Quickly learn the definitions and functions of key networking technologies, and how Netscout incorporates these technologies into products and solutions. These pages can help you understand benefits, what you can do with the technology, and how it works, with links to additional resources.

For education and training specific to Netscout products and solutions, please visit our Support and Services page.

In-depth guides and blogs written by talented network and security experts.

Learn About Cybersecurity

Cybersecurity fundamentals and modern techniques for safeguarding and defending electronic data from cyberattacks.

Learn About Network Monitoring

Key information on getting full network visibility to finally see and understand your entire network

Learn About DDoS Attacks

In a distributed denial-of-service (DDoS) attack, a network of computers work in tandem to overflow an access point and prevent legitimate users from accessing a service.

Learn About Mobile Network Monitoring and 5G

Understanding mobile network technologies to monitor and manage your entire network.

What is an Extortion DDoS Attack?

A DDoS extortion attack, also known as a ransom DDoS (RDDoS) attack, occurs when cybercriminals threaten individuals or organizations with a DDoS incursion unless an extortion demand is paid. These demands call for payment in cryptocurrency in order to avoid traceability by law enforcement authorities. DDoS extortion/RDDoS attacks should not be...

A DDoS extortion attack, also known as a ransom DDoS (RDDoS) attack, occurs when cybercriminals threaten individuals or organizations with a DDoS incursion unless an extortion demand is paid. These demands call for payment in cryptocurrency in order to avoid traceability by law enforcement authorities. DDoS extortion/RDDoS attacks should not be confused with ransomware attacks, in which malicious software encrypts an organization’s systems and databases, preventing legitimate owners and users from accessing them until the ransom is paid.

What is an HTTP Flood DDoS Attack?

An HTTP flood DDoS attack utilizes what appear to be legitimate HTTP GET or POST requests to attack a web server or application. These flooding DDoS attacks often rely on a botnet, which is a group of Internet-connected computers that have been maliciously appropriated through the use of malware such as a Trojan Horse.

What is Arbor Strategic Development (ASD)?

Initiative to focus on areas of necessary behavioral change for each market (Top 100, SME Market and Large Enterprise)

What is Cloud?

Cloud based technology that can detect and mitigate the full spectrum of today’s complex DDoS attacks. Establishes first-line defense against volumetric, state-exhaustion and application-layer DDoS attacks.

What is Combined Arms?

A doctrine in military science that combines different branches of the military (e.g. artillery, armor, infantry, etc.) tactically. This doctrine holds that the most effective results are achieved with the tightest integration among branches at the unit level. This is used as an analogy in both cyber offense and defense, where for instance...

A doctrine in military science that combines different branches of the military (e.g. artillery, armor, infantry, etc.) tactically. This doctrine holds that the most effective results are achieved with the tightest integration among branches at the unit level. This is used as an analogy in both cyber offense and defense, where for instance attackers use DDoS and convention APT tools for maximum effect or where defenders use threat intelligence, advanced threat and identity tools for optimal protection.

Controversy: The security industry is inundated with FUD and military analogies. Some customers, partners and vendors are sick of martial analogy and language. Use this sparingly unless your audience doesn’t mind military terminology.

What is Command Authority?

Individual responsible for the appointment of user representatives for a department, agency, or organization and their key ordering privileges.

Cybersecurity Awareness Month

Every October, the NETSCOUT team promotes the conversation around Cybersecurity Awareness Month. We share resources and expertise on how everyone, from end users to service providers, can improve their cyber literacy, keep up with the newest technologies, and join the industry.

Learn how to stay safe online with our helpful resources.

Cybersecurity Awareness Month

More questions? Talk to an expert.