Examples of CrowdStrike Systems in a sentence
Monitor the access, availability, capacity and performance of the CrowdStrike Systems, and related system logs and network traffic using various monitoring software and services b.
Maintain policies requiring reasonable background checks of any new employees who will have access to Personal Data or relevant CrowdStrike Systems, subject to local law b.
Promptly after written (including email) request from Customer, CrowdStrike shall provide Customer with: (i) its most recent SOC II, Type 2 report regarding the CrowdStrike Systems; and (ii) provide its completed Standardized Information Gathering (SIG) questionnaire (or similar document) for the CrowdStrike Systems (the “Security Documentation”).
Maintain policies requiring reasonable background checks of any new employees who will have access to Personal Data or relevant CrowdStrike Systems, subject to local law.
Promptly after written (including email) request from Customer, CrowdStrike shall provide Customer with: (i) its most recent SOC II, Type 2 report regarding the CrowdStrike Systems; and (ii) provide its completed Standardized Information Gathering (SIG) questionnaire (or similar document) for the CrowdStrike Systems Security .
Monitor the access, availability, capacity and performance of the CrowdStrike Systems, and related system logs and network traffic using various monitoring software and services.
Promptly after written (including email) request from Customer, CrowdStrike shall provide Customer with: (1) its most recent SOC II, Type 2 report regarding the CrowdStrike Systems; and (2) provide its completed Standardized Information Gathering (SIG) questionnaire for the CrowdStrike Systems.
Maintain policies requiring reasonable background checks of any new employees who will have access to Personal Information or relevant CrowdStrike Systems, subject to local law b.
SupplierRelationshipsPeriodically review available security assessment reports of vendors hosting the CrowdStrike Systems to assess their security controls and analyze any exceptions set forth in such reports13.
Monitor the access, availability, capacity and performance of the CrowdStrike Systems, and related system logs and network traffic using various monitoring software and servicesb.