Security Logs. All Braze systems used in the provision of the Braze Services, including firewalls, routers, network switches, and operating systems log information to their respective system log facility or a centralized syslog server (for network systems) in order to enable security reviews and analysis. Braze has automated alerts and searches on these logs.
Security Logs. FF shall ensure that all FF or Sub-processor systems used to store Customer Data, including firewalls, routers, network switches and operating systems, log information to their respective system log facility or a centralised syslog server (for network systems).
Security Logs. As it relates to the Cloud Services, the CSP and CSP Contractors shall provide security logs and reports to the Governmental Entity or its Authorized Contractors in a mutually agreeable format upon request. Such reports shall include at least latency statistics, user access summaries, user access IP address summaries, user access history and security logs for all Customer Data.
Security Logs. 3.1. All Thunderhead systems used in the provision of the Services, including firewalls, routers, network switches and operating systems, log information to their respective system log facility or a centralized syslog server (for network systems) in order to facilitate security reviews and analysis.
Security Logs. All Inkit systems used in the provision of the Services, including firewalls, routers, network switches, and operating systems, log information to their respective system log facility or a centralized syslog server (for network systems) in order to enable security reviews and analysis. Inkit has automated alerts and searches for such logs.
Security Logs. All Insider systems used in the provision of the Insider Services, including firewalls, routers, network switches, and operating systems log information to their respective system log facility in order to enable security reviews and analysis.
Security Logs. All Loopy Loyalty systems used in the provision of the Loopy Loyalty Services, including firewalls, routers, network switches, and operating systems log information to their respective system log facility or a centralized logging service (for cloud systems) in order to enable security reviews and analysis. Loopy Loyalty has automated alerts and searches on these logs.
Security Logs. All PassKit systems used in the provision of the PassKit Services, including firewalls, routers, network switches, and operating systems log information to their respective system log facility or a centralized logging service (for cloud systems) in order to enable security reviews and analysis. PassKit has automated alerts and searches on these logs.
Security Logs. All xxxxxxxxxx.xxx systems used in the provision of the ET Services, including firewalls, routers, network switches and operating systems, log information to their re- spective system log facility or a centralized syslog server (for network systems) in order to enable security audits. Production data centers used to provide the ET Services have access control systems. These systems permit only authorized personnel to have access to secure are- as. These facilities are designed to withstand adverse weather and other reasonably predictable natural conditions, are secured by around-the-clock guards, two-factor card key and biometric access screening and escort-controlled access, and are also supported by on-site back-up generators in the event of a power failure.
Security Logs. Company shall ensure that all Company or Sub-processor systems used to store Customer Data, including firewalls, routers, network switches and operating systems, log information to their respective system log facility or a centralised syslog server (for network systems).