Endpoint Security Sample Clauses

Endpoint Security. Industry-standard firewalls are in place and configured to only permit traffic on ports necessary for the functioning of the Service with all others denied by default.
AutoNDA by SimpleDocs
Endpoint Security. (a) You may install the “agent” software component of the Endpoint Security Product on the number of Endpoints (or “Nodes”) stated in the applicable Grant Letter. For Endpoint Security Product, “Nodes” or “Endpoints” are computing devices owned or controlled by You (such as laptops, workstations, and servers), on which You install the agent software. (b) Your purchase of Endpoint Security on a Subscription basis may either be an Enterprise Edition version or a Per-User Edition Version. • The Enterprise Edition versions of the Product are licensed according to the number of Endpoints purchased.
Endpoint Security. 24x7 endpoint security monitoring and management for 101 desktops and servers - 1 year.
Endpoint Security. CityBridge will not scan or monitor web content for viruses or harmful applications. Users are expect to install and maintain antivirus and adhere to security best practices. To eliminate peer-to-peer security threats, wireless device peer-to-peer communication will be blocked at the network level.
Endpoint Security. We may provide trial accounts for our endpoint security upon the request of a customer. This free trial is at no cost to the customer. VoltHosting partners with ESET for our endpoint security. Thus, the customer must adhere to ESETs XXXX and terms of service for the ESET products the customer uses. If the customer wishes to increase the number of devices they are protected on, the customer must contact VoltHosting to arrange the increase. VoltHosting will manage the ESET service for the customer. The customer can request access to an administrative account if required for internal auditing but should not amend any settings within the portal. VoltHosting does not assume any responsibility for any misconfiguration of ESET services which may cause damage, outages, data loss, data breaches or otherwise effect the customer negatively. VoltHosting will be held harmless in these cases.
Endpoint Security. Ntrepid will maintain suitably-designed endpoint security controls for Ntrepid Systems, that include but are not limited to: 6.1 Processes for provisioning, and hardening, in addition to anti-virus/anti- malware software and patching updates to the same; 6.2 Encryption of all Ntrepid System hard drives (e.g., desktops, laptops, workstations, servers, mobile devices) that contain Customer Confidential Information; 6.3 Encryption of Customer Confidential Information that Ntrepid transmits or sends wirelessly or across public networks, using prevailing industry standards for encryption while in transit and at rest; 6.4 Safeguards for all encryption keys associated with Customer Confidential Information; and 6.5 Management of security configurations of Ntrepid Systems based on prevailing industry standards to protect Customer Confidential Information from a Security Incident.
Endpoint Security. The Services receive and deliver documents to and from Customer environments. Customer documents are scanned using anti-malware solutions when stored and processed within Basware environments. Documents detected to contain malware may be quarantined or deleted depending on the case. Where applicable, Basware provides reports for such rejected documents to Customer.
AutoNDA by SimpleDocs
Endpoint Security. Ntrepid will maintain suitably-designed endpoint security controls for Ntrepid Systems, that include but are not limited to:
Endpoint Security. Data Processor shall ensure that endpoints used for Processing are protected. Minimum requirements: a. Endpoints shall be installed with managed anti-malware with up to date versions that will ensure up- to-date protection or other similar mitigation mechanisms to protect against malware. b. Endpoints shall be protected with personal firewall. c. External storage devices shall be not be used to store Controller data unless the device is fully encrypted. d. Endpoints shall be installed with latest Operating System and application updates/patches. e. Endpoints shall be managed with clear registration and decommissioning process. If the endpoints are decommissioned or reallocated to other personnel, then the data is wiped in such a manner that it is not recoverable. f. All unnecessary and insecure services shall be disabled on endpoints.
Endpoint Security. At this time, Endpoint Security is not subject to the SLAs described in this document.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!