This article shows where NOC has points of presence (POP) for the CDN.
This article explains how protect SSH using IP Authentication.
This article explains how to configure continuous monitoring with the NOC monitoring service.