Servers. Marco backs up the following servers only: Windows Servers, SQL servers, Exchange server, and Virtual Machines images running VMWare or Hyper V.
Servers. Provide the number of servers not housed in a data center or "in the cloud," on which Texas HHS Confidential Information is stored or will be stored. A server is a dedicated computer that provides data or services to other computers. It may provide services or data to systems on a local area network (LAN) or a wide area network (WAN) over the Internet. If none, answer "0" (zero).
Servers. Licensor shall not be responsible for supporting Licensee’s server(s) or other hardware. In the event that Licensee requires more than eight (8) NetAcuity servers, it must deploy a remote update server (“RUS”), such as, by way of example only, a caching update server meant for deployment into networks of customers that have multiple NetAcuity servers. It is understood and agreed that the main benefit of the RUS is that only the RUS would actually download database updates from Digital Envoy’s Master Update Server (MUS) on a weekly basis and that with the RUS deployed in a network, all NetAcuity servers would get their database updates from the RUS inside the network, resulting in less bandwidth leaving the network for updates.
Servers. PC Workstations
Servers. Xxxxx backs up the following servers only: Windows Servers, SQL servers, Exchange server, and Virtual Machines images running VMWare or Hyper V.
Servers. Access to administrative tools and interfaces on servers shall be restricted. Employees with administrative rights shall use strong passwords and MFA. It shall not be permitted to assign or share login details to or with other individuals. Documented procedures shall be in place to ensure that important updates to operating systems and applications are installed immediately.
Servers. Exclusive use of branded components
Servers. On purchase order, the Vendor provides a cryptographically individual- ised installer for the Server available to the Customer. It falls to the Customer to procure licences for software deployed with but not included in the Software, e. g. operating system, database, backup or clustering software. The Vendor is entitled to forestall the illegitimate propagation of its Software by technical means, e. g cryptographic hardware or software components or online activation procedures which may be required for installing and running a Server. The deployed cryptographic mecha- nisms may also serve for secure authentication with the Subscription Store. Servers must be physically located in a way that enables the Customer to comply with its duty to take care. This prevents any placement of the Server in unprotected public networks.
Servers. XXXXXX, Dell, Fujitsu, HPE, HVE, IBM & Xxxxxx