Vulnerability Monitoring. Zoommust continuously gather information and analyze vulnerabilities in light of existing and emerging threats and actual attacks. Processes must include vulnerability scans, anti-malware, Intrusion Detection Systems (IDS)/Intrusion Prevention Systems (IPS), logging and security information and event management analysis and correlation.
Appears in 4 contracts
Samples: Student Data Privacy Agreement, higherlogicdownload.s3.amazonaws.com, www.queensu.ca
Vulnerability Monitoring. Zoommust Zoom must continuously gather information and analyze vulnerabilities in light of existing and emerging threats and actual attacks. Processes must include vulnerability scans, anti-malware, Intrusion Detection Systems (IDS)/Intrusion Prevention Systems (IPS), logging and security information and event management analysis and correlation.
Appears in 2 contracts
Samples: zoom.us, explore.zoom.us