Security Operations Center (SOC) Sample Clauses

Security Operations Center (SOC). The Service is supported by the BlueVoyant Security Operations Center which operates 24 hours a day, 7 days a week, across multiple locations.
AutoNDA by SimpleDocs
Security Operations Center (SOC). BlueVoyant’s managed detection and response service is delivered through a cloud-native SOC, which operates 24 hours a day, 7 days a week. The BlueVoyant SOC is SOC II TYPE II certified and staffed with security experts with technical certifications including, but not limited to, Splunk certifications, SANS (GCFA, GCFE, CDIA, GCIA, GCIH), and CISSP. ● Threat Fusion Cell (TFC): The BlueVoyant Threat Fusion Cell (TFC) is a dedicated team of intelligence analysts and threat researchers operating within our SOC that identifies, prioritizes, and operationalizes information about threats that pose risks to our Clients. The TFC collects and curates feeds from 37 sources of data including BlueVoyant’s proprietary dataset, as well as an open-source, partner, and paid intelligence to operationalize and contextualize malicious activities that could pose a risk to you. Threat intelligence includes all atomic indicator types such as SHA256, SHA1, and MD5 hashes, email addresses, URLs, domains, IP addresses, and CVE vulnerabilities. In addition, threat intelligence indicators may also include unstructured indicators on the dark web from web forums or data leaks. ● Client Success Manager (CSM): The Client Success team is the main point of contact and the overall relationship manager for the Client beyond communications to and from the SOC analyst team. The assigned CSM acts as the Client’s consultant and enables the best experience for BlueVoyant services. The CSM will meet with the Client on a regular basis (typically monthly) to understand the Client's security program goals and will advise how BlueVoyant services can best meet their needs. The CSM is also engaged in any significant security events that occur for the Client. Additionally, the CSM will deliver any requested feedback to the BlueVoyant product and service delivery teams. The CSM will be the Voice of the Client within BlueVoyant. Client Support Health and Monitoring ● Health generated alerts are first triaged by BlueVoyant’s health team. A determination will be made if the alert is viable, actionable, and positive. In the event that the source of the alert is related to BlueVoyant deployed technology, we will work with the customer to notify them through escalation paths established at onboarding time. Customer action may be required to return systems to functional status. The BlueVoyant event flow disruption monitoring is limited in scope to data flows that support MDR use cases. ● For issues related to c...
Security Operations Center (SOC). BlueVoyant’s managed detection and response service is delivered through a cloud-native SOC, which operates 24 hours a day, 7 days a week. The BlueVoyant SOC is SOC II TYPE II certified and staffed with security experts with technical certifications including, but not limited to, Splunk certifications, SANS (GCFA, GCFE, CDIA, GCIA, GCIH), and CISSP.

Related to Security Operations Center (SOC)

  • CONTRACTOR RESOURCES Contractor shall obtain approval in advance by the State, in consultation with the Agency, of all employees, independent contractors or agents proposed for each SOW-RFP Project (“Key Personnel”). Key Personnel shall be identified in each SOW Agreement. Contractor shall use reasonable efforts to make available all Key Personnel for the entire life of the SOW RFP Project. Contractor shall not change Key Personnel without providing the State written justification and obtaining prior written approval of the State. State approvals for replacement of Key Personnel will not be unreasonably withheld. The replacement of Key Personnel shall have comparable or greater skills and applied experience than being replaced and be subject to reference and background checks described above. If Contractor removes Key Personnel for any reason, Contractor agrees to provide replacement Key Personnel and shall provide the first thirty (30) days of such replacement resource(s) with equivalent skill at no charge. Notwithstanding the foregoing, the State acknowledges that Key Personnel may become unavailable due to termination of employment for any reason, through disability or death, illness, or through leave of absence such as FMLA or National Guard duty for example. In such circumstances, Contractor shall promptly notify the State in writing of the impending or actual departure of any Key Personnel and of the qualifications and identity of proposed replacement Key Personnel. The State has the right to reasonably disapprove of any replacement Key Personnel. If Key Personnel does not perform up to acceptable or professional standards as required in this Master Agreement or the SOW Agreement, Contractor shall, when notified by the State, either replace the employees, independent contractors or agents with approved employees, independent contractors or agents or take remedial action agreed by State to ensure that Contractor Resources are acceptable to the State for the SOW Agreement. The State’s right to request replacement of Contractor personnel hereunder relates solely to the removal of individuals from work on this Master Agreement and/or the particular SOW Agreement and does not create any employment or principal- agent relationship with the State. Nothing in this Master Agreement or any SOW Agreement entered into hereunder authorizes the State to direct the Contractor’s termination of, or other adverse action related to, the employment of any individual.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • School Operations The School’s governing board shall be solely responsible for the operation of the school and exercise continuing oversight over the School’s operations. The School’s governing board will define and refine policies regarding educational philosophy, and oversee assessment and accountability procedures to assure that the School’s student performance standards are met or exceeded.

  • Construction Phase Services 3.1.1 – Basic Construction Services

  • Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Project Monitor The Project shall be monitored by the Sponsor through the Director of the Xxxxxxx-Xxxxxxxxx County Human Services Department (“Project Monitor”). In the event of noncompliance with this Grant Contract by Grantee, the Project Monitor shall report said noncompliance to the Lancaster County Board for further action which may include termination of the Grant Contract.

  • Contractor Project Manager The Contractor Project Manager shall serve, from the Effective Date, as the Contractor project manager and primary Contractor representative under this Agreement. The Contractor Project Manager shall (i) have overall responsibility for managing and coordinating the performance of Contractor’s obligations under this Agreement, including the performance of all Subcontractors; and (ii) be authorized to act for and bind Contractor and Subcontractors in connection with all aspects of this Agreement. The Contractor Project Manager shall respond promptly and fully to all inquiries from the JBE Project Manager.

  • Building Commissioning Services The Owner may provide as a part of its testing services the Building Commissioning services involving the project’s HVAC and exhaust systems, temperature control systems, fire detection and alarm systems, emergency power and lighting system, fire suppression system, security locks and security locking control systems, food service equipment (if applicable), and laundry equipment (if applicable). In the event the Using Agency’s Program specifies additional commissioning services, the Owner shall procure such services as well. The Owner, through its Executive Administrator, may engage an independent Commissioning Authority. It is the intent of this Article that the Commissioning Authority enforce the requirements mentioned herein and certify that the systems and equipment listed all function properly prior to the initiation of each final inspection.

Time is Money Join Law Insider Premium to draft better contracts faster.