenues As telecoms operators continue to transform their networks and businesses, the industry is in the midst of the greatest change since the introduction of IP networks more than 20 years ago. The era of manually-managed, function-specific network equipment is coming to an end as operators deploy commoditized hardware, the... Wed, 16 Aug 2017 10:00:00 -0400 NETSCOUT How NETSCOUT is Disrupting the Packet Broker Market Written by Dr. Jim Metzler Dr. Jim Metzler is widely recognized as an authority on both network technology and its business applications. In over 28 years of professional experience, Jim has assisted numerous vendors refine their product and service strategies, and helped tens of enterprises evolve their network... Thu, 27 Jul 2017 13:00:00 -0400 NETSCOUT Youth Movement: Gen Z Boasts the Largest, Most Diverse Whether you are a Cable, Mobile, or Fixed line network operator, one thing is certain. This isn't your father's network you are running. To understand what the future holds, we need to shift our focus from "Boomers" to "Millennials and Gen Z". Today, these groups make up almost 50% of the US population. Their experiences are different from Boomers, they are more diverse, and they have grown up with technology. Thu, 27 Jul 2017 10:17:58 -0400 NETSCOUT 2017 Is Shaping Up to be the Year of Music Streaming In 1979, The Buggles proclaimed that "video killed the radio star". Fast forward to the summer of 2017 and it appears that distribution and consumption of music has, once again, fundamentally changed. Thu, 27 Jul 2017 10:00:00 -0400 NETSCOUT From Vision to Reality: NETSCOUT’s Transformative Journey On a long trip, sometimes it’s hard to visualize how far you’ve traveled until you reached a point where you can actually see the road unwinding behind you. I reached such a viewpoint recently when we learned that NETSCOUT ranked seventh in Forbes’ annual Fast Tech 25 list of the year’s fastest growing public tech... Wed, 26 Jul 2017 14:02:38 -0400 Michael Segal Chaos in the Enterprise: Managing IoT Across Edge & Cloud Over recent years, the Internet of Things (IoT) has been a huge growth market. From consumer gadgets and wearables to connected cars and smart home devices, the proliferation has been rapid, and IHS predicts that the number of IoT devices globally will reach 30.7 billion by 2020 and 75.4 billion by 2025. IoT is also... Wed, 19 Jul 2017 13:25:39 -0400 Michael Segal The Pace of Digital Transformation in Healthcare The business of healthcare has changed. Today’s healthcare organizations, much like any enterprise, depend wholeheartedly on technology. They live and breathe the many benefits of digital transformation (DX) and have steadily introduced new technologies to help deliver the end-goals of high quality patient care and... Wed, 19 Jul 2017 12:47:40 -0400 Eileen Haggerty Implementing Hybrid Cloud Without Losing Speed & Agility When it comes to digital transformation (DX), the future belongs to the fast—and laggards risk being left in the dust. Recent research from Harvard Business Review shows that digital leaders significantly out-performed slow DX adopters in gross margins, earnings, and net income, despite similar IT spending patterns... Mon, 17 Jul 2017 09:05:17 -0400 Michael Segal NETSCOUT Packet Flow Visibility for Open Compute Platforms NETSCOUT recently announced new nGenius PFS 5000 network packet brokers based on off-the-shelf Open Compute platforms. While Big Switch Networks blazed this trail back in 2013 with the launch of its Big Monitoring Fabric, NETSCOUT, which sells a family of purpose-built network packet broker platforms, is embracing... Wed, 12 Jul 2017 09:00:00 -0400 NETSCOUT Juniper’s Cloud-Grade networking aims Moving services to the cloud should not mean sacrificing high-quality service delivery. Customers won't tolerate poor service unless it's free. Carrier-grade means extremely high availability for service uptime. But to deliver carrier-grade service quality means that the carrier or cloud service provider has full... Thu, 06 Jul 2017 11:00:00 -0400 NETSCOUT Making the Invisible Visible for Service Providers With Network Function Virtualization/Software-Defined Networking (NFV/SDN), it is no longer possible to tap into physical gigabyte IP-links to access network traffic with traditional packet broker products to aggregate traffic into InfiniStream to create our ASI metadata to feed nGeniusONE. Fri, 30 Jun 2017 12:26:22 -0400 John English Building Community at Work To Support Military Families NETSCOUT’s Silicon Valley team engaged in a different type of “engineering” project by picking up hammers and nails to construct two playhouses donated to a local chapter of Blue Star Moms, a non-profit organization dedicated to serving military personnel, veterans and their families from all branches of the United... Tue, 20 Jun 2017 12:37:23 -0400 Karen McCloskey Meeting Service Management Needs in Hybrid IT Environments Businesses today are increasingly relying on hybrid IT environments which combine legacy applications and networks with virtualized compute, storage and network workloads that exist on-premises and in the cloud. As companies migrate workloads into hybrid cloud environments, all too often a “lift and shift” approach is... Tue, 06 Jun 2017 15:37:28 -0400 Michael Segal Taking on Illiteracy One Reader at a Time Once a year, NETSCOUT professionals lend a hand and attend the Literacy Instruction for Texas Volunteer Appreciation Brunch, recognizing and supporting those affected by learning disabilities including dyslexia or impairments from strokes and brain injuries. Mon, 05 Jun 2017 10:17:37 -0400 NETSCOUT Observations from IoT World Summit 2017 Technologists, visionaries, and experts from all sectors of the economy recently converged on Santa Clara, California for the “World’s Largest IoT Conference”. What made this conference unique is that it wasn’t about the role that 5G, NB-IoT or other wireless protocols will play in enabling IoT, but rather it was about... Wed, 24 May 2017 10:51:53 -0400 Mike Serrano Helping Orphans in China Shows NETSCOUT’s Heart of Gold Seeking medical treatment for children with disabilities is always difficult. For orphaned children, without a family or support network to help them overcome the many challenges they face, it’s even more complicated. All too often, poor families are unable to bear the cost of treating disabled or seriously ill... Thu, 18 May 2017 08:32:14 -0400 NETSCOUT Is It Safe-to-Fail for DevOps? For organizations like yours, the upside of DevOps is clear: increased productivity, faster time to deployment and accelerated remediation. As these stats from Puppet’s 2016 State of DevOps report show, high-achieving IT organizations understand the need for speed. Wed, 17 May 2017 08:46:17 -0400 Michael Segal Seizing the Enterprise Market Opportunity Despite a strong, stated focus on small and midsized businesses (SMBs) by both cablecos and telcos over the past decade, big business still accounts for the lion’s share of commercial revenue for service providers overall. In fact, in a recent survey of 64 service providers conducted by Heavy Reading for NetScout, more... Mon, 15 May 2017 10:05:59 -0400 Mike Serrano Service Assurance & Digital Transformation in Health Care Today’s health groups, hospitals, clinics and ambulatory surgical centers treat more patients than ever before. One in 8 people globally is age 60 or over; by 2050, that statistic will be 1 in 5. In 2015, the Medicare Access & CHIP Reauthorization Act of 2015 (MACRA) pushed Medicare toward value-based reimbursement. As... Mon, 15 May 2017 09:57:17 -0400 Michael Segal Could IoT and Blockchain Be the Next Big Thing? A drug prescribed to a patient becomes visible to all relevant providers, regardless of electronic health record (EHR) systems compatibility. A connected car automatically pays for tolls and parking, and it uses barcode technology to open its trunk to receive a dropped-off package. A Mobility-as-a-Service (MaaS)... Thu, 11 May 2017 08:55:06 -0400 Ron Lifton Digital Transformation Communications Service Providers There is no question upgrading or rebuilding a telecommunications network takes years of careful planning and millions of dollars to implement. The question is, after making such a substantial investment, how can you make sure this new network will deliver on the promises of digital transformation? In Europe, Vodafone... Wed, 10 May 2017 16:52:22 -0400 Michael Segal NETSCOUT Mentorship in Action Balancing a checkbook. Managing credit card debt. Dealing with tax problems. Living within a budget. These are all personal finance issues many of us have faced at one time or another, but for some women, they can be overwhelming. And that’s where Budget Buddies is helping. Budget Buddies is a Massachusetts-based... Wed, 03 May 2017 18:04:55 -0400 NETSCOUT As Cloud Becomes Retail’s Digital Middleman In July 2016, you may have heard that Nordstrom acquired a minority stake in a company called DS Co. DS Co. offers supply chain software called Dsco, which acts as a digital middleman between suppliers and the retailers who sell their products. Tue, 21 Mar 2017 14:14:53 -0400 Ron Lifton New ITU-T Recommendation P.1203 In December 2016, ITU-T SG12 approved recommendation P.1203, which describes algorithms (“models”) that estimate the end user media quality for adaptive streaming sessions. The recommendation is applicable to non-intrusive in-service quality monitoring and contributes to the development of high-quality adaptive bitrate... Mon, 06 Mar 2017 10:19:13 -0500 NETSCOUT Accelerating Big Data Analytics The excitement of achieving business insights with a Big Data Analytics (BDA) solution that will reduce churn and increase Average Revenue per User (ARPU) often leads to unrealistic expectations before the project has even begun. The truth is that for most big data analytics projects the time from conception and sale... Mon, 27 Feb 2017 10:06:47 -0500 John English Building Trust to Build Business Increasing Average Revenue per User (ARPU) and reducing churn, that’s what a service provider cares most about. What does it take to make that happen? Most would say it involves the following: Offering attractive products and services Having a good reputation Delivering quality services that subscriber’s value... Thu, 23 Feb 2017 09:59:02 -0500 John English Accelerating Technology Adoption Virtualization is coming or already underway in your network with Network Function Virtualization/Software-defined Network (NFV/SDN). Long-Term Evolution-Advanced (LTE-A) and 5G are the next mobile technology evolutions in the works. And the Internet of Things (IoT) is here and is expected to explode with billions of... Wed, 22 Feb 2017 09:54:31 -0500 John English Building Trusted Data for Better Business Insights Big Data Analytics users have a rich choice of applications to choose from, but as equally important, it is the choice of data feed(s) that determines the real value of the analytics. Simply said, you cannot have great analytics without smart data! Data quality can be judged by two primary dimensions, data availability... Tue, 21 Feb 2017 09:35:06 -0500 John English Building Trust While Accelerating Network Virtualization Virtualization (Network Function Virtualization – NFV) is the decomposition and decoupling of network functions from proprietary hardware to enable them to operate on off-the-shelf hardware to more efficiently utilize resources and increase agility in service offerings. This leads to microservices in Virtual Machines... Mon, 20 Feb 2017 09:15:01 -0500 John English Building Trust with Customers Trust may seem like an unusual word to use when discussing the relationship with your communications service provider. But trust is a vital part of a business relationship. If I am going to spend my money with a business, I trust that their products and services will do what they say they will, that they are priced... Thu, 16 Feb 2017 11:12:06 -0500 John English History Doesn’t Repeat Itself but it Often Rhymes Taking a look back to the very first Worldwide Infrastructure Security Report (WISR) twelve years ago and of course, many things are vastly different. One thing is clear. Things are more complex today, from the attacks to the infrastructure, and that benefits attackers. Wed, 01 Feb 2017 16:40:25 -0500 Kevin Whalen UC&C: Stay Connected with Service Assurance Even though most enterprises have deployed some type of unified communication and collaboration (UC&C) solution, many fail to get the most from their investment. Art Schoeller, VP and principal analyst for Forrester Research, estimates that 38 percent of users are unaware of the UC&C features they have, and 24 percent... Wed, 01 Feb 2017 16:25:45 -0500 Ron Lifton A Portent for Computing and Society Nearly everything we do today we do with the aid of computers. Genetics are sequenced using computers, buildings are designed, demographics calculated, movies edited, music composed, phone calls made, social graphics analyzed, products ordered and delivered, etc. Wed, 01 Feb 2017 14:28:14 -0500 NETSCOUT A DDoS Attack Only Needs to Be as Large As we look back over 2016, one of the most obvious stories will be the dramatic rise in the weaponization and size of DDoS attacks. At the beginning of 2016 we noted the largest attack being approximately 500Gbps. In the later months of 2016, we saw the monetization of multiple IoT-based botnet DDoS attacks that were... Wed, 25 Jan 2017 17:03:03 -0500 Tom Bienkowski Higher Education’s Lessons on Cybersecurity As my colleague discussed back in September, one of the widest ranging threats to an educational institution’s Information infrastructure today are Distributed Denial of Service (DDoS) attacks - specifically, DDoS as a smoke screen as a diversion tactic for the invasion and exfiltration of business data. In a recent... Wed, 04 Jan 2017 14:00:22 -0500 Jamal Bethea As Algorithms and Data Replace People Machine learning is programmatic at heart. It typically starts with a large amount of data that’s been organized by people. This might be tagged photos, for example. The program analyzes the data closely and sniffs out patterns that correlate with human-made patterns. Thu, 22 Dec 2016 09:44:15 -0500 Ron Lifton Survey Says: Consumer Anxiety About Online Security Throughout this month, we have shared our thoughts on the various themes aligned with National Cybersecurity Awareness Month. This week's theme is "Our Continuously Connected Lives: What’s Your 'App'-titude?" Wed, 26 Oct 2016 13:58:05 -0400 Kevin Whalen Can Big Data Analytics and Privacy Co-Exist? Does your Big Data solution protect your subscriber’s data privacy? Wed, 26 Oct 2016 12:00:41 -0400 John English No “Dumb Pipe” for these Carriers The recently announced acquisition of Time Warner by AT&T speaks to both the fear of service providers becoming relegated to "dumb pipe" or more simply just communication transport providers and to the importance of content to their subscribers and business. Tue, 25 Oct 2016 17:47:31 -0400 John English Living in the Modern Age of Always On Communication Over a dozen years ago, I remember working as a product manager on softswitch services, talking to my manager about the development of “Find Me, Follow Me” service, a precursor to unified communications, that allowed users to define the contact paths of the various communications devices. Tue, 25 Oct 2016 12:00:07 -0400 John English Thrown for a Loss! With all the hype for the “The Internet of Things” (IoT) and Carrier-class Wifi promising to provide a high-quality user experience for a plethora of connected devices it was a stark reminder of where we really are today. Mon, 24 Oct 2016 16:09:48 -0400 John English Cyber Security - Free Apps Come At A Cost October is National Cyber Security Awareness Month, we use the opportunity for a campaign to raise awareness about cybersecurity. In week 3 of the month-long awareness campaign, we focus on the topic of “from the break room to the board room: creating a culture of awareness in the workplace." Mon, 17 Oct 2016 18:42:28 -0400 Deb Briggs Tech Savvy Versus CyberSecurity Savvy October is National CyberSecurity Awareness Month which is an annual campaign to raise awareness about cybersecurity. We live in a world that is more connected than ever before. Look at the number of devices that we have connected to the Internet in our offices and homes. During the month of October, there will be a... Wed, 12 Oct 2016 12:59:40 -0400 Deb Briggs National CyberSecurity Awareness Month October is National CyberSecurity Awareness Month and according to the U.S. Department of Homeland Security, “National CyberSecurity Awareness Month is designed to engage and educate public and private sector partners through events and initiatives to raise awareness about cybersecurity, provide them with tools and... Tue, 04 Oct 2016 22:00:59 -0400 Kevin Whalen Network Traffic Analysis for Security: At Arbor, and at our parent company NETSCOUT, we talk a lot about the value that comes from Network Traffic. Traffic can bring end-to end visibility of all users, applications and services, their activities and locations from a single perspective, allowing security teams to understand trouble spots and threats, and... Tue, 04 Oct 2016 19:47:58 -0400 Arabella Hallawell Digital Success Requires Transformation & Enablement As is so common within the IT industry, the term ‘Digital Transformation’ has been abbreviated. For some unfathomable reason, they’ve chosen ‘DX’ instead of ‘DT’. Don’t worry, we don’t get it either. Nevertheless, if you’re hiring an executive-level person to oversee your Digital Transformation efforts, you’ll be... Tue, 27 Sep 2016 20:19:33 -0400 Ron Lifton Blockchain and the Impact on Digital Transformation While most people outside the technical arena are most familiar with the concept of Bitcoin, the underlying technology behind Bitcoin (and all digital currencies) is blockchain. But there is much more to blockchain than that. It can also be used for purposes like instant verification of network transactions without a... Mon, 26 Sep 2016 19:40:47 -0400 Ron Lifton DDoS Attacks Are Coming Back to School It is that time of year, where kids of all ages are heading back to school, with fresh, unwrapped school supplies in their backpacks with their smartphones, tablets, and laptops. Teacher and school administrators are busy preparing for their new incoming class of students, entering in student data, setting up... Wed, 21 Sep 2016 19:42:42 -0400 Ben Fischer On Blank Stares, Reflecting Ears, and DDoS Attacks . . . A Guest Post by Dr. Edward G. Amoroso, CEO of TAG Cyber LLC Whenever I get those dreaded blank stares from an audience having trouble understanding my clumsy description of the spoofing, reflection, and amplification inherent in distributed denial of service (DDoS) attacks, my lifeline is to jump to an analogy. Here is... Mon, 19 Sep 2016 20:29:49 -0400 NETSCOUT The Stakes Have Changed, Have You? You’ll note a new image on our home page today with the headline “The Stakes Have Changed, Have You?” This is a new focus for our DDoS solution and part of the new look and feel of the Arbor website. Thu, 15 Sep 2016 18:21:49 -0400 Sean Brady AlphaGo Ushers in a New Era of Digital Transformation On the morning of March 9th at the Four Seasons Hotel in Seoul, South Korea, the world changed forever. A computer program called AlphaGo used the relatively new social science of cognitive computing to strategize and beat one of the top masters in the world at the ancient Chinese board game Go. It was hailed as one of... Wed, 07 Sep 2016 20:00:49 -0400 NETSCOUT The Digital Transformation of Financial Transactions Any digital service depends on digital transactions which traverse the service delivery infrastructure encapsulated into IP packets. Many of these transactions originate from apps running on mobile devices and web browsers while others originate from purpose built terminals, such as ATM and NFC enabled cash registers. Wed, 07 Sep 2016 19:38:53 -0400 Michael Segal The Beef with Malware Attacks A well-known fast food restaurant chain, famous for its burgers, was recently hacked and its Point-of-Sale (“POS”) system breached. The result: stolen customer information from more than 5,000 restaurants. Point of Sale systems are vulnerable to attack and just as my colleague reported, the attacks will continue and become more exotic over time. Thu, 01 Sep 2016 18:15:28 -0400 Jamal Bethea Cloud Virtualization Accelerates Digital Transformation In the digital transformation model, a company can commit to the cloud and surge its capacity on an as-needed basis, while switching that capacity to an operating expense, paid for with the increased demand. Find out more about how we can help your organization's digital transformation. Wed, 31 Aug 2016 12:59:21 -0400 Michael Segal How Do You Handle a Swarm of Threats Heading at You? If you saw a swarm of insects flying at you, what would you do? Most likely you would be running away or remembering to duck and cover. A swarm of insects has a lot of similarities to a botnet. Wed, 24 Aug 2016 13:00:25 -0400 Ben Fischer Service Assurance Challenges and Solutions in the SDDC The architecture known as the software-defined data center, or SDDC, is making a tremendous impact on digital services. The SDDC allows IT teams to extend abstraction, pool and automate many aspects of virtualized computing Tue, 23 Aug 2016 13:07:22 -0400 Ron Lifton Decrease Disruption During the Transition to Virtual Software-centric networks represent the next evolution for service providers (SP). With the introduction of Network Functions Virtualization (NFV) and Software Defined Network (SDN) technologies, these networks will become more agile and elastic, better managed and orchestrated with automation, and eventually enable... Thu, 18 Aug 2016 16:58:45 -0400 John English Getting Real About Rio This month, the entire world is watching Rio. Amid police protests, violent crimes, terrorism threats, sanitation concerns, dangerous levels of viruses and bacteria in the water, major public transportation problems, Zika virus, and other fears, many Brazilians like myself are worried that our “cidade maravilhosa,” or... Tue, 16 Aug 2016 11:13:42 -0400 Paula Ellis Escalating Role of Cyber Security in our Geopolitical World In the information security world, we frequently speak of the three pillars of security: confidentiality, integrity, and availability. A viable security posture must take care to protect all three, and it's a delicate balancing act [...] Mon, 08 Aug 2016 13:02:08 -0400 Theresa Abbamondi What Does the Future Hold for Unified Communications The driving forces that are molding and shaping Unified Communications and Collaboration (UC&C) are the same factors that are affecting all aspects of the digital economy: mobility, cloud, and analytics. When you get to the crux of the matter, those are the factors that are shaping all of business, enterprise IT teams... Fri, 05 Aug 2016 13:00:01 -0400 NETSCOUT Cyberhustle – Spotting the Classic Cons at BlackHat I had a chance today with Scott Howitt to have a little fun at BlackHat. I’ve always enjoyed the show over the years for many reasons, not least of which is avoiding taking ourselves too seriously in ways that seem to be the norm at some other security shows. Thu, 04 Aug 2016 15:01:49 -0400 Sam Curry Accelerating Digital Transformation with Business Assurance Digital transformation is not merely about customer-facing applications, services and functionality, but the customer experience is most definitely a key factor and catalyst for the innovative technology changes that are occurring. User experience is intertwined with IT projects like cloud and IoT together with gauging... Thu, 04 Aug 2016 13:00:57 -0400 NETSCOUT How To Transform Your Business With IoT The Internet of Things (IoT) is already changing the world. Most people see it directly in the consumer space, but the true transformation is taking place in the enterprise and in industry. IoT must be a key piece of an organization’s digital transformation or they will quickly fall behind competitors that show more... Wed, 27 Jul 2016 20:41:57 -0400 NETSCOUT HR Stop Asking For Your Seat At The Table I should probably start with a disclaimer. If you are an HR professional with thin-skin, move on from this post immediately. DO NOT CONTINUE READING! In fact, you may not want to read any of the words I write from now on. That’s ok, I won’t be hurt. Mon, 25 Jul 2016 19:16:41 -0400 Skip Maloney Exceed Your Application Development Demands The IT world as we know it is changing. There’s a digital transformation taking place today in which customers are demanding new forms of engagement across numerous touch points. My fellow chief technology officers (CTOs) are at the very heart of the growing push to develop new applications that will allow companies to... Mon, 25 Jul 2016 13:03:19 -0400 Paul Barrett Ready or Not, Digital Transformation is Here The much heralded digital transformation (DX) that we’ve all been hearing about is here. It’s already impacting the way business is done today and it’s certainly going to influence how it will be done in the future. For chief information officers (CIOs) - who are tasked with the responsibility of maintaining legacy IT... Wed, 20 Jul 2016 11:30:39 -0400 NETSCOUT Network Troubleshooting, It’s time to Rethink Our Methods If we do what we always did, we’re going to get what we’ve always gotten. Fixing network problems can be a real pain - especially as IT environments get more complex. Many issues today are intermittent and find new ways to hide from detection, compounding the difficulty in finding the root cause. Despite the increase... Thu, 19 May 2016 11:03:25 -0400 Chris Greer Changing the Business Landscape Forever Small deviations can turn into big problems over time. That’s true whether it’s delivering business services across the IT infrastructure or delivering high value cargo across oceans using merchant vessels. In her book, Longitude, Dava Sobel described how longitude meridians are tempered by time. When a […] Wed, 18 May 2016 16:07:06 -0400 Ron Lifton Industrial Internet of Things (IoT) Technology innovator and entrepreneur, Jay Samit once said that to be successful, innovation should not just be about value creation, but value capture. Thu, 12 May 2016 11:35:59 -0400 NETSCOUT Digital Transformation Becomes the New Norm In 2016, simply having a digital strategy isn’t enough. It isn’t even a safe strategy. Success today requires companies to approach every engagement as part of an overarching strategy of executing policies and practices in a digital world. It has to become part of your organization’s DNA. And as with any transformation... Tue, 10 May 2016 14:07:35 -0400 NETSCOUT March Madness 2016 Streaming Over the Network With the first round of March Madness games starting March 17th, and the second round and Sweet 16 continuing during business hours next week, now is the time to start planning for how your company will handle the increased traffic on your network. CBS & NCAA are streaming all the 2016 NCAA Tournament games live, in hi-definition, and there will certainly be a lot of employees wanting to watch their favorite team while at work. Mon, 21 Mar 2016 15:51:15 -0400 Kevin Morton Cord Cutting. Myth or Reality? I am a cord cutter. I admit it. I’m not ashamed of it. I’m personally saving hundreds of dollars per month. There’s no looking back. Well maybe. Before I get into it, let’s look at the industry in general. Over the past decade, the dynamics of Television and Video delivery have changed dramatically. Linear TV has... Mon, 21 Mar 2016 14:41:36 -0400 Bert Offers Rotary Dial Phone or Unified Communications? What’s better, built-to-last technologies like a rotary dial phone or Unified Communications? As a <em>No Jitter</em> article pointed out, a quaint 1950s rotary dial phone may have a 40 year or more MTBF (mean time between failures) but you don’t get VoIP, presence, integrated chat, desktop sharing and video conferencing. Wed, 02 Mar 2016 17:57:48 -0500 Ron Lifton Embracing Modern UC&C: A Holistic Approach Modern unified communications and collaboration (UC&C) management is changing drastically, as large enterprises embrace new, more complex technology and services. NETSCOUT’s CTO for Enterprise Paul Barrett offers advice to CIOs on how to prepare for modern UC&C management challenges to ensure success. Mon, 22 Feb 2016 16:04:38 -0500 Paul Barrett Real-time Metrics Are Critical to NFV Deployments CSPs will deploy new services faster than ever before, efficient use of network resources will become the expected norm versus the hoped-for goal, and softwarebased network functions will be more widespread. Mon, 08 Feb 2016 21:10:39 -0500 Vikram Saksena Geeks Take Creative Destruction to a New Level According to a TechCrunch article in mid-2015, around 80 technology companies were valued at over $300 billion. Getting into this “unicorn club” is pretty rare but if a company does make it then more than likely they are in a winner takes all market. Here are some statistics to noodle on. Mon, 08 Feb 2016 15:55:32 -0500 Ron Lifton USA Today calls "Lo and Behold" Riveting & Thought-Provoking “Lo and Behold, Reveries of the Connected World,” a 90-minute feature film from filmmaker Warner Herzog in partnership with NETSCOUT, premiered at the 2016 Sundance Film Festival to great reviews. Taking an "ambitious tour of how the web has spread its tentacles into nearly aspect of society," USA Today notes the... Wed, 03 Feb 2016 15:27:10 -0500 NETSCOUT Turn the Lights on - Never Go Home The prevailing wisdom today is that there are two types of companies: Digital Predators and Digital Prey. Which are you. IDC published a report discussing the third platform, which is basically everything digital, where they predicted that the S&P 500 will have a turnover of 75% between 2015 and 2020. Are you entering... Thu, 07 Jan 2016 21:42:22 -0500 NETSCOUT IoT Service Assurance Must Be Built into the Network Everyone’s excited about the Internet of Things (IoT) and it undoubtedly creates great opportunities for consumers and many different types of organisations but the IoT has to be considered from two perspectives – the IoT provider and the IoT user. Thu, 07 Jan 2016 18:07:51 -0500 NETSCOUT Broadband Service Performance Earlier this year, I was attending a conference on Next-Gen technology and services for service providers. As most panel discussions go these days, the topic quickly turned to Title II regulation – also known as Net Neutrality. As the various panel members dodged-and-weaved from actually commenting on Title II, one... Thu, 03 Dec 2015 19:18:16 -0500 Mike Serrano Mobile Workers Need Service Assurance to Get Things Done In an online survey conducted a year ago by Zogby Analytics around 60% of millennials (18 to 34 year olds) said that within the next five years everything will be done on mobile devices. Considering millennials make up around one-third of the workforce, they are having a profound impact on the connected world. Mon, 30 Nov 2015 16:27:19 -0500 Ron Lifton These Are a Few of My Favorite Things to Stay Safe Online As the month of October is coming to a close, so does National Cyber Security Awareness Month. You have most likely seen posts throughout the month on how to stay safe online. I wanted to take this opportunity to share with you some of my favorite tips from Stop | Think | Connect. Keep security software current: Having... Wed, 28 Oct 2015 19:35:46 -0400 Deb Briggs Steps to Ensuring Seamless Video Delivery OTT (Over the Top) How long will you wait for your chosen video to start playing? How long will you stare at a frozen video screen? How long will you suffer a herky-jerky video that cuts in and out? And you pay a monthly service fee for this Over–the-Top (OTT) video service!!!??? Consumers of over-the-top video are not a patient bunch... Thu, 15 Oct 2015 19:31:07 -0400 John English NETSCOUT Guardians of the Connected World Isaac Asimov predicted that we would live in a world filled with useful robots. He was right. Aldous Huxley and Ray Bradbury predicted we would have large parts of society absorbed in a constant stream of media, games and trivial diversions. They were right. George Orwell predicted a world in which Big Brother could... Thu, 15 Oct 2015 18:16:17 -0400 NETSCOUT Top 5 Challenges in OTT (Over the Top) Service Assurance The proliferation of smart devices, Smartphones, tablets, pcs, and wearables (Apple Watch, Fitbit) has changed the way people consume media. Consumers now expect to receive the services they want, wherever they are, whenever they want them, and on any device. While that sounds straightforward enough, assuring that the... Wed, 14 Oct 2015 19:27:59 -0400 John English Knowing Your Environment - A Paradigm Shift is Needed Many organizations don’t know what machines are allowed on their network much less what applications are permitted to access the network from any given host. As such, when a breach occurs that results in malicious software being installed internal to their network, there is very little means to detect such events. Tue, 13 Oct 2015 15:00:03 -0400 Deb Briggs Perception is Reality with OTT Why should service providers care about the user experience of OTT (Over the Top) services? Netflix, Skype, YouTube, Pandora, and other voice/video/data services are all riding over the top of mobile and fixed line broadband networks and essentially getting a free ride. Why should a carrier spend its precious capital... Tue, 13 Oct 2015 14:58:48 -0400 John English It is National Cyber Security Awareness Month It’s October, the leaves are starting to change colors here in the Northeast, and it’s National Cyber Security Awareness Month. The STOP, THINK, CONNECT initiative is in its fifth year. We ALL need to become more cybersecurity aware. Wed, 07 Oct 2015 14:56:23 -0400 Deb Briggs Assuring Wifi Offload to Diffuse Explosion of Mobile Data Mobile service providers face an ongoing challenge to handle the mobile data explosion and potentially declining revenues as the subscriber base becomes saturated. Juniper Research recently projected that mobile data will increase 533 percent from 2014 to 2019. Wifi Offload is the obvious solution to address the mobile... Sat, 03 Oct 2015 19:40:30 -0400 John English Reliability Remains Elusive We have all heard by now about the outages experienced yesterday by United Airlines (UAL), the New York Stock Exchange, and The Wall Street Journal. What we do not know is what exactly happened or what the economic impact was or will be. Thu, 09 Jul 2015 18:13:51 -0400 NETSCOUT And Now, More Mobile Voice With VoWifi! VoWifi (Voice over Wifi) allows cable companies and Multiple System Operators (MSOs) to offer a competitive mobile voice offering with superior voice quality in housing, office and other inside building areas that suffer from poor mobile cell coverage. Similarly, mobile operators can hand over voice calls from their... Wed, 24 Jun 2015 14:57:35 -0400 John English Wifi Anytime, Anywhere! Wifi is seemingly everywhere, and consumers are becoming more dependent upon it to remain connected. Tablets (iPads), PCs, smart phones and other personal devices (watch out, Dick Tracy here is my shiny new Apple Watch!) are connecting to Wifi services at Starbucks, the airport, hotels, parks or virtually anywhere and... Thu, 18 Jun 2015 19:19:40 -0400 John English Making Sure VoLTE Delivers High Def! VoLTE utilizes a family of codecs (G.722) that adapt to the available bandwidth and offer the ability to deliver an enhanced voice quality that may actually sound better to the listener that any landline conversation! Mobile service providers are heralding their new, next-gen VoLTE voice networks as providing the best... Wed, 06 May 2015 19:11:04 -0400 John English How to Remove VoLTE’s Complex Network Monitoring Assuring a VoLTE call essentially means being able to monitor two related sessions simultaneously. Before a voice over LTE session can occur, the subscriber device must connect to both the LTE and IMS networks and then establish a VoLTE session which effectively runs over-the-top (OTT) of the LTE network. To connect to... Tue, 28 Apr 2015 18:58:40 -0400 John English Can They Hear You Now? How do you know that your Voice Over Long-Term Evolution (VoLTE) network is in trouble or delivering a poor next-gen voice network experience? If you are a mobile service provider you care about the quality of voice delivered by your VoLTE network and you want to make sure that it works! Your company is likely... Fri, 24 Apr 2015 15:02:50 -0400 John English The Case for Instrumenting the VoLTE Network The rollout of VoLTE has long been trumpeted as ringing in a new era of mobile voice communications. With VoLTE, operators complete their network and service migration to an all IP-based infrastructure with all the flexibility, cost savings, and benefits of IP networking. But VoLTE is also a disruptive technology that... Mon, 13 Apr 2015 20:29:42 -0400 John English Understanding Service Performance in IP Networks IP networking allows the network to dynamically route packets through multiple paths (non-deterministic) and re-assembles them at the end point, so the receiver is completely unaware of the route each packet traveled. Mon, 13 Apr 2015 20:21:44 -0400 Mike Serrano Hutchison Whampoa Buys O2 Hutchison Whampoa's proposed takeover of O2 dominated the international ICT market last week. At home, the proposed Vodacom/Neotel deal had the most visibility locally. Mon, 23 Mar 2015 19:23:24 -0400 NETSCOUT Scouting Networks to Provide Vantage Points When Henrik Balmer became the CIO of a start-up, balancing the act of "managing risk and driving innovation" was the first objective in his mind. However in a company with multiple business lines, the main challenge that awaited him was the lack of "a single vision of truth." Mon, 23 Mar 2015 19:17:59 -0400 NETSCOUT Collaboration Infrastructure (CCI) & Enterprise IT Success By INDUSTRY PERSPECTIVES on MARCH 5, 2015 Michael Segal is director of solutions marketing at NetScout and a seasoned product management professional with expertise in technical areas such as cloud, virtualization, security, IP networking, mobility, Wi-Fi / wireless, and VoIP / UC. Large Information Technology (IT)... Sun, 22 Mar 2015 19:14:32 -0400 NETSCOUT Service Assurance in Complex Mobile IP Networks As the mobile communications industry makes its way to Barcelona for the 2015 GSMA Mobile World Congress, it’s hard to believe the industry that serves almost as many cellular phones as there are people on the planet had its humble beginnings on the pages of The Saturday Evening Post on July 28, 1945. Back then, in an... Wed, 04 Mar 2015 20:26:40 -0500 Mike Serrano Preparing Operators for Hybrid Environments The trend toward network functions virtualization (NFV) and software defined networking (SDN) continues to gain momentum. That’s not surprising, given that implementing these software technologies can help operators save billions of dollars annually, and increasing service flexibility as well. But those benefits create... Wed, 04 Mar 2015 19:25:35 -0500 Bruce Kelley