Intrusion Detection/Advanced Threat Protection. Network and host-based intrusion detection/advanced threat protection must be deployed with events generated fed into centralized systems for analysis. These systems must accommodate routine updates and real-time alerting. IDS/advanced threat protection signatures must be kept up-to- date to respond to threats.
Appears in 4 contracts
Samples: Student Data Privacy Agreement, higherlogicdownload.s3.amazonaws.com, www.queensu.ca
Intrusion Detection/Advanced Threat Protection. Network and host-based intrusion detection/advanced threat protection must be deployed with events generated fed into centralized systems for analysis. These systems must accommodate routine updates and real-time alerting. IDS/advanced threat protection signatures must be kept up-to- up to date to respond to threats.
Appears in 1 contract
Samples: zoom.us
Intrusion Detection/Advanced Threat Protection. Network and host-based intrusion detection/advanced threat protection must be deployed with events generated fed into centralized systems for analysis. These systems must accommodate routine updates and real-time realtime alerting. IDS/advanced threat protection signatures must be kept up-to- up to date to respond to threats.
Appears in 1 contract
Samples: explore.zoom.us