Difference between revisions of "Network Operations Center (NOC)"
(Created page with "A '''network operations center NOC''' is a centralized location where a company and their staff can provide supervision 24 hours a day to help monitor and manage a company's s...") |
m (The LinkTitles extension automatically added links to existing pages (https://github.com/bovender/LinkTitles).) |
||
Line 1: | Line 1: | ||
− | A '''network operations center NOC''' is a centralized location where a company and their staff can provide supervision 24 hours a day to help monitor and manage a company's services, databases, external services, firewalls, and network. So basically, a NOC is the basis of a company's nervous system. In the matter of security, a NOC is often the first line of defense against any attacks or disruptions a company or enterprise might experience with their telecommunication networks.<ref>Definition - What is Network Operations Center (NOC)? [https://www.extnoc.com/network-operations-center/ Extnoc]</ref> | + | A '''[[network]] operations center NOC''' is a centralized location where a company and their staff can provide supervision 24 hours a day to help monitor and manage a company's services, databases, external services, firewalls, and network. So basically, a NOC is the basis of a company's nervous [[system]]. In the matter of security, a NOC is often the first line of defense against any attacks or disruptions a company or enterprise might experience with their telecommunication networks.<ref>Definition - What is Network Operations Center (NOC)? [https://www.extnoc.com/network-operations-center/ Extnoc]</ref> |
Revision as of 17:15, 6 February 2021
A network operations center NOC is a centralized location where a company and their staff can provide supervision 24 hours a day to help monitor and manage a company's services, databases, external services, firewalls, and network. So basically, a NOC is the basis of a company's nervous system. In the matter of security, a NOC is often the first line of defense against any attacks or disruptions a company or enterprise might experience with their telecommunication networks.[1]