Monitoring and Logging. Xxxxxx monitors its environment 24/7/365 and centralizes its logs. Anomalies are investigated and prioritized on a 24/7/365 basis. Only authorized personnel can view the logs. No personnel may edit, delete, or otherwise alter security logs of users or system accounts. Security Information and Event Management (SIEM) software is in place to collect and analyze the logs from users and system accounts. SIEM is able to analyze the data from different log sources, correlate events among the log entries, identify and prioritize significant events and initiate responses to events.
Appears in 5 contracts
Samples: Premium Data Processing Agreement, Premium Data Processing Agreement, Premium Data Processing Agreement