Falcon Platform Sample Clauses

Falcon Platform. The ‘Falcon EPP Platform’ uses a crowd-sourced environment, for the benefit of all customers, to help customers protect themselves against suspicious and potentially destructive activities. CrowdStrike’s Products are designed to detect, prevent, respond to, and identify intrusions by collecting and analyzing data, including machine event data, executed scripts, code, system files, log files, dll files, login data, binary files, tasks, resource information, commands, protocol identifiers, URLs, network data, and/or other executable code and metadata. Customer, rather than CrowdStrike, determines which types of data, whether Personal Data or not, exist on its systems. Accordingly, Customer’s endpoint environment is unique in configurations and naming conventions and the machine event data could potentially include Personal Data. CrowdStrike uses the data to: (i) analyze, characterize, attribute, warn of, and/or respond to threats against Customer and other customer, (ii) analyze trends and performance, (iii) improve the functionality of, and develop, CrowdStrike’s products and services, and enhance cybersecurity; and (iv) permit Customers to leverage other applications that use the data, but for all of the foregoing, in a way that does not identify Customer or Customer’s Personal Data to other customers. Neither Execution Profile/Metric Data nor Threat Actor Data are Customer’s Confidential Information or Customer Data.
AutoNDA by SimpleDocs
Falcon Platform. The 'Falcon EPP Platform' uses a crowd-sourced environment, for the benefit of all customers, to protect customers against suspicious and potentially destructive activities. CrowdStrike's Products are designed to detect, prevent, respond to, and identify intrusions by collecting and analyzing data, including machine event data, executed scripts, code, system files, log files, dll files, login data, binary files, tasks, resource information, commands, protocol identifiers, URLs, network data, and/or other executable code and metadata. CrowdStrike uses the data to analyze, characterize, attribute, warn of, and/or respond to threats against you and other customers, analyze trends and performance, improve the functionality of, and develop, CrowdStrike's products and services, and enhance cybersecurity. Neither Execution Profile/Metric Data nor Threat Actor Data are your Confidential Information.
Falcon Platform. The Falcon EPP Platform uses a crowd-sourced environment, for the benefit of all customers, to help customers protect themselves Products are designed to detect, prevent, respond to, and identify intrusions by collecting and analyzing data, including machine event data, executed scripts, code, system files, log files, dll files, login data, binary files, tasks, resource information, commands, protocol identifiers, URLs, network data, and/or other executable code and metadata. Customer, rather than CrowdStrike, determines which types of data, whether Personal Data or not, exist on its systems. machine event data could potentially include Personal Data. CrowdStrike uses the data to: (i) analyze, characterize, attribute, warn of, and/or respond to threats against Customer and other customer, (ii) analyze trends and performance, (iii) enhance cybersecurity; and (iv) permit Customers to leverage other applications that use the data, but for all of . Neither Execution Profile/Metric Data nor Threat Actor Data are Confidential Information or Customer Data.
Falcon Platform. The ‘Falcon EPP Platform’ uses a crowd-sourced environment, for the benefit of all customers, to help customers protect themselves against suspicious and potentially destructive activities. The Contractor’s Services are designed to detect, prevent, respond to, and identify intrusions by collecting and analyzing data, including machine event data, executed scripts, code, system files, log files, dll files, login data, binary files, tasks, resource information, commands, protocol identifiers, URLs, network data, and/or other executable code and metadata. The Subscriber, rather than the Contractor, determines which types of data, whether personal data or not, exist on its systems. Accordingly, the Subscriber’s endpoint environment is unique in configurations and naming conventions and the machine event data could potentially include Subscriber’s Data, including personal data. The Contractor uses the data to: (i) analyze, characterize, attribute, warn of, and/or respond to threats against the Subscriber and other customers, (ii) analyze trends and performance, (iii) improve the functionality of, and develop, the Contractor’s products and services, and enhance cybersecurity; and (iv) permit customers to leverage other applications that use the data, but for all of the foregoing, in a way that does not identify the Subscriber or identify or disclose personal data to other customers.

Related to Falcon Platform

  • Platform (i) Each Loan Party agrees that the Administrative Agent may, but shall not be obligated to, make the Communications (as defined below) available to the Lenders by posting the Communications on Debt Domain, Intralinks, Syndtrak or a substantially similar electronic transmission system (the “Platform”).

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!