Security Capabilities Sample Clauses

Security Capabilities. The SCs encompass the security services implemented to deliver affordable Security-as-a-Service. Mainly, the SCs are divided into two families, monitoring and remediation capabilities, covering the detection and mitigation of identified threats. The final list of SCs targeted for implementation is an IDS, a FW, a NDS, a WTA, a SIEM, a VPN, a vTAP and an SB solution. The following tables present the proposed requirements transcribed to technical specifications, providing the changes appeared from D3.1 regarding the SCs. For a proper interpretation, table 3.1-1 shows the new technical specifications appeared in the recent context of the PALANTIR project. Table 3.1-1: new technical specifications for SecaaS. Req. ID Requirement description IDS SIEM NDS VPN FW vTAP WTA SCR
AutoNDA by SimpleDocs
Security Capabilities. The following diagram shows the infrastructure and network, and illustrates the security posture. • Source system data will be transmitted to the SOCDIS UAT/PROD environment on Azure USGOV (enclave managed by IBM). County of Orange MA-042-20010899 File Folder: C028303 • The data will be transmitted to an HTTPS or SFTP endpoint, through the VPN between the County enterprise and Azure USGOV. • Only the DataStage ETL server needs to be accessible from the VPN. The database servers (Staging 1 AND Staging 2) should not be exposed to the VPN. Neither the Staging1 nor the Staging 2 servers should allow ingress from, or egress to, the public Internet. IBM personnel will need an HTTPS connection to the public Internet from the DataStage ETL server and the DataStage Designer server, to initiate software installation. Once software is installed, this egress can be removed from these 2 servers. • The Staging 2 servers should not allow any connection from or to any County server or VLAN, aside from inbound connections from the corresponding Staging 1 servers. The DataStage server should not allow any connection from or to any County server or VLAN, aside from outbound connections to the Staging 2 servers. Figure 2: County of Orange MA-042-20010899 File Folder: C028303
Security Capabilities. The PALANTIR platform offers the provision of Security-as-a-Service solutions for SME/MEs with minimum resources and critical requirements. SecaaS is a new paradigm created by the Cloud Security Alliance in 2011 [2], which proposes that the security can be offered as a service. This paradigm was born from the need that appeared due to the recent tendency of cyberattacks, which compromise and impactthe cybersecurity of people, companies, institutions, and countries. The Security-as-a-Service component consists of the deployment of security services on-demand, with personalised characteristics associated with the client. The SecaaS capabilities can be deployed into Virtualised Network Functions (VNFs), or more generally speaking, into any sort of Network Functions (xNFs), such as Container-based Network Functions (CNFs). These consist of one or more virtual machines / containers running different software and processes. The Security Capabilities can also be implemented as a set of security configurations depending on the capability being implemented and the hosting platform’s features.
Security Capabilities. The PALANTIR SecaaS capabilities needs the interaction and coordination of different PALANTIR components, as well as the collaboration with them to obtain different data sources and improve the SecaaS capabilities functionality. The SecaaS component interacts with the components presented in Figure 8: • The Threat Intelligence component offers advanced analytics capabilities based on Machine Learning and Remediation techniques. The communication between this component and SecaaS component is performed with a Control Loop where TI component traces traffic from the SecaaS capabilities through Distributed Collection for signs of malicious traffic. • The SecaaS component needs to be orchestrated and managed by a component with the necessary requirements to perform this task. The Security Capabilities Orchestrator manages different necessary SecaaS capabilities’ characteristics for the correct functioning, such as its lifecycle management, the SecaaS services monitoring and the SecaaS services deployment on- demand considering the real-time context information. The communication is also produced with a Control Loop and is performed when malicious traffic is detected, and selected actions must be executed by the SecaaS capabilities to block and interrupt the attack. Finally, the security capabilities expose a self-check interface to the security orchestrator to permit the integrity assessment of the internal logic of Security Capabilities.

Related to Security Capabilities

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Testing Capabilities 7.2.2.10.2.1 LIS Acceptance Testing is provided where equipment is available, with the following test lines: seven-digit access to balance (100 type), milliwatt (102 type), nonsynchronous or synchronous, automatic transmission measuring (105 type), data transmission (107 type), loop-around, short circuit, open circuit, and non-inverting digital loop-back (108 type), and such other acceptance testing that may be needed to ensure that the service is operational and meets the applicable technical parameters.

  • Capabilities A. The Parties agree that the DRE must possess the legal, technical, and financial capacity to:

  • Personnel Capabilities The Applicant should list down personnel of minimum qualification as specified in the Qualification Criteria

  • Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.

  • Security Compliance Apple will take appropriate steps to ensure compliance with security procedures by its employees, contractors and sub processors and Apple shall ensure that any persons authorized to process Personal Data comply with applicable laws regarding the confidentiality and security of Personal Data with regards to the Service.

  • Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact

  • Capability 6 – Information sharing is the ability to conduct multijurisdictional and multidisciplinary exchange of health-related information and situational awareness data among federal, state, local, tribal, and territorial levels of government and the private sector. This capability includes the routine sharing of information as well as issuing of public health alerts to all levels of government and the private sector in preparation for and in response to events or incidents of public health significance.

  • Local Circuit Switching Capability, including Tandem Switching Capability 4.2.1 Local circuit switching capability is defined as: (A) line-side facilities, which include, but are not limited to, the connection between a loop termination at a main distribution frame and a switch line card; (B) trunk-side facilities, which include, but are not limited to, the connection between trunk termination at a trunk-side cross-connect panel and a switch trunk card; (C) switching provided by remote switching modules; and (D) all features, functions, and capabilities of the switch, which include, but are not limited to: (1) the basic switching function of connecting lines to lines, line to trunks, trunks to lines, and trunks to trunks, as well as the same basic capabilities made available to BellSouth’s customers, such as a telephone number, white page listings, and dial tone; and (2) all other features that the switch is capable of providing, including but not limited to customer calling, customer local area signaling service features, and Centrex, as well as any technically feasible customized routing functions provided by the switch. Any features that are not currently available but are technically feasible through the switch can be requested through the BFR/NBR process.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!