Vulnerability Management. Braze’s infrastructure and applications are continuously scanned by a Vulnerability Management System. Alerts are monitored by our Security Team and addressed at least monthly by the Braze Vulnerability Management Team. Xxxxx also maintains a list membership to various CVE vulnerability mailing lists. Patches and ‘critical’ and ‘high’ vulnerabilities are remediated no later than 30 days following discovery. Braze also uses static code analysis tools during the build process (such as Brakeman and bundler-audit) to perform static security analysis.
Appears in 8 contracts
Samples: marketing-assets.braze.com, marketing-assets.braze.com, marketing-assets.braze.com
Vulnerability Management. Braze’s infrastructure and applications are continuously scanned by a Vulnerability Management System. Alerts are monitored by our Security Team and addressed at least monthly by the Braze Vulnerability Management Team. Xxxxx Braze also maintains a list membership to various CVE vulnerability mailing lists. Patches and ‘critical’ and ‘high’ known vulnerabilities are remediated no later than 30 days following discovery. Braze also uses static code analysis tools during the build process (such as Brakeman and bundler-bundler- audit) to perform static security analysis.
Appears in 2 contracts
Samples: Data Processing Addendum, info.braze.com
Vulnerability Management. Braze’s infrastructure and applications are continuously scanned by a Vulnerability Management System. Alerts are monitored by our Security Team and addressed at least monthly by the Braze Vulnerability Management Team. Xxxxx Braze also maintains a list membership to various CVE vulnerability mailing lists. Patches and ‘critical’ and ‘high’ vulnerabilities are remediated no later than 30 days following discovery. Braze also uses static code analysis tools during the build process (such as Brakeman and bundler-audit) to perform static security analysis.
Appears in 1 contract
Samples: Data Processing Addendum