Security Operations Center (SOC) Sample Clauses

Security Operations Center (SOC). The Service is supported by the BlueVoyant Security Operations Center which operates 24 hours a day, 7 days a week, across multiple locations.
AutoNDA by SimpleDocs
Security Operations Center (SOC). BlueVoyant’s managed detection and response service is delivered through a cloud-native SOC, which operates 24 hours a day, 7 days a week. The BlueVoyant SOC is SOC II TYPE II certified and staffed with security experts with technical certifications including, but not limited to, Splunk certifications, SANS (GCFA, GCFE, CDIA, GCIA, GCIH), and CISSP.
Security Operations Center (SOC). BlueVoyant’s managed detection and response service is delivered through a cloud-native SOC, which operates 24 hours a day, 7 days a week. The BlueVoyant SOC is SOC II TYPE II certified and staffed with security experts with technical certifications including, but not limited to, Splunk certifications, SANS (GCFA, GCFE, CDIA, GCIA, GCIH), and CISSP. ● Threat Fusion Cell (TFC): The BlueVoyant Threat Fusion Cell (TFC) is a dedicated team of intelligence analysts and threat researchers operating within our SOC that identifies, prioritizes, and operationalizes information about threats that pose risks to our Clients. The TFC collects and curates feeds from 37 sources of data including BlueVoyant’s proprietary dataset, as well as an open-source, partner, and paid intelligence to operationalize and contextualize malicious activities that could pose a risk to you. Threat intelligence includes all atomic indicator types such as SHA256, SHA1, and MD5 hashes, email addresses, URLs, domains, IP addresses, and CVE vulnerabilities. In addition, threat intelligence indicators may also include unstructured indicators on the dark web from web forums or data leaks. ● Client Success Manager (CSM): The Client Success team is the main point of contact and the overall relationship manager for the Client beyond communications to and from the SOC analyst team. The assigned CSM acts as the Client’s consultant and enables the best experience for BlueVoyant services. The CSM will meet with the Client on a regular basis (typically monthly) to understand the Client's security program goals and will advise how BlueVoyant services can best meet their needs. The CSM is also engaged in any significant security events that occur for the Client. Additionally, the CSM will deliver any requested feedback to the BlueVoyant product and service delivery teams. The CSM will be the Voice of the Client within BlueVoyant. ● Health generated alerts are first triaged by BlueVoyant’s health team. A determination will be made if the alert is viable, actionable, and positive. In the event that the source of the alert is related to BlueVoyant deployed technology, we will work with the customer to notify them through escalation paths established at onboarding time. Customer action may be required to return systems to functional status. The BlueVoyant event flow disruption monitoring is limited in scope to data flows that support MDR use cases. ● For issues related to customer infrastructure, configuration...
Security Operations Center (SOC). There is one (1) “Central Monitoring Stationlocated in the Multnomah Building operating 24 hours/7 days a week/365 days a year. The SOC shall be responsible for monitoring video terminals, alarm terminals, managing communication and reporting systems, and dispatching security patrols and services to incidents. Staff provided to operate the SOC will be reviewed by the Workplace Security Program staff and selected at the sole discretion of the Workplace Security Program. All staff assigned to the SOC shall sign individual Non-Disclosure Agreements.

Related to Security Operations Center (SOC)

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Security Services In performing the Services, the Agent shall properly comply at all times with, and perform all of, the Security Procedures.

  • Construction Phase Services 3.1.1 – Basic Construction Services

  • Project Management Project Management Institute (PMI) certified project manager executing any or all of the following: • Development of Project Charter • Development of project plan and schedule • Coordination and scheduling of project activities across customer and functional areas • Consultation on operational and infrastructure requirements, standards and configurations • Facilitate project status meetings • Timely project status reporting • Address project issues with functional areas and management • Escalation of significant issues to customers and executive management • Manage project scope and deliverable requirements • Document changes to project scope and schedule • Facilitate and document project closeout

  • Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Contractor Project Manager The Contractor Project Manager shall serve, from the Effective Date, as the Contractor project manager and primary Contractor representative under this Agreement. The Contractor Project Manager shall (i) have overall responsibility for managing and coordinating the performance of Contractor’s obligations under this Agreement, including the performance of all Subcontractors; and (ii) be authorized to act for and bind Contractor and Subcontractors in connection with all aspects of this Agreement. The Contractor Project Manager shall respond promptly and fully to all inquiries from the JBE Project Manager.

  • STATEWIDE CONTRACT MANAGEMENT SYSTEM If the maximum amount payable to Contractor under this Contract is $100,000 or greater, either on the Effective Date or at any time thereafter, this section shall apply. Contractor agrees to be governed by and comply with the provisions of §§00-000-000, 00-000-000, 00-000-000, and 00- 000-000, C.R.S. regarding the monitoring of vendor performance and the reporting of contract information in the State’s contract management system (“Contract Management System” or “CMS”). Contractor’s performance shall be subject to evaluation and review in accordance with the terms and conditions of this Contract, Colorado statutes governing CMS, and State Fiscal Rules and State Controller policies.

  • Project Management Plan Developer is responsible for all quality assurance and quality control activities necessary to manage the Work, including the Utility Adjustment Work. Developer shall undertake all aspects of quality assurance and quality control for the Project and Work in accordance with the approved Project Management Plan and

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!