ESG Research Report: The Evolving Role of NDR Download Here
Skip to Main Content

Glossary

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

a

Application Performance Management

Application performance management, or APM, is a type of software-based monitoring solution that manages the traffic of applications used by an organization.

e

Encrypted Network Traffic

Encryption is a data security practice that converts normal, readable information into an unintelligible cypher. Once network traffic is encrypted, it can only be accessed by authorized users with a key, or by advanced encryption practices that can decode cyphertext. This process allows organizations to safely move confidential and sensitive information around without exposing it to bad actors.

f

Fiber Distributed Data Interface (FDDI)

Fiber Distributed Data Interface (FDDI) is a 100-Mb/sec fiber optic local area network standard standard developed by the American National Standards Institute (ANSI) for transmitting data over local area networks (LAN).

Flow Monitoring

Flow monitoring aims to give IT teams information about the traffic that crosses through their network as well as how their network is performing on a daily basis.

h

Hyperscale

Hyperscale is a term used to describe the ability to scale up network resources like memory or CPU on demand and without limits.

i

IEEE 802.3

IEEE 802.3 is a combination of standards and protocols defined by the Institute of Electrical and Electronics Engineers (IEEE).

Internet Protocol (IP)

Internet Protocol (IP) was originally designed to operate on top of Version 2 Ethernet.

IPFIX

IPFIX was developed by the Internet Engineering Task Force (IETF) in 2013.

l

Lateral Movement

Lateral Movement consists of techniques that adversaries use to enter and control remote systems on a network.

m

MTTR for Network Troubleshooting

The mean time to repair or MTTR is the average time required to solve a failed computer system.

n

Netflow

NetFlow is a network protocol developed by Cisco in order to collect and monitor IP network traffic.

Network Capacity Planning

Network Capacity Planning is ensuring that the network has the resources it needs to prevent an impact on business-critical applications.

Network Detection and Response

Network detection and response (NDR) platforms use technology that continuously monitors and detects anomalies and malicious activity on corporate networks using machine learning (ML) and data analytics. NDR platforms enables enterprises to monitor all network traffic, allowing them to react and respond to all threats.

Network Monitoring

Network monitoring gives IT teams insight into network health and performance so they can take corrective steps to improve the functionality of their network.

Network Performance Metrics

Network performance metrics are a collection of metrics that measure how well or poorly a network performs.

Network Toplogy

Network topology describes the way a network is arranged.

Network Topology Mapping

Network topology mapping is the practice of graphing a communication network’s topology and representing all its nodes and links. This is easily achieved using network topology software.

Network Troubleshooting

Network troubleshooting is the systematic process of searching for, diagnosing, and correcting network issues.

NPM

An NPM or network performance monitoring solution is a term used to describe the process of monitoring, measuring, adjusting, troubleshooting, and analyzing the quality of network performance.

p

Packet Analysis

Packet analysis is a primary traceback technique in network forensics, which, providing that the packet details captured are sufficiently detailed, can play back even the entire network traffic for a particular point in time.

Packet Capture (PCAP)

Packet capture is used for analyzing, troubleshooting, and optimizing network performance.

Packet Loss

Packet loss causes reduced throughput, diminished security, and other issues in your network. Learn about causes and effects and how you can mitigate its impact. 

r

Ransomware

By encrypting “stolen” files and demanding a ransom payment for the decryption key, bad actors force organizations to pay a ransom because it is sometimes the easiest and most cost-effective way to regain access to the files.

s

SD-WAN

SD-WAN, or software-defined wide area network, is a wide area network that uses software to control network operations across different geographies.

t

Threat Hunting

Threat hunting is the practice of an organization’s security operations center (SOC) to proactively search for cyber threats that are lurking undetected in an organization’s network.

TLS 1.3

TLS 1.3 is a cybersecurity acronym for Transport Layer Security, version 1.3.