Quickly learn the definitions and functions of key networking technologies, and how Netscout incorporates these technologies into products and solutions. These pages can help you understand benefits, what you can do with the technology, and how it works, with links to additional resources.

For education and training specific to Netscout products and solutions, please visit our Support and Services page.

In-depth guides and blogs written by talented network and security experts.

Learn About Cybersecurity

Cybersecurity fundamentals and modern techniques for safeguarding and defending electronic data from cyberattacks.

Learn About Network Monitoring

Key information on getting full network visibility to finally see and understand your entire network

Learn About DDoS Attacks

In a distributed denial-of-service (DDoS) attack, a network of computers work in tandem to overflow an access point and prevent legitimate users from accessing a service.

Learn About Mobile Network Monitoring and 5G

Understanding mobile network technologies to monitor and manage your entire network.

A-B

What is an Access Control List?

An Access Control List (ACL) is A list of permissions associated with an object. The list specifies who or what is allowed to access the object and what operations are allowed to be performed on the object. A mechanism that implements access control for a system resource by enumerating the system entities that are permitted to access the resource...

An Access Control List (ACL) is

  1.  A list of permissions associated with an object. The list specifies who or what is allowed to access the object and what operations are allowed to be performed on the object.
  2. A mechanism that implements access control for a system resource by enumerating the system entities that are permitted to access the resource and stating, either implicitly or explicitly, the access modes granted to each entity.

What is Advanced Persistent Threat (APT)?

An Advanced Persistent Threat (APT) is an adversary that possesses sophisticated levels of expertise and significant resources, which allow it to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception). These objectives typically include establishing and extending footholds within the...

An Advanced Persistent Threat (APT) is an adversary that possesses sophisticated levels of expertise and significant resources, which allow it to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception). These objectives typically include establishing and extending footholds within the information technology infrastructure of the targeted organizations for purposes of exfiltrating information, undermining or impeding critical aspects of a mission, program, or organization; or positioning itself to carry out these objectives in the future. The advanced persistent threat: (i) pursues its objectives repeatedly over an extended period of time; (ii) adapts to defenders’ efforts to resist it; and (iii) is determined to maintain the level of interaction needed to execute its objectives.

What is an Agent?

A host-based intrusion detection and prevention program that monitors and analyzes activity and may also perform prevention actions.

What is an airlink status?

An airlink status is the state of a radio link in mobile communications over which a particular data session is transmitted.

What is an Alert?

A notification of an important observed event.

What is an Analyzer?

The function of an IDS that applies analytical processes to collected IDS data in order to derive conclusions about potential or actual intrusions.

Cybersecurity Awareness Month

In case you missed it...

Every October, the NETSCOUT team promotes the conversation around Cybersecurity Awareness Month. We share resources and expertise on how everyone, from end users to service providers, can improve their cyber literacy, keep up with the newest technologies, and join the industry.

Each week of CSAM, we unveil new content, and then keep it accessible throughout the following calendar year.

Cybersecurity Awareness Month

More questions? Talk to an expert.