Exploit and Malware Protection Clause Samples
Exploit and Malware Protection. Consultant shall provide security controls required to identify attacks, identify changes to files, protect against malware, protect user web services, data loss prevention (DLP) and to perform forensic analysis. Consultant shall provide:
(i) file Integrity Monitoring Controls; (ii) Anti-Malware and Antivirus Controls; (iii) Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) Controls; (iv) Data Loss Prevention (DLP) Controls; (v) Forensic Controls; and (vi) Advanced Persistent Threat (APT) Controls.
Exploit and Malware Protection. Broker shall provide security controls required to identify attacks, identify changes to files, protect against malware, protect user web services, data loss prevention (DLP) and to perform forensic analysis. Broker shall provide: (i) file Integrity Monitoring Controls; (ii) Anti-Malware and Antivirus Controls; (iii) Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) Controls; (iv) Data Loss Prevention (DLP) Controls; (v) Forensic Controls; and (vi) Advanced Persistent Threat (APT) Controls.
Exploit and Malware Protection. Contractor shall provide security controls required to identify attacks, identify changes to files, protect against malware, protect user web services, data loss prevention (DLP) and to perform forensic analysis. Contractor shall provide: file Integrity Monitoring Controls;
