Common use of Perimeter Defense and Intrusion Detection Clause in Contracts

Perimeter Defense and Intrusion Detection. The Genesys on-premises and Genesys components and services running on third-party cloud providers’ network architecture is segmented into public, private, and Integrated Lights Out (iLO) management network zones. The public zone contains internet- facing servers. All traffic that enters this network must transit a firewall. Only required network traffic is allowed; all other network traffic is denied, and no network access is permitted from the public zone to either the private or iLO management network zones. The private network zone hosts application level administrative and monitoring systems, and the iLO management network zone is for hardware and network administration and monitoring. Access to these networks is restricted to authorized employees via two-factor authentication. Moreover, Genesys employs perimeter protection measures, including a third party, cloud-based distributed denial of service (DDoS) prevention service, designed to prevent unauthorized network traffic from entering our product infrastructure.

Appears in 4 contracts

Samples: Data Processing Addendum, Data Processing Addendum, Data Processing Addendum

AutoNDA by SimpleDocs
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!