You are here

Resources

DLT provides an abundance of current educational resources about each of our vendor partners and technology sectors. Discover webinars, timely whitepapers, instructional videos, e-books on hot topics in tech, case studies about our products in action, upcoming events and conferences, data sheets, and more.

Filter Resources

Data Sheet
Hardware-accelerated packet optimization for performance monitoring and security systems on 40G networks.
Added: January 25, 2019
QuickLook
Organizations are implementing Microsoft® Skype for Business (Skype) Unified Communications and Collaboration (UC&C) services (including the former Microsoft Lync® technology) to improve communications, productivity, and collaboration among their employees, partners, and customers. The Skype collaboration platform is designed to connect with anyone, anywhere, on any device. The solution also offers enterprises the benefit of integrating with Microsoft Office products and Microsoft® Exchange environments.
Added: January 25, 2019
Video
Memcache is an open source, distributed memory caching system used to help improve the speed of websites. According to Shodan site, there are over 80,000 Memcached servers worldwide that are using a default insecure configuration and are being abused to launch reflection/amplification DDoS attacks.
Added: January 25, 2019
Video
You could feel the change in the air back then. What was once one-to-one, became one-to-many, then one-to-all. Visibility and control was vanishing into a cloud. For some the change was too quick to adapt to, for others, too complex to defend. We couple data from the networks of old, to the designs of the new, shaping it to become smarter. We disrupted ourselves to advance our intelligence and arm those who would follow with the smartest and most affordable data in the world.
Added: January 25, 2019
Video
Added: January 25, 2019
Solution Brief
GDPR, HIPAA, PCI-DSS, etc. define the types of personal data that may be collected and recorded, as well as where this data can be sent. To ensure compliance, networking and security teams need to understand which countries’ data will be traversing the network, what paths the data will take, where the data will be stored, and all the locations that will have monitoring tools and security applications deployed.
Added: January 25, 2019
Solution Brief
The NETSCOUT® packet deduplication capability removes packet duplicates and provides a substantial reduction in the volume of traffic to the tools. This provides an increase in tool efficiency, a reduction in errors on the monitoring tool, and a closure of security holes that exist in other implementations. The deduplication capability includes selective packet deduplication, keyed secure hash for identifying duplicates, configurable duplicate packet tracking time window, discard of all subsequent duplicates of any packet within the specified time window, and the generation of duplicated traffic statistics.
Added: January 25, 2019
Solution Brief
To stop modern-day DDoS attacks, Arbor offers a comprehensive portfolio of fully integrated, incloud and on-premise DDoS protection products and services; all backed by continuous global threat intelligence.
Added: January 25, 2019
QuickLook
NETSCOUT® nGenius® packet flow systems (PFS) collect and organize the flow of traffic from the network to the security systems and monitoring tools — creating a unified packet plane that logically separates the network layer from the tool layer.
Added: January 25, 2019
QuickLook
Service providers, private clouds, and large enterprises must contend with the collection, processing, and aggregation of traffic from a high number of network segments, while addressing space and power constraints in the data center and managing the migration to 40 and 100Gbps network infrastructure.
Added: January 25, 2019
QuickLook
The nGenius® 5000 series packet flow switch (PFS) provides cost-effective edge aggregation for cybersecurity and service assurance monitoring. The nGenius 5000 series packet flow switch models operate at speeds from 1GbE to 100GbE, providing core packet broker functionality, including filtering, load balancing, aggregation, and replication.
Added: January 25, 2019
QuickLook
Service providers, private clouds, government organizations, and enterprises must contend with the collection, processing, and aggregation of traffic from a number of network segments. They also need to address space and power constraints in the data center, while managing the migration from 10 Gbps to40 Gbps networks infrastructure.
Added: January 25, 2019
Video
Learn how the self-organizing NETSCOUT pfsMesh enables resilient, high-availability access in the data center and across large deployments.
Added: January 25, 2019
Video
Software-driven, open compute-based network packet brokers give you complete and pervasive visibility—for inline (active) or out-of-band (passive) security. They are easy to use, affordable, and scalable to meet your exacting security and network monitoring needs.
Added: January 25, 2019
Whitepaper
NETSCOUT Arbor produces this annual report based upon a survey that specifically includes individuals within the operational security community. Survey participation continues to grow despite additional efforts to encourage recusal of respondents without direct network or security operational experience.
Added: January 25, 2019

Pages