Network Security Services Sample Clauses

Network Security Services. Network transport (WAN ports, WAN cloud, redundant paths).
AutoNDA by SimpleDocs
Network Security Services a. A [ * ] MPLS closed network used for internal purposes will satisfy current requirements. In addition, the non-MPLS network (solution includes provisioning and support of both MPLS and non-MPLS circuits) which includes encryption in the firewall (a supported piece of Equipment) also satisfies current requirements. The Vendor’s responsibilities include the following: 1. Implement and maintain security tools, procedures, and systems required to protect the integrity, confidentiality, and availability of the ACI Data Network and data on the Data Network; 1.1. ACI will approve the selection of the security tools; 2. Comply with ACI’s Data Network security policies (described in Schedule J (ACI Policies and Standards), whereby the Vendor will follow the best practices of either ACI or Vendor, whichever requires greater security based on reasonable and prudent standard practices, with approval by ACI; 3. Perform quarterly assessments of risk exposure including: 3.1. Gap analyses to indicate exposure to security threats; Confidential Exhibit A-7—Data Network Services 3.2. Action plans to address gaps; and 3.3. Ratings to gauge progress against closure of gaps; 4. Provide access to and/or assist ACI’s designated third-party vendors in performing vulnerability assessments (of the Vendor support network infrastructure) [ * ] from ACI; 5. Perform reactive security assessments and Incident and problem determination in accordance with ACI network security policies; 6. Activate appropriate security monitoring tools, and back up and analyze the logs from these tools, in accordance with ACI security requirements; 7. Provide recommendations to remediate the gaps identified by analyzing the logs;
Network Security Services. Network security Services firewall include the provision and support of methods that provide security to physical and logical devise connected to the network. Security services include firewall, intrusion detection, penetration/vulnerability testing.
Network Security Services. For additional requirements related to physical and logical security requirements, see Exhibit 2.6 (Cross-Functional Services) and Exhibit 16 (Safety and Security Procedures). Supplier’s responsibilities include the following: 1. Implement and maintain security Tools, procedures, and Systems required to protect the integrity, confidentiality, and Availability of the Network and data on the Network. a. Company will approve the selection of the security Tools. 2. Comply with Company’s Network Security policies (described in Exhibit 16 (Safety and Security Procedures)), and Network Architecture and standards, described in Exhibit 8 (Technical Architecture and Product Standards). 3. Provide access and/or assist Company’s designated Third-Party Vendors in performing vulnerability assessments (of Supplier support Network Infrastructure) upon five (5) days written notice from Company. 4. Activate appropriate Security monitoring Tools, and back up and analyze the logs from these Tools, in accordance with Company Security requirements. 5. Provide recommendations to remediate the gaps identified by analyzing the logs. 6. Utilize access control mechanisms on all networking devices in accordance with Company Network Security Policies. 7. Monitor usage patterns and investigate and report significant discrepancies in those patterns no later than one (1) week after their detection. 8. Report all attempts at illicit monitoring, interception, eavesdropping, or toll-fraud to Company when detected by Supplier and propose appropriate action to prevent re-occurrence.
Network Security Services. Service Provider shall meet the requirements related to physical and logical security set forth in Exhibit 2.1.2 and in Exhibit 17. Service Provider responsibilities include: 1. Act as a single point of contact for the management of the DCS Network Security Services. 2. Implement and maintain security tools, procedures, and systems required to protect the integrity, confidentiality, and availability of the DCS Network and data on the DCS Network. 2.1. DIR will approve the selection of the security tools. 3. Comply with DIR’s and DIR Customers’ Network security policies described in Exhibit 17, and network architecture and standards, whereby the Service Provider will follow the best practices of either DIR, DIR Customers or Service Provider, whichever requires greater security based on reasonable and prudent standard practices, with approval by DIR. 4. Perform periodic assessments of risk exposure including: 4.1. Gap analyses to indicate exposure to security threats, and report analysis to DIR and DIR Customers as appropriate. 4.2. Action plans to address gaps; integrate actions into Service Provider Problem Management and provide reports to DIR and DIR Customers as appropriate. 4.3. Ratings to gauge progress against closure of gaps. 4.4. Categorize risk in compliance to Exhibit 17. 5. Provide data privacy as required by DIR and DIR Customers (e.g. network segmentation, firewalls). 6. Provide access and assist the MSI and DIR’s designated Third Party Vendors in performing vulnerability assessments (of the Service Provider supported network infrastructure) upon five (5) day’s written notice from the MSI. 7. Perform reactive network security assessments, along with Incident and Problem determination, and in accordance with DIR and DIR Customers security policies. 8. Activate appropriate security monitoring tools, and back up and analyze the logs from these tools, in accordance with DIR and DIR Customers security requirements. 8.1. Manage network security devices in the environment (e.g. NIPS, FW, NIDS) to provide appropriate logging and reporting of network activities. 8.2. Establish working relationships with DIR and DIR Customers as required to ensure that network security elements are configured and functioning properly to meet business needs. 9. Provide recommendations to remediate the gaps identified by analyzing the logs. 10. Utilize Access Control Lists (ACLs) on all networking devices in accordance with DIR and DIR Customers network security policies....
Network Security Services. Network transport link performance verification 1.3.8. Information Assurance.

Related to Network Security Services

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Network Services Preventive care: 100% coverage. Preventive services include, but are not restricted to routine physical exams, routine gynecological exams, routine hearing exams, routine eye exams, and immunizations. A $100 single and $200 family combined annual deductible will apply to lab/diagnostic testing after which 100% coverage will apply. A $50 copay will apply to CT and MRI scans.

  • Beta Services From time to time, We may invite You to try Beta Services at no charge. You may accept or decline any such trial in Your sole discretion. Beta Services will be clearly designated as beta, pilot, limited release, developer preview, non-production, evaluation or by a description of similar import. Beta Services are for evaluation purposes and not for production use, are not considered “Services” under this Agreement, are not supported, and may be subject to additional terms. Unless otherwise stated, any Beta Services trial period will expire upon the earlier of one year from the trial start date or the date that a version of the Beta Services becomes generally available. We may discontinue Beta Services at any time in Our sole discretion and may never make them generally available. We will have no liability for any harm or damage arising out of or in connection with a Beta Service.

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • Network Security The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.

  • Security Service Tenant acknowledges and agrees that, while Landlord may patrol the Project, Landlord is not providing any security services with respect to the Premises and that Landlord shall not be liable to Tenant for, and Tenant waives any claim against Landlord with respect to, any loss by theft or any other damage suffered or incurred by Tenant in connection with any unauthorized entry into the Premises or any other breach of security with respect to the Premises.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • Network PHARMACY is a retail, mail order or specialty pharmacy that has a contract to accept our pharmacy allowance for prescription drugs and diabetic equipment or supplies covered under this plan. NETWORK PROVIDER is a provider that has entered into a contract with us or other Blue Cross and Blue Shield plans. For pediatric dental care services, network provider is a dentist that has entered into a contract with us or participates in the Dental Coast to Coast Network. For pediatric vision hardware services, a network provider is a provider that has entered into a contract with EyeMed, our vision care service manager.

  • Data Services In lieu of any other rates or discounts, the Customer will receive a discount equal to 20% for the following Data Services: Access: Standard VBS3Guide local loop charges for DS-0, DS-1 and DS-3 Access Service.

  • Cloud Services You will not intentionally (a) interfere with other customers’ access to, or use of, the Cloud Service, or with its security; (b) facilitate the attack or disruption of the Cloud Service, including a denial of service attack, unauthorized access, penetration testing, crawling, or distribution of malware (including viruses, trojan horses, worms, time bombs, spyware, adware, and cancelbots); (c) cause an unusual spike or increase in Your use of the Cloud Service that negatively impacts the Cloud Service’s operation; or (d) submit any information that is not contemplated in the applicable Documentation.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!