Managed Firewall Sample Clauses

Managed Firewall. CNI will provide a managed firewall to clients. CNI will manage and update the software components at CNI’s sole discretion. Such devices are CNI Equipment, owned by CNI and to be returned to CNI or purchased from CNI in the event of termination of this Agreement. The management and updates for these devices will be immediately terminated in the event this Agreement is terminated. All configurations, operations, and formats implemented by CNI are the proprietary work of CNI will be removed in the event of termination.
Managed Firewall. Managed Firewall Services include management of Cisco ASA or Fortinet devices. You supply the device. You must have a Cisco Smartnet warranty on any managed Cisco device and Fortinet support and on Fortinet device. Managed Firewall Services include: a) management of your existing Cisco ASA or Fortinet firewall;

Related to Managed Firewall

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Managed Services HP will provide the services as described in a Statement of Work (“SOW”) attached to this Agreement or incorporating it by reference. Each party will appoint a single point of contact as set forth in the SOW who will serve as their primary representative, have overall responsibility for managing performance, and meet with the other party’s representative to review progress. Change requests are governed by the change management procedures as set forth in the SOW.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Registry Interoperability and Continuity Registry Operator shall comply with the Registry Interoperability and Continuity Specifications as set forth in Specification 6 attached hereto (“Specification 6”).

  • Virus Management DST shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within DST environment.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Interoperability To the extent required by applicable law, Cisco shall provide You with the interface information needed to achieve interoperability between the Software and another independently created program. Cisco will provide this interface information at Your written request after you pay Cisco’s licensing fees (if any). You will keep this information in strict confidence and strictly follow any applicable terms and conditions upon which Cisco makes such information available.

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

  • Access Management The Engineer shall coordinate and evaluate access management within the project limits in accordance with the latest State Access Management Manual or as directed by the State.

  • Data Input Control It will be possible to retrospectively examine and establish whether and by whom Personal Data have been entered, modified or removed from SAP data processing systems.