Security Logs Sample Clauses
Security Logs. All Braze systems used in the provision of the Braze Services, including firewalls, routers, network switches, and operating systems log information to their respective system log facility or a centralized syslog server (for network systems) in order to enable security reviews and analysis. Braze has automated alerts and searches on these logs.
Security Logs. FF shall ensure that all FF or Sub-processor systems used to store Customer Data, including firewalls, routers, network switches and operating systems, log information to their respective system log facility or a centralised syslog server (for network systems).
Security Logs. As it relates to the Cloud Services, the CSP and CSP Contractors shall provide security logs and reports to the Governmental Entity or its Authorized Contractors in a mutually agreeable format upon request. Such reports shall include at least latency statistics, user access summaries, user access IP address summaries, user access history and security logs for all Customer Data.
Security Logs a. Processes that log access to sensitive information and systems and procedures to audit those logs for unauthorized access.
Security Logs. Systems used in the provision of the Polygon services log information to the system log facilities or a centralized logging service (for network systems) in order to enable security reviews and analysis. Polygon maintains an extensive centralized logging environment in the production environment which contains information pertaining to security, monitoring, availability, access and other metrics about the Polygon services.
Security Logs. Maximl Labs Pvt Ltd’s systems have logging enabled to their respective system log facility in order to support the security audits, and monitor and detect actual and attempted attacks on, or intrusions into, Maximl Labs Pvt Ltd’s systems.
Security Logs. Company’s systems have logging enabled to their respective system log facility in order to support the security audits, and monitor and detect actual and attempted attacks on, or intrusions into, Company’s systems.
Security Logs. All Loopy Loyalty systems used in the provision of the Loopy Loyalty Services, including firewalls, routers, network switches, and operating systems log information to their respective system log facility or a centralized logging service (for cloud systems) in order to enable security reviews and analysis. Loopy Loyalty has automated alerts and searches on these logs.
Security Logs. All PassKit systems used in the provision of the PassKit Services, including firewalls, routers, network switches, and operating systems log information to their respective system log facility or a centralized logging service (for cloud systems) in order to enable security reviews and analysis. PassKit has automated alerts and searches on these logs.
Security Logs. TeleSign’s systems have logging enabled to their respective system log facility in order to support the security audits, and monitor and detect actual and attempted attacks on, or intrusions into, TeleSign’s systems.