TTG International

  • Home
  • About Us
    • Who we are?
    • Our Strategy
    • Our Vision
    • Research & Development
    • Research & Development Projects
    • Partners
    • Our Clients
    • Quality Policy
    • Patents
    • Awards & Recognition
    • Memberships
    • Our Philosophy
  • Products
  • Services
    • Professional Services
    • Training
    • Customer Support
    • Tailored Software Solutions
    • AI Transformation in Telecommunications
  • Career
  • Read
    • Blog
    • News-Press
  • Download
    • White Papers
    • Knowledge
    • Case Study
  • Contact Us
  • TTG AITTG AI Logo
  • 0
ttg
Friday, 09 March 2012 / Published in Blog

Vodafone Turkey NORTH-II

NORTH-I user Vodafone Turkey has decided to enhance system with the NORTH-I/ABID (Anomaly Based Intrusion Detection) to improve near real-time notification of network performance anomalies. Its performance profiling builds a picture of activity and automatically detects any major change in behavior. The solution is complemented by NORTH-I/PAV (Performance Alarm Viewer) which monitors both performance and
ABID (Anomaly Based Intrusion Detection)network performance analysis automationNetwork Performance Monitoring tool NORTH-INORTH-I/ABIDNORTH-I/PAV (Performance Alarm Viewer)NORTH/ABID integration in Vodafone TurkeyOperating Support Systems (OSS) solutionsPAV (Performance Alarm Viewer)real-time network performance anomalies notificationtelecommunicationsVodafone Turkey

Centralized Network Performance Management, Centralized Fault & Alarm Management, Leased Line Inventory, Anomaly Detection, Configuration Management, Transmission Inventory and Planning, CEIR (Central Equipment Identity Register), Mobile Number Portability (MNP) and Power-line Monitoring.

 

 

Code of Ethics and Business Conduct

 

Reşadiye Mahallesi, Reşadiye Caddesi No: 110/1 Çekmeköy, 34799 Istanbul, Turkey

+90 (0) 850 800 0 884

info@ttgint.com

© 2024 ttgint.com All rights reserved.

About Us     ·      Kişisel Verilerin Korunması ve İmha Politikası     ·      Bilgi Güvenliği Politikası     ·   Contact Us

TOP