Network Segmentation Sample Clauses

Network Segmentation. BNY Mellon’s infrastructure utilizes a multi-tier architecture, including a DMZ, to isolate the internal infrastructure from external networks. Traffic from external sources will traverse firewalls and pass through multiple layers of malware protection prior to processing. BNY Mellon’s production environment used to provide the Services will be segregated from pre-production regions and BNY Mellon’s internal segment.
AutoNDA by SimpleDocs
Network Segmentation. BNYM’s infrastructure utilizes a multi-tier architecture, including a DMZ, to isolate the internal infrastructure from external networks. Traffic from external sources will traverse firewalls and pass through multiple layers of malware protection prior to processing. BNYM’s production environment used to provide the Services will be segregated from pre-production regions and BNYM’s internal segment.
Network Segmentation. Convercent will establish and maintain appropriate network segmentation, including the use of virtual local area networks (VLANS) where appropriate, to restrict network access to systems storing Customer Data. Convercent will proxy all connections from public networks into Convercent's internal network using DMZ or equivalent. Convercent will not allow direct connections from public networks into any network segment storing Customer Data.
Network Segmentation. NOTE: This section is applicable to Departments that manage their own network devices. 2.2.2.1 Segment (e.g., VLANs) the network into multiple, separate zones (based on trust levels of the information stored/transmitted) to provide more granular control of system access and additional intranet boundary defenses. Whenever information flows over a network of lower trust level, the information shall be encrypted. 2.2.2.2 Segment the network into multiple, separate zones based on the devices (servers, workstations, mobile devices, printers, etc.) connected to the network. 2.2.2.3 Create separate network segments (e.g., VLANs) for BYOD (bring your own device) systems or other untrusted devices. 2.2.2.4 The network infrastructure shall be managed across network connections that are separated from the business use of that network, relying on separate VLANs or, preferably, on entirely different physical connectivity for management sessions for network devices.
Network Segmentation. Market Logic shall establish and maintain appropriate network segmentation, including the use of virtual local area networks (VLANS) where appropriate, to restrict network access to systems storing Subscriber Data.
Network Segmentation. RingCentral i) Implements network segmentation between the corporate enterprise network and hosting facilities for Services. ii) Ensures separation between environments dedicated to development, staging, and production. iii) Restricts access between environments to authorized devices. iv) Controls configuration and management of network segregation and firewall rules through a formal request and approval process.
Network Segmentation. You shall establish and maintain appropriate network segmentation, including the use of virtual local area networks (VLANS) where appropriate, to restrict network access to systems storing eBay Content and Personal Information. You will proxy all connections from public networks into the your internal network using DMZ or equivalent. You will not allow direct connections from public networks into any network segment storing eBay Content or Personal Information.
AutoNDA by SimpleDocs
Network Segmentation. The Heldrich Center research workstations that have access to the secure WLDS/NJEEDS data are segmented on their own network, which only has services enabled that are required for the users who are authorized to conduct work and who have complied with the Bloustein School and Heldrich Center data security and confidentiality policies and protocols. This network segment is monitored closely by the Bloustein Information Technology Services Office and Rutgers University Office of Information Technology for anomalies in traffic and any other suspicious behavior.
Network Segmentation. The Trustee’s infrastructure utilizes a multi-tier architecture, including a DMZ, to isolate the internal infrastructure from external networks. Traffic from external sources will traverse firewalls and pass through multiple layers of malware protection prior to processing. The Trustee’s production environment used to provide the Services will be segregated from pre-production regions and the Trustee’s internal segment.
Network Segmentation a. Blackbaud shall maintain, regularly review and revise as necessary, and comply with network segmentation protocols and related policies that are reasonably designed to properly segment the Blackbaud Network or otherwise implement Compensating Controls, which shall, at a minimum, comply with NIST CSF controls related to network segmentation. b. Blackbaud shall regularly evaluate, and, as appropriate, restrict and/or disable any unnecessary ports on the Blackbaud Network. c. Blackbaud shall logically separate its development, production and non-production environments in the Blackbaud Network. d. Blackbaud shall employ microsegmentation and/or access control security principles in the Blackbaud Network at the following levels: (1) application; (2) database; (3) and user. The requirements of this Paragraph shall commence upon one hundred and eighty (180) days after the Effective Date.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!