Endpoint Security Sample Clauses

Endpoint Security. You may install the “agent” software component of the Endpoint Security Product on the number of Endpoints (or “Nodes”) stated in the applicable Grant Letter. For Endpoint Security Product, “Nodes” or “Endpoints” are computing devices owned or controlled by You (such as laptops, workstations, and servers), on which You install the agent software. Your purchase of Endpoint Security on a Subscription basis may either be an Enterprise Edition version or a Per-User Edition Version. The Enterprise Edition versions of the Product are licensed according to the number of Endpoints purchased.
AutoNDA by SimpleDocs
Endpoint Security. 1. Industry-standard firewalls are in place and configured to only permit traffic on ports necessary for the functioning of the Service with all others denied by default. Server Security
Endpoint Security. Ntrepid will maintain suitably-designed endpoint security controls for Ntrepid Systems, that include but are not limited to:
Endpoint Security. We may provide trial accounts for our endpoint security upon the request of a customer. This free trial is at no cost to the customer. VoltHosting partners with ESET for our endpoint security. Thus, the customer must adhere to ESETs XXXX and terms of service for the ESET products the customer uses. If the customer wishes to increase the number of devices they are protected on, the customer must contact VoltHosting to arrange the increase. VoltHosting will manage the ESET service for the customer. The customer can request access to an administrative account if required for internal auditing but should not amend any settings within the portal. VoltHosting does not assume any responsibility for any misconfiguration of ESET services which may cause damage, outages, data loss, data breaches or otherwise effect the customer negatively. VoltHosting will be held harmless in these cases.
Endpoint Security. 24x7 endpoint security monitoring and management for 101 desktops and servers - 1 year. MPEA Contract Change Order SECTION B: COST ESTIMATE Services Description Cost Network Analysis and Separation Resources: Sr. Microsoft Systems Engineer - Xxxx Xxxx (10 weeks) $61,000 Sr. Delivery Executive - Xxxxxx Xxxxxxx (8 hours per week) SharePoint Administration Resources: Sr. Solutions Architect - Xxx Xxxxxxxxxx (pool of 80 hours) $16,000 SCCM Implementation and Administration Resources: Systems Architect TBD - (20 hours) Sr. Microsoft Systems Engineer - TBD (3.5 weeks) $20,000 Ongoing updates and application installations will be billed against existing support hours. Endpoint Security 24x7 endpoint security monitoring and management for 101 desktops and servers - 1 year $13,456 Total Estimated $110,456 Estimated Cost Outside of Revised
Endpoint Security. At this time, Endpoint Security is not subject to the SLAs described in this document.
Endpoint Security. CityBridge will not scan or monitor web content for viruses or harmful applications. Users are expect to install and maintain antivirus and adhere to security best practices. To eliminate peer-to-peer security threats, wireless device peer-to-peer communication will be blocked at the network level.
AutoNDA by SimpleDocs
Endpoint Security. Data Processor shall ensure that endpoints used for Processing are protected. Minimum requirements:
Endpoint Security. The Services receive and deliver documents to and from Customer environments. Customer documents are scanned using anti-malware solutions when stored and processed within Basware environments. Documents detected to contain malware may be quarantined or deleted depending on the case. Where applicable, Basware provides reports for such rejected documents to Customer. Relevant Service components (e.g. servers) are also scanned for malware and monitored to detect malicious programs and files. Basware office environments are equipped with malware protection for workstations, internal servers, email attachments and other collaboration tools.
Endpoint Security. Veego protect its endpoints against malware, ransomware, and exploitation using a leading Endpoint Protection Platform (EPP) and Endpoint Detection and Response (EDR) solution. Veego ensure endpoint security posture (e.g., approves operations systems and versions, host firewall, security patches, disk encryption, password-protection, lock screen after inactivity period, etc.).
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!