Threat Detection Clause Samples

Threat Detection. KPMG shall use commercially reasonable anti-malware software to scan the ▇▇▇▇ Connected Solution but does not warrant that the ▇▇▇▇ Connected Solution will be free from viruses and/or malware. Customer agrees that Customer, and Authorized Users, shall use commercially reasonable anti-malware software to scan Customer’s systems that access the ▇▇▇▇ Connected Solution and any information before it is uploaded to the ▇▇▇▇ Connected Solution.
Threat Detection. We have monitoring, alerting, and response processes for suspicious activity occurring in our infrastructure. No secret data (passphrases, API keys, QR Codes for 2-factor, etc) are sent using tools like Gmail, Dropbox or Slack. We use 1Password or GCP Secret Manager to manage credentials in accordance with our security requirements. We regularly update our operating systems images, container images, language runtimes, and language libraries to the latest known supported versions.
Threat Detection a. Ramp utilizes our endpoint protection platform as a managed service for dedicated threat detection. Their service detects intrusions, malware, and malicious activities on endpoints and assists in rapid response to eliminate and mitigate those threats.
Threat Detection. Using SentinelOne's advanced analytics and machine learning to identify potential threats and vulnerabilities.