Infrastructure Logs. Monitoring tools or services, such as host-based intrusion detection tools, are utilized to log certain activities and changes within the Cloud Environment. These logs are further monitored, analyzed for anomalies, and are securely stored to prevent tampering for at least one year.
Appears in 7 contracts
Samples: Private Preview Agreement, Security Addendum, Snowflake Reseller Public Sector Access Terms
Infrastructure Logs. Monitoring tools or services, such as host-based intrusion detection tools, are utilized to log certain activities and changes within the Cloud Environment. These logs are further monitored, analyzed for anomalies, and are securely stored to prevent tampering for at least one year90 days.
Appears in 1 contract
Samples: Slope Security Policy
Infrastructure Logs. Monitoring tools or services, such as host-based intrusion detection tools, are utilized to log certain activities and changes within the Cloud Environment. These logs are further monitored, analyzed for anomalies, and are securely stored to prevent tampering for at least one yeartwo years with the logs collated in the eGain Security Information and Event Management (SIEM) system.
Appears in 1 contract
Samples: Security Policy