Intrusion Detection. Bluecore’s intrusion detection capabilities include sophisticated data processing pipelines which integrate host-based signals on individual devices, network-based signals from various monitoring points in the infrastructure, and signals from infrastructure services. Rules and machine intelligence built on top of these pipelines give operational security and operational personnel warnings of possible incidents.
Appears in 4 contracts
Samples: get.bluecore.com, get.bluecore.com, get.bluecore.com
Intrusion Detection. Bluecore’s intrusion detection capabilities include sophisticated data processing pipelines which integrate host-based signals on individual devices, network-based signals from various monitoring points in the infrastructure, and signals from infrastructure services. Rules and machine intelligence built on top of these pipelines give operational security and operational personnel warnings of possible incidents.. Appendix 3 CROSS BORDER DATA TRANSFER MECHANISMS
Appears in 2 contracts
Samples: get.bluecore.com, get.bluecore.com
Intrusion Detection. Bluecore’s intrusion detection capabilities include sophisticated data processing pipelines which integrate host-host- based signals on individual devices, network-based signals from various monitoring points in the infrastructure, and signals from infrastructure services. Rules and machine intelligence built on top of these pipelines give operational security and operational personnel warnings of possible incidents.. SCHEDULE 2 CROSS BORDER DATA TRANSFER MECHANISMS
Appears in 1 contract
Samples: Data Processing Agreement