Endpoint Security Sample Clauses

Endpoint Security. You may install the “agent” software component of the Endpoint Security Product on the number of Endpoints (or “Nodes”) stated in the applicable Grant Letter. For Endpoint Security Product, “Nodes” or “Endpoints” are computing devices owned or controlled by You (such as laptops, workstations, and servers), on which You install the agent software. Your purchase of Endpoint Security on a Subscription basis may either be an Enterprise Edition version or a Per-User Edition Version. The Enterprise Edition versions of the Product are licensed according to the number of Endpoints purchased.
AutoNDA by SimpleDocs
Endpoint Security. 1. Industry-standard firewalls are in place and configured to only permit traffic on ports necessary for the functioning of the Service with all others denied by default. Server Security
Endpoint Security. Ntrepid will maintain suitably-designed endpoint security controls for Ntrepid Systems, that include but are not limited to:
Endpoint Security. CityBridge will not scan or monitor web content for viruses or harmful applications. Users are expect to install and maintain antivirus and adhere to security best practices. To eliminate peer-to-peer security threats, wireless device peer-to-peer communication will be blocked at the network level.
Endpoint Security. Data Processor shall ensure that endpoints used for Processing are protected. Minimum requirements:
Endpoint Security. At this time, Endpoint Security is not subject to the SLAs described in this document.
Endpoint Security. The Services receive and deliver documents to and from Customer environments. Customer documents are scanned using anti-malware solutions when stored and processed within Basware environments. Documents detected to contain malware may be quarantined or deleted depending on the case. Where applicable, Basware provides reports for such rejected documents to Customer. Relevant Service components (e.g. servers) are also scanned for malware and monitored to detect malicious programs and files. Basware office environments are equipped with malware protection for workstations, internal servers, email attachments and other collaboration tools.
AutoNDA by SimpleDocs
Endpoint Security. Veego protect its endpoints against malware, ransomware, and exploitation using a leading Endpoint Protection Platform (EPP) and Endpoint Detection and Response (EDR) solution. Veego ensure endpoint security posture (e.g., approves operations systems and versions, host firewall, security patches, disk encryption, password-protection, lock screen after inactivity period, etc.).
Endpoint Security. Wolters Kluwer implements and maintains security mechanisms on endpoints, including firewalls, automated locking of devices after a specified period of inactivity, updated anti-virus, an advanced endpoint detection and response (EDR) solution, and full disk encryption. Wolters Kluwer restricts personnel from disabling security mechanisms.

Related to Endpoint Security

  • Account Security User agrees and acknowledges that to the extent applicable, it will: (i) maintain strict confidentiality of all names, passwords, or other credentials of User’s Authorized End Users; (ii) instructing its Authorized End Users not to allow others to obtain or use their credentials or to access the Software. User is responsible for any costs or damages incurred due to unauthorized use or access through User’s Authorized End Users’ account credentials or systems.

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • Payment Security To secure all of CAISO’s payment obligations to Owner under this Agreement, CAISO agrees to grant Owner a security interest and lien in the following collateral (collectively, the “Collateral”): (a) all past, present and future accounts and other amounts Responsible Utility owes CAISO at any time pursuant to Section 41 of the CAISO Tariff attributable to invoices submitted by Owner under this Agreement (collectively, the “Accounts”), (b) the RMR Owner Facility Trust Account, all funds in the RMR Owner Facility Trust Account at any time, and all funds paid on account of any Accounts, (c) all proceeds of the Collateral, if any, and (d) all of CAISO’s right, title and interest in the Collateral. CAISO represents and warrants to Owner that (a) CAISO has the authority to grant such security interest, (b) CAISO will have good, marketable and exclusive title to all of the Collateral, (c) such security interest and lien will at all times be a valid, enforceable and first-priority lien on the Collateral, and (d) such security interest will be duly perfected by the filing of a financing statement under the California Uniform Commercial Code describing the Collateral in the office of the Secretary of State of California and the delivery of a written notice of Owner’s security interest to the bank with which the RMR Owner Facility Trust Account is maintained. If CAISO defaults on its obligation to pay under this Agreement, Owner shall be entitled to enforce such securityinterest, to exercise its rights in the Collateral, to collect the Accounts from Responsible Utility, to collect all funds in the RMR Owner Facility Trust Account, and to exercise all other rights and remedies under the California Uniform Commercial Code. CAISO agrees to promptly execute and deliver all financing statements and other documents Owner reasonably requests, including but not limited to a written notice of Owner’s security interest in the Collateral to the bank with which the RMR Owner Facility Trust Account is maintained, in order to maintain, perfect and enforce such security interest.

  • Security Notwithstanding anything herein to the contrary, except for Section 27, to the extent requested by Indemnitee and approved by the Board, the Company may at any time and from time to time provide security to Indemnitee for the Company’s obligations hereunder through an irrevocable bank line of credit, funded trust or other collateral. Any such security, once provided to Indemnitee, may not be revoked or released without the prior written consent of Indemnitee.

Time is Money Join Law Insider Premium to draft better contracts faster.