Intrusion Prevention Sample Clauses

Intrusion Prevention. All systems involved in accessing, storing, transporting, and protecting PII, which are accessible through the Internet, must be protected by an intrusion detection and prevention solution.
Intrusion Prevention. All systems involved in accessing, storing, transporting, and protecting confidential information, which are accessible through the Internet, must be protected by an intrusion detection and prevention solution.
Intrusion Prevention. Service Provider’s responsibilities include the following for host-based firewall Intrusion Prevention systems: 1. Install, update, and configure Intrusion Systems as requested by DIR or DIR Customers. 2. Monitor all Intrusion Systems from central logging system, and provide appropriate response to alerts from Systems based upon mutually agreed procedures as defined in the Service Management Manual. 2.1. Provide immediate notification and historical reporting to DIR and DIR Customers per guidelines in the Service Management Manual. 3. Install as needed or as directed by DIR or DIR Customers, known high-risk updates as defined by intrusion systems manufacturer to intrusion system Software within 4 hours or less after such updates are made available to Service Provider (or qualified Third-Party Vendors selected by Service Provider) and approved by DIR or DIR Customers.
Intrusion Prevention. Abnormal utilizes reasonable measures designed to ensure that its infrastructure protections are consistent with industry standards in preventing unauthorized access to Abnormal networks, servers, and applications. Such measures include but are not limited to the implementation of intrusion prevention technologies, anti-malware services, and firewall rules.
Intrusion Prevention. With Intrusion Prevention, Verizon will detect, alert, and in some cases block attacks (intrusions) on the Customer Network, using intrusion prevention signature files provided by the Managed Device manufacturer. • Encryption. With Encryption, in countries where it is available, Verizon will encrypt Customer application traffic between Managed Devices on the Verizon Private IP Network. Customer will provide at least two additional Managed Devices with the Encryption feature to act as key servers. If circumstances arise that cause the Encryption feature to fail and prevent communication to and from that Managed Device, Customer will notify Verizon. • WAN Acceleration. With WAN Acceleration, Verizon will optimize application traffic using compression, caching protocol optimization where other Sites on the Customer Network have compatible application optimization CPE. • Wireless LAN Controller Management. With Wireless LAN Controller Management, Verizon will configure the Managed Device to provide Wireless LAN controller management capabilities for Customer Sites with compatible access point CPE. • Lightweight Access Point Management. With Access Point Management, Verizon will configure the Managed Device with embedded Access Point functionality such that it will interoperate with Verizon Managed Wireless LAN service.
Intrusion Prevention. Lusha ensures that its security infrastructure is consistent with leading industry standards for virus protection, firewalls and intrusion prevention technologies to prevent any unauthorized access or compromise of Lusha’s network, systems, servers and applications from unauthorized access.
Intrusion Prevention. Service Provider responsibilities include: 1. Install, update, and configure Intrusion Systems as requested by DIR or DIR Customers. 2. Monitor all Intrusion Systems from central logging system, and provide appropriate response to alerts from Systems based upon mutually agreed procedures as defined in the Service Management Manual. 3. Install as needed or as directed by DIR or DIR Customers, known high-risk updates as defined by intrusion systems manufacturer to intrusion system Software within 4 hours or less after such updates are made available to Service Provider (or qualified Third Party Vendors selected by Service Provider) and approved by DIR Customer.
Intrusion Prevention. The IMS Processing Environment will be protected against the risks of intrusion through the use of suitable software, the effectiveness and updating of which must be checked periodically, in accordance with industry standards.
Intrusion Prevention. (a) Intercom implements and maintains a working network firewall to protect data accessible via the Internet and will keep all Customer Data protected by the firewall at all times. (b) Intercom keeps its systems and software up to date with the latest upgrades, updates, bug fixes, new versions and other modifications necessary to ensure security of the Customer Data. (c) Intercom uses anti-malware software and keeps the anti-malware software up to date.

Related to Intrusion Prevention

  • Fire Prevention LESSEE agrees to use every reasonable precaution against fire and agrees to provide and maintain approved, labeled fire extinguishers, emergency lighting equipment, and exit signs and complete any other modifications within the leased premises as required or recommended by the Insurance Services Office (or successor organization), OSHA, the local Fire Department, or any similar body.

  • Fraud Prevention A. To screen its employees and contractors to determine if they have been excluded from Medicare, Medicaid or any federal or state health care program. The Contractor agrees to search monthly the HHS-Office of Inspector General ("OIG") and Texas Health and Human Services Commission Office of Inspector General ("HHSC-OIG") List of Excluded Individuals/Entities ("LEIE") websites to capture exclusions and reinstatements that have occurred since the last search and to immediately report to HHSC-OIG any exclusion information the Contractor discovers. Exclusionary searches for prospective employees and contractors shall be performed prior to employment or contracting. B. That no Medicaid payments can be made for any items or services directed or prescribed by a physician or other authorized person who is excluded from Medicare, Medicaid or any federal or state health care program when the individual or entity furnishing the items or services either knew or should have known of the exclusion. This prohibition applies even when the Medicaid payment itself is made to another contractor, practitioner or supplier who is not excluded. C. That this contract is subject to all state and federal laws and regulations relating to fraud and abuse in health care and the Medicaid program. As required by 42 C.F.R. §431.107, the Contractor agrees to keep all records necessary to disclose the extent of services the Contractor furnishes to people in the Medicaid program and any information relating to payments claimed by the Contractor for furnishing Medicaid services. On request, the Contractor also agrees to furnish HHSC, AG-MFCU, or HHS any information maintained under 42 C.F.