Intrusion Detection Sample Clauses

Intrusion Detection. All systems involved in accessing, holding, transporting, and protecting PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY that are accessible via the Internet must be protected by a comprehensive intrusion detection and prevention solution.
AutoNDA by SimpleDocs
Intrusion Detection. All systems involved in accessing, holding, transporting, and protecting DHCS PHI or PI that are accessible via the Internet must be protected by a comprehensive intrusion detection and prevention solution.
Intrusion Detection. All systems involved in accessing, holding, transporting, and protecting County PHI or PI that are accessible via the Internet must be protected by a comprehensive intrusion detection and prevention solution.
Intrusion Detection. All systems involved in accessing, holding, transporting, and protecting CDPH PCI that are accessible via the Internet must be protected by a comprehensive intrusion detection and prevention solution.
Intrusion Detection. Intrusion detection is intended to provide insight into ongoing attack activities and provide adequate information to respond to incidents. Google’s approach to this involves:
Intrusion Detection. Protection and Firewall Appliances ― Provide comprehensive inline network firewall security from worms, Trojans, spyware, key loggers, and other malware. This includes Next-Generation Firewalls (NGFW), which offer a wire-speed integrated network platform that performs deep inspection of traffic and blocking of attacks. Intrusion Detection/Protection and Firewall Appliances should provide: • Non-disruptive in-line bump-in-the-wire configuration • Standard first-generation firewall capabilities, e.g., network-address translation (NAT), stateful protocol inspection (SPI) and virtual private networking (VPN), etc. • Application awareness, full stack visibility and granular control • Capability to incorporate information from outside the firewall, e.g., directory-based policy, blacklists, white lists, etc. • Upgrade path to include future information feeds and security threats • SSL decryption to enable identifying undesirable encrypted applications (Optional)
Intrusion Detection. UKG shall implement and maintain an intrusion detection monitoring process at the network and/or host level to protect the Services and detect unwanted or hostile network traffic. UKG shall update its intrusion detection software regularly, on a scheduled basis, following the availability of updates by the software provider or a heuristic analysis shall be used.
AutoNDA by SimpleDocs
Intrusion Detection. All systems involved in accessing, holding, transporting, and protecting DOM data that are accessible via the Internet must be protected by a comprehensive intrusion detection and prevention solution.
Intrusion Detection. All systems involved in accessing, holding, transporting, and 4 protecting COUNTY PCI that are accessible via the Internet must be protected by a comprehensive 5 intrusion detection and prevention solution.
Intrusion Detection. Bluecore’s intrusion detection capabilities include sophisticated data processing pipelines which integrate host-based signals on individual devices, network-based signals from various monitoring points in the infrastructure, and signals from infrastructure services. Rules and machine intelligence built on top of these pipelines give operational security and operational personnel warnings of possible incidents.
Time is Money Join Law Insider Premium to draft better contracts faster.