Host Security Sample Clauses

Host Security. First Community Bank web server does not connect directly to the Internet. It is buffered from the Internet through the use of a firewall. All access from outside the bank must go through this firewall, which screens the requests and allows only valid https traffic to reach the server. First Community Bank Internet Banking makes use of an ICSA-certified firewall.
AutoNDA by SimpleDocs
Host Security a. The ASP must disclose how and to what extent the hosts or servers (Unix, Windows, etc.) comprising its application infrastructure have been hardened against potential threats and attack vectors. The ASP shall provide any hardening documentation it has for the Department or authorizing External Entity’s application infrastructure as well.
Host Security. When a Third Party is logged into the Authoritys network they should not leave the host they are logged onto unattended. Workstations/laptops that are used to display data should be located in such a way that confidential information is not displayed to unauthorised persons or the general public. Up-to-date Virus checking software & Anti- spyware/Malware software must be installed on any relevant devices that are being used to access the Authorities network or attached devices and these devices must be up to date with relevant operating system patches.
Host Security. Note: The focus shall be on the intended purposes of each layer and will describe the components to be deployed and documented in the Campaign Finance Installation and Configuration guide.
Host Security. 1. The ASP must disclose how and to what extent the hosts (Unix, NT, etc.) comprising the University of Louisiana at Lafayette application infrastructure have been hardened against attack. If the ASP has hardening documentation for the CAI, provide that as well.
Host Security. The web server does not connect directly to the Internet. It is buffered from the Internet through the use of a firewall. All access from outside the bank must go through this firewall, which screens the requests and allows only valid http traffic to reach the server. The Farmers Bank Internet Banking makes use of an ICSA certified firewall. LINKS. Links to non-The Farmers Bank websites contained in this site are offered only as pointers to sources of information on subjects that may be of interest to users of The Farmers Bank’s website, and The Farmers Bank is not responsible for the content of such sites as we have no control over what is displayed there. The Farmers Bank does not guarantee the authenticity of documents at such sites, and links to non-The Farmers Bank sites do not imply any endorsement of or responsibility for the ideas, opinions, information, products, or services offered at such sites. Use of links to any non-The Farmers Bank site is solely at the user’s own risk. Hardware and Software Requirements. To be able to use The Farmers Bank online banking, you must provide your own personal computer (a "PC") with a modem and related equipment (the "Hardware"). You also must provide the type of telephone service and Internet access service required by the Hardware and/or the Software. Once the Hardware has been properly connected to the telephone service, and any required Internet access has been established, you will be able to access The Farmers Bank online services through the PC banking service provider (the "Service Provider") that will act as an interface between you and the Bank. You are and will remain solely responsible for the purchase, hook-up, installation, loading, operation and maintenance of the Hardware, the Software, the telephone service, and the Internet access service (if applicable) to your PC, and for all related costs. You are solely responsible for scanning the Hardware and the Software for computer viruses and other related problems before you use them.
Host Security. Hardening Users are validated by a hardened server in the DMZ zone using SSL encryption. After validation, only communication through one port is allowed from the DMZ to the server farm. The servers are protected by a pair of fully managed Cisco PIX 515E firewalls with redundant failover configuration. Only services required by the MegaMation application are active. Patches The Microsoft notification network is monitored daily by MegaMation staff. Critical patches are applied as released and standard Microsoft patches are applied monthly. DirectLine patches are applied as required by MegaMation. Host Monitoring MegaMation servers are monitored to ensure availability and performance. MegaMation maintains and follows strict processes for firewall management, as well as for ongoing monitoring of security activity at the firewall. Firewall provisioning, change management, alerting, monitoring, backups, support and reporting activities follow well- defined processes based on industry best practices. MegaMation has established thresholds for suspicious activity on this firewall, which will generate a security alert to the MegaMation managed security services team on a 7/24 basis. The MegaMation managed security services team will follow an incident management process to evaluate the risk of this security alert and take appropriate actions.
AutoNDA by SimpleDocs
Host Security. Note: The focus shall be on the intended purposes of each layer and will describe the components to be deployed and documented in the SCORE II Installation and Configuration guide
Host Security. (a) Company has tools implemented to detect and remediate software viruses and other malware on all systems used to access, process, or host BMC applications or BMC Data.
Host Security. Family Bank web server does not connect directly to the Internet. It is buffered from the Internet through the use of a firewall. All access from outside the bank must go through this firewall, which screens the requests and allows only valid https traffic to reach the server.
Time is Money Join Law Insider Premium to draft better contracts faster.