Vulnerability Scan definition
Examples of Vulnerability Scan in a sentence
Managed Information Security Service may consist of one or more of the following Service features as set forth on your applicable Service Order(s): Security Incident and Event Monitoring (“SIEM”); Behavioral Monitoring; Intrusion Detection; Asset Discovery; Incident Detection/Notification; Cybersecurity or other Risk Assessment; Vulnerability Scan, Assessment or Detection; Penetration Testing; Phishing Testing; and/or USM Activity Reporting.
PCI DSS External Vulnerability Scan Outbound call* made by Elavon to configure the scan with customer and walk through SAQ The purpose of this scan is to identify if there are vulnerable entry points to your business network by scanning all possible points of entry.
Document Description Submission Requirements Entity Responsible Deadline Vulnerability Scan ▪ A Prospective EDE Entity is required to conduct monthly Vulnerability Scans.
Perform Vulnerability Scan: Perform a vulnerability scan of computers containing LANDESK client agents.
In addition, Customer’s Initial Vulnerability Scan shall include _x_ hours of assistance to identify remediation steps to address vulnerabilities identified in the initial scan performed on Customer’s Computer System, which Customer shall be required to use within ten (10) business days of receiving the initial SAR or shall forfeit such remediation assistance.
To assist our Clients with their compliance efforts, Client may provide Vulnerability Scan Reports to Developer and Developer will mitigate any highlighted issues under Developer’s or Hosting Provider’s reasonable control to fix.
Vulnerability Vulnerability Scans and Vulnerability Scan reporting shall be performed at minimum as defined by regulatory needs.
Customer Deliverables The following deliverables shall be securely provided to Customer: Deliverable Description Expected Timeframes Execution of the Internal Vulnerability Scan and the External Vulnerability Scan Vodafone shall perform the Internal Vulnerability Scan and the External Vulnerability Scan on the Customer’s Environment.
To the extent Company has supplied any equipment for use during any Study; such equipment shall be properly maintained by University throughout the conduct of the Study and kept in good operating condition, reasonable wear and tear expected.
Payment is due at the time of service for the Initial Vulnerability Scan.