Firewall Sample Clauses

Firewall. 2.1 Subject to the terms and conditions of the Agreement, we agree to supply and you agree to purchase the Firewall (if any) specified in the Customer Order Form and described at xxxxx://xxx.xxxxxx.xxx in the Company's literature at the date of completion of the Customer Order Form.
AutoNDA by SimpleDocs
Firewall. Firewall must not impede or impair optimal video transmission yet security requirements, such as those of HIPAA, should not be compromised.
Firewall. Firewall provides perimeter security via a Verizon-network-based firewall. With Firewall, Verizon provides firewall configuration, administration, support, and the use of a firewall system consisting of firewall equipment and related software that is owned and supported by Verizon on its network. Verizon provides up to seven (7) IP addresses with Firewall; additional IP addresses may be ordered.
Firewall. A firewall serves as a security gate between the Internet and Bank’s network that inspects data passing through it, and denies or permits passage based on a set of rules. By intercepting the data first, the firewall ensures that only data permitted by Bank’s rule set may be passed beyond the Internet to Bank’s secure web commerce server, and ultimately to Online Banking.
Firewall. Flexera Software will employ firewall security protection modules that are designed to prevent unauthorized access to Flexera Software's network. The firewall modules will be controlled through a management system, which also provides for the storage, management and analysis of firewall log files. Firewall configurations, security policies, and authentication policies will be routinely backed up through a secure process.
Firewall. The Solutions platform is implemented behind redundant firewall service and load-balancing from reputable suppliers. It is implemented unique rules for the firewall and policies based on the security requirements the Solution demands. The Operating Partner is responsible for all operation, maintenance and monitoring of firewalls. BACKUP & RESTORE Backup service for the Solution consists of an advanced two-layer architecture with backup to disk and then to the underlying tape or disk storage in a third datacentre. This architecture leads to significantly shorter backup and restore times. We have the following standard backup: • Incremental backup is performed twice daily (at. 12:00 and 24:00) • Deleted / changed files stored on backup for 30 days (retention) Backup is taken daily in our Operating Partner's backup windows, with guaranteed response to restore in the event of hardware failure or data loss. Backup services are online and do not imply downtime for backup. Only authorized personnel have access to physical copies of backup media. Involved technicians must sign a declaration of confidentiality. MICROSOFT AZURE CLOUD HOSTING Azure Cloud Services offers a rich service catalog and a dynamic allocation of resources. In cooperation with our professional operation partner Basefarm, Azure is utilized to provide a stable and future proof operating environment for our applications and data. THE OPERATING ENVIRONMENT Azure Norway is used to ensure that all customer data stay located in Norway. In all Azure datacenters physical access to the areas where data is stored is strictly controlled. Typically, tall fences made of steel and concrete encompass every inch of the perimeter. Cameras are located around the datacenters, with a security team monitoring their videos at all times. Professionally trained security officers also routinely patrol the datacenter and monitor the videos from cameras inside the datacenter at all times. Controlled access points are located at the facility’s perimeter, at the building’s perimeter, inside the building, and on the datacenter floor. Physical access to the datacenter is strictly controlled and must be requested and approved before arriving at the datacenter. Permissions are granted on a need-to-access basis and limited to a certain period of time. Physical security reviews of the facilities are conducted periodically. The Azure infrastructure meets a broad set of international and industry-specific compliance standards, suc...
Firewall. The Azure platform Firewall is a managed, cloud-based network security service that protects our Network resources. It's a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability. The Operating Partner in cooperation with Microsoft Azure is responsible for all operation, maintenance and monitoring of firewalls. BACKUP & RESTORE Backup service for the Solution running on Azure uses reliable Blob storage with in-built security and high availability features. When applicable, snapshots are used for some workloads such as VMs and Azure Files, drastically reducing the time to recover your data to the original storage. We have the following standard backup: • Incremental backup is performed twice daily (at. 12:00 and 24:00) • Deleted / changed files stored on backup for 30 days (retention) Backup is taken daily with guaranteed response to restore in the event of hardware failure or data loss. Backup services are online and do not imply downtime for backup Access to backups is restricted only to authorized Backup Admins. All infrastructure is represented as code and can quickly be rebuilt from scratch in case of a disastrous loss of data. Infrastructure code is located in a secure git repository. Infrastructure as code makes it easy to move the entire deployment of services to a different datacenter should the need arise. APPENDIX D Agreed changes The Parties agree to add the following wording in addition to what is stated in clause 9.1:
AutoNDA by SimpleDocs
Firewall. Reviewing device redundancy, the state of operating system code, availability and appropriate use of certain software capabilities that reduce the possibility of malware or malicious attacks while minimizing the inappropriate use of the internet by end-users and/or the potential for loss of connectivity due to hardware failure.
Firewall. An industry-standard firewall is installed to inspect all connections routed to the system’s environment. Vulnerability and Penetration Tests. Flipnode regularly performs vulnerability analysis aimed at specifying the status of exposure to known vulnerabilities, in relation to both the infrastructural and application environments, considering the systems in operation or in the development phase. These checks take place periodically, every six months, supplemented by specific penetration tests, involving intrusion simulations which use different attack scenarios.
Firewall. Each virtual server is secured through a shared hardware firewall. Virtual servers For the FLEX START server, a number of firewall rules are predefined. The following ports are opened for the START server: (20/21) FTP, (22) SSH, (25) SMTP, (53) DNS, (80) HTTP, (110) POP3, (443) HTTPS, (1433) SQL- 1502136 - 2640
Time is Money Join Law Insider Premium to draft better contracts faster.