Protected Servers definition

Protected Servers means those Customer servers designated by the Customer to be backed up and Replicated to the Aptum Cloud.
Protected Servers means your servers which are cloned using virtualization on your onQ HA Appliance and which are backed-up at a Data Center as either a R2R Recovery Node or an onDemand Recovery Node.
Protected Servers means the servers safeguarded by DRaaS. Rate of Change means the amount of data that is assumed to be changed on the Protected Servers in each RPO period. Recovery Point Objective (RPO) means the maximum period of time in which replicated data at the Recovery Site is behind the production data on the Protected Servers, excluding periods where the Rate of Change exceeds the value set out in the CMS SOW or initial or delta synchronisation operations are active.

Examples of Protected Servers in a sentence

  • Specify Protected Server(s) details.Path-specific routingYou can enable path-specific routing to define (the path) to which web servers incoming requests are forwarded.You can define that all URLs with a specific path, for example, /products/, are sent to a specific web server.

  • This may render certain DAR EM products incompatible.MA Option 3: consists of enterprise managing one layer, either: after the Inner Solution boundary or before it in a separate red enclave, and the second layer managed locally.For integration with the MA CP where one of the servers is before the Inner Solution boundary, the server must follow guidance found in the Mobile Access CP, referencing the protection of Inner TLS- Protected Servers and Clients.

  • Such options include the ability to designate the level of protection to individual Protected Servers according to their criticality to your business.

  • Specify Protected Server(s) details.Path-specific routingYou can enable path-specific routing to define (path) to which web servers incoming requests are forwarded.You can define that all URLs with a specific path, for example, /products/, are sent to a specific web server.

  • Specify Protected Server(s) details.Path-specific routingYou can enable path-specific routing to define (a path) to which web servers incoming requests are forwarded.You can define that all URLs with a specific path, for example, /products/, are sent to a specific web server.

  • On the other hand, Protected Servers which are designated as onDemand Recovery Nodes, will first need to be built before they can be run or tested.

  • Protected Servers which are cloned as R2R Recovery Nodes allow, essentially, instant recovery with a very low recovery time objective.

  • The Customer acknowledges that the Replication requires suitable IT systems at the Customer’s premises from which the Customer Content is Replicated to the Aptum Cloud, including Protected Servers, network connections, operating system(s) and third parties' software that are commensurate to the scope and volume of the Customer Content.

  • For the avoidance of doubt, replication is only available into, and not out of, Amazon AWS and is available for a tertiary copy of Protected Servers.

  • See Also‌Managing Protected File Servers and Workstations Managing Protected Servers Running Exchange Managing Protected Servers Running SQL ServerManaging Protected Servers Running Windows SharePoint Services Managing Protected Virtual Servers Protection for Clustered Servers‌ DPM 2007 supports shared disk clusters for file servers, Exchange Server 2003, SQL Server 2000, and SQL Server 2005.


More Definitions of Protected Servers

Protected Servers means any server designated by the Customer under this Agreement as being assigned to the Service.
Protected Servers means the servers replicated to the Azure recovery vault via Azure Site Recovery. Rate of Change means the amount of data that is assumed to be changed on the Protected Servers in each RPO period. Recovery Point means a recurring scheduled backup operation from which Customers nominated data and / or servers may be restored from. Recovery Point Objective (RPO) means the maximum period of time in which replicated data at the Recovery Site is behind the production data on the Protected Servers, excluding periods where (1) the Rate of Change exceeds the range supported by Microsoft Azure Site Recovery; or (2) initial or delta synchronisation operations are active.
Protected Servers means the servers replicated to the Azure recovery vault via Azure Site Recovery.

Related to Protected Servers

  • protected species means any of the following animals:

  • Protected Data means Student Data and/or Teacher or Principal Data, to the extent applicable to the product or service actually being provided to the District by Vendor pursuant to the Master Agreement.

  • Protected Health Information or “PHI” shall have the same meaning as the term “protected health information” in 45 C.F.R. § 160.103, and includes electronic PHI, as defined in 45 C.F.R. 160.103, limited to information created, maintained, transmitted or received by the Business Associate from or on behalf of the Covered Entity or from another Business Associate of the Covered Entity.

  • protected area means an area that is or has to be listed in the register referred to in section 10 of the Protected Areas Act;

  • Servers means the servers established, installed and operated by Licensee within the Territory only for the service of Game to End Users in the Territory.

  • protected variety means any variety that is the subject of a breeder’s right;

  • Protected Health Information (PHI) means individually identifiable health information created, received, maintained or transmitted by Business Associate on behalf of a health care component of the Covered Entity that relates to the provision of health care to an Individual; the past, present, or future physical or mental health or condition of an Individual; or the past, present, or future payment for provision of health care to an Individual. 45 CFR 160.103. PHI includes demographic information that identifies the Individual or about which there is reasonable basis to believe can be used to identify the Individual. 45 CFR 160.103. PHI is information transmitted or held in any form or medium and includes EPHI. 45 CFR 160.103. PHI does not include education records covered by the Family Educational Rights and Privacy Act, as amended, 20 USCA 1232g(a)(4)(B)(iv) or employment records held by a Covered Entity in its role as employer.

  • Protected wildlife means wildlife designated by the

  • Protected cell means an identified pool of assets and liabilities of a protected cell company segregated and insulated as provided under this chapter from the remainder of the protected cell company’s assets and liabilities.

  • Protected Person means: (i) the members of the Board; (ii) the Administrator and its Affiliates; (iii) any Member; (iv) any Officer; or (v) any Person who serves at the request of the Board on behalf of the Company as an officer, director, partner, member, stockholder or employee of any other Person.

  • Protected Health Information or PHI means any information, whether oral or recorded in any form or medium: (i) that relates to the past, present or future physical or mental condition of an individual; the provision of health care to an individual; and (ii) that identifies the individual or with respect to which there is a reasonable basis to believe the information can be used to identify the individual, and shall have the meaning given to such term under the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.501. Protected Health Information includes Electronic Protected Health Information [45 C.F.R. Sections 160.103, 164.501].

  • Designated Computer means the computers and the upgraded computers thereof installed in the offices of the Licensee.

  • Protected Employee means any employee of the Company or an Affiliate who was employed by Company or an Affiliate at any time within six (6) months prior to the termination of Grantee’s employment for any reason or any earlier date of an alleged breach by Grantee of the restrictions in Section 17 hereof.

  • Electronic Protected Health Information (EPHI) means Protected Health Information that is transmitted by electronic media or maintained in any medium described in the definition of electronic media at 45 CFR 160.103.

  • Electronic Protected Health Information means Protected Health Information that is maintained in or transmitted by electronic media.

  • Protected Activity means filing a charge, complaint, or report with, or otherwise communicating, cooperating, or participating in any investigation or proceeding that may be conducted by, any federal, state or local government agency or commission, including the Securities and Exchange Commission, the Equal Employment Opportunity Commission, the Occupational Safety and Health Administration, and the National Labor Relations Board (the “Government Agencies”). The Employee understands that in connection with such Protected Activity, the Employee is permitted to disclose documents or other information as permitted by law, and without giving notice to, or receiving authorization from, the Company. Notwithstanding the foregoing, the Employee agrees to take all reasonable precautions to prevent any unauthorized use or disclosure of any information that may constitute Company confidential information to any parties other than the Government Agencies. The Employee further understands that “Protected Activity” does not include the disclosure of any Company attorney-client privileged communications. Any language in any other agreement between the Company and the Employee regarding the Employee’s right to engage in Protected Activity that conflicts with, or is contrary to, this paragraph is superseded by this Agreement. In addition, pursuant to the Defend Trade Secrets Act of 2016, the Employee is notified that an individual will not be held criminally or civilly liable under any federal or state trade secret law for the disclosure of a trade secret that (i) is made in confidence to a federal, state, or local government official (directly or indirectly) or to an attorney solely for the purpose of reporting or investigating a suspected violation of law, or (ii) is made in a complaint or other document filed in a lawsuit or other proceeding, if (and only if) such filing is made under seal. In addition, an individual who files a lawsuit for retaliation by an employer for reporting a suspected violation of law may disclose the trade secret to the individual’s attorney and use the trade secret information in the court proceeding, if the individual files any document containing the trade secret under seal and does not disclose the trade secret, except pursuant to court order.

  • Protected Information means PHI provided by CE to BA or created, maintained, received or transmitted by BA on CE’s behalf.

  • Hosted Service means the provision of and access to the Vocera Care Transition Software and related services either at your site and/or via secure electronic access over the Internet provided to you by Vocera and/or its designee. Defined terms used in this XXXX, but not defined herein, are defined in the Supplemental Terms and Conditions in Attachment 3.

  • Employer/Client means the PSCA that signs the contract for the services/goods with the selected/qualified Contractor.

  • Protected Space Operations means all Launch or Transfer Vehicle activities, ISS activities, and Payload activities on Earth, in outer space, or in transit between Earth and outer space in implementation of the IGA, MOUs concluded pursuant to the IGA, implementing arrangements, and contracts to perform work in support of NASA's obligations under these Agreements. It includes, but is not limited to:

  • IT System means the configuration of computer components comprising all the software owned by, or licensed to you by a third party (and any updates and enhancements to it), all hardware, telecommunications and network equipment used by you, together with any asset which relies in any respect on computer hardware or other information technology (whether embedded or not) which links the different parts of the system together;