Intrusion Detection System Sample Clauses

Intrusion Detection System. Genesys has implemented intrusion detection across the Cloud Services environment that meets PCI DSS requirements.
Intrusion Detection System. (a) 1 DMP 142 zone panel (b) 1 DMP wireless LCD Keypad
Intrusion Detection SystemThe Contractor must design, procure, install, program, test, document, and provide training to multiple personnel, for a complete turn-key system. • The work will include, but may not be limited to the following; - Install a TSA Office of Security approved Bosch intrusion detection system or approved equal. - Install a Bosch Model D9412Gv4 or approved equal. - The installer must be a certified vendor who is experienced in the programming the advanced software features associated with this panel and which is required for this security application. - The host panel and all associated control equipment will be located in LAN/Server room (Door 3). - All equipment serving the IDS/Access Control system will be wall mounted on the wall of LAN/SERVER room. - The contractor will provide all equipment mounts, slides, shelves or other items. - Bosch D1265 arm/disarm keypads will be mounted inside the Public Entrances (Door 1) and internal to the LAN ROOM (Door 3), to the facility and will be programmed to accept all password combinations and will have the capability to arm and disarm all alarm points designated as general office security points. - Vendors: The contractor is responsible to ensure selected vendor is competent and current on the required panels. - The alarm system will notify via telephone connection or Internet connection the agency specified location violations of the security system. - Power for all intrusion detection devices installed on the floors are centrally powered and monitored from the LAN ROOM. - All intrusion detection devices are required to interface with the Bosch Model D9412Gv4 system or approved equal. • The Contractor will maintain and warranty the system for one year after the acceptance date. • The Battle Creek Michigan Federal Protective Service (FPS) Mega Center will remotely monitor the installed system and must be compatible with FPS existing hardware and software. Bosch D9412Gv4 • The contractor will be responsible for all the initial input of user codes and completion of the FPS Mega Center Alarm Requirements Document to be provided by the TSA Office of Security once the system has been installed and is ready for set up and programming. • The minimum number of user pass codes must be 249. • All installed equipment must have sufficient power supplies as necessary to provide battery backup for a 4-hour minimum outage.
Intrusion Detection System. We will implement intrusion detection systems across the Cloud Services Environments which may be either network based, host based or a combination of the two.
Intrusion Detection System. (IDS). The Contractor shall maintain the Advantor Intrusion Detection System IAW with manufacturer’s instructions; AR 190-13 The Army Physical Security Program, Chapter 9; AR 190-59, Chemical Agent Security Program, Chapter 17; and the CDTF Physical Security Plan. The Contractor shall coordinate all scheduled maintenance with the COR. When IDS system interruptions occur, the Contractor shall immediately notify the COR and initiate repair as a Priority 1 Emergency.
Intrusion Detection System. Provide an intrusion detection system that includes boxes, conduits, and hardware with the review of the requirements of the Owner.
Intrusion Detection System. All facility external warehouse doors alarmed to detect unauthorized opening and linked to main alarm system.
Intrusion Detection System. (IDS) Software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or disabling computer systems, mainly through a network, such as the Internet. These attempts may take the form of attacks - for example: by crackers, malware and/or disgruntled employees. Invoicing Requirement The requirements set out in Attachment 4-G (Form of Invoice) of Exhibit 4 (Pricing and Financial Provisions).

Related to Intrusion Detection System

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.