Network and Host Security Sample Clauses

Network and Host Security. Sumo Logic has network intrusion detection and firewalls in place. Sumo Logic uses reasonable efforts to ensure that the Servicesoperating systems and applications that are associated with Your Data are patched or secured to mitigate the impact of security vulnerabilities in accordance with Sumo Logic ’s patch management processes.
AutoNDA by SimpleDocs
Network and Host Security. Box has network intrusion detection in place. In accordance with its ISMS, Box uses commercially reasonable efforts to ensure that Box Service operating systems and applications that are associated with Content are patched or secured to mitigate the impact of security vulnerabilities in accordance with Box’s patch management processes and industry standard practices.
Network and Host Security. The Data Recipient must have commercially reasonable and efficient network intrusion detection, firewalls and anti-virus protection in place and functioning properly. The Data Recipient shall use commercially reasonable efforts to ensure that operating systems and applications that are associated with the Data must be patched within a commercially reasonable time period after Data Recipient has actual or constructive knowledge of any security vulnerabilities. The Data Recipient will exercise generally accepted industry standards to protect against malware and Viruses.
Network and Host Security. Hearsay must have commercially reasonable firewalls and anti-virus protection on Windows laptops and desktops in place and functioning properly (the “Network and Host Security Methods”). Hearsay will use reasonable commercially efforts to ensure that operating systems and applications that are associated with the Customer Confidential Information are patched within a commercially reasonable time period after the Hearsay has actual or constructive knowledge of any security vulnerabilities. Hearsay will exercise generally accepted industry standards to ensure that any software, systems, or networks that may interact with Customer’s systems, networks or any of the Customer Confidential Information under Hearsay’s control are not and do not become infected by any Viruses.
Network and Host Security. 6. Permitted Uses and Disclosures of Personal Information. *****.
Network and Host Security. Vendor shall use and maintain network intrusion detection, firewalls and anti-virus protection (the “Network and Host Security Methods”). Vendor shall install all security vulnerability patches available for its systems software and applications as soon as the patches are made available by the manufacturer.. Vendor shall ensure that all software, systems, or networks used by Vendor to interact with The Hartford's systems or networks or any of The Hartford Data are designed to not become infected by any viruses. For Vendor services that may be accessed via the web, the Vendor shall also provide options for reducing risk through secure technologies and techniques including IP filtering, application gateway or network packet filtering firewalls and browser-type restrictions.
Network and Host Security. DMS shall have commercially reasonable and efficient network intrusion detection, firewalls and anti-virus protection in place and functioning properly (the "Network and Host Security Methods"). DMS shall use commercially reasonable efforts to ensure that operating systems and applications that are associated with Information shall be patched within a commercially reasonable time period after DMS has actual knowledge of any security vulnerabilities. DMS will exercise generally accepted industry standards to protect any software, systems, or networks that may interact with Intersections systems, networks, or any of Information from becoming infected by any Viruses. DMS agrees that it shall maintain, throughout the Term of the Agreement and at all times while in the possession of or during the access to Information, Network and Host Security Methods at least as secure as the Network and Host Security Methods disclosed to and assessed by Intersections prior to execution of the Agreement and shall not implement less secure Network and Host Security Methods without the prior written consent of Intersections.
AutoNDA by SimpleDocs
Network and Host Security. Servicer must have commercially reasonable and efficient network intrusion detection, firewalls and anti-virus protection in place and functioning properly (the “Network and Host Security Methods”). Servicer shall use reasonable commercially reasonable efforts to ensure that operating systems and applications that are associated with Servicing Data must be patched within a commercially reasonable time period after Servicer has actual or constructive knowledge of any security vulnerabilities. Servicer will exercise generally accepted industry standards to ensure that any software, systems, or networks that may interact with Position Holder Trust’s systems, networks, or any Servicing Data are not and do not become infected by any Viruses. Servicer agrees that it shall maintain, throughout the Servicing Term and at all times while in the possession of or during the access to Servicing Data, Network and Host Security Methods at least as secure as the Network and Host Security Methods disclosed to and assessed by Position Holder Trust prior to execution of the Agreement and shall not implement less secure Network and Host Security Methods without the prior written consent of Position Holder Trust.
Network and Host Security. Rubrik maintains network intrusion detection/prevention, firewalls and security monitoring capabilities that monitor all traffic on Rubrik’s corporate network in connection with the Services. Firewalls are used to protect Rubrik’s corporate network from the internet and separate the internal network from the internet and Customer’s connections. Firewall settings have been configured to deny traffic by default and allow only authorized traffic in accordance with corporate standards. Rubrik reviews and validates firewall rulesets every six months. Network segmentation occurs to prevent Rubrik’s corporate network from accessing Customer Personal Data without the Customer’s explicit permission.
Network and Host Security. Vendor shall utilize an enterprise-class security information and event management (SIEM) system that has firewalls in place. Vendor shall use industry standard practice to ensure that the Vendor System operating systems and applications that are associated with Customer Data are patched and secured as required to protect against security vulnerabilities in accordance with Vendor’s patch management processes and Vendor shall have immediate actual or constructive knowledge of any critical or high-risk security vulnerabilities. Vendor shall conduct vulnerability scanning on a weekly basis.
Time is Money Join Law Insider Premium to draft better contracts faster.