Vulnerability Management. Braze’s infrastructure and applications are continuously scanned by a Vulnerability Management System. Alerts are monitored by our Security Team and addressed at least monthly by the Braze Vulnerability Management Team. Xxxxx also maintains a list membership to various CVE vulnerability mailing lists. Patches and ‘critical’ and ‘high’ vulnerabilities are remediated no later than 30 days following discovery. Braze also uses static code analysis tools during the build process (such as Brakeman and bundler-audit) to perform static security analysis.
Appears in 8 contracts
Samples: Data Processing Addendum, Data Processing Addendum, Data Processing Addendum
Vulnerability Management. Braze’s infrastructure and applications are continuously scanned by a Vulnerability Management System. Alerts are monitored by our Security Team and addressed at least monthly by the Braze Vulnerability Management Team. Xxxxx Braze also maintains a list membership to various CVE vulnerability mailing lists. Patches and ‘critical’ and ‘high’ vulnerabilities are remediated no later than 30 days following discovery. Braze also uses static code analysis tools during the build process (such as Brakeman and bundler-audit) to perform static security analysis.
Appears in 3 contracts
Samples: Data Processing Addendum, Data Processing Addendum, Data Processing Addendum
Vulnerability Management. Braze’s infrastructure and applications are continuously scanned by a Vulnerability Management System. Alerts are monitored by our Security Team and addressed at least monthly by the Braze Vulnerability Management Team. Xxxxx Braze also maintains a list membership to various CVE vulnerability mailing lists. Patches and ‘critical’ and ‘high’ known vulnerabilities are remediated no later than 30 days following discovery. Braze also uses static code analysis tools during the build process (such as Brakeman and bundler-bundler- audit) to perform static security analysis.
Appears in 2 contracts