Intrusion Detection System Sample Clauses

Intrusion Detection System. Genesys has implemented intrusion detection across the Cloud Services environment that meets PCI DSS requirements.
AutoNDA by SimpleDocs
Intrusion Detection System. (a) 1 DMP 142 zone panel (b) 1 DMP wireless LCD Keypad
Intrusion Detection System a) All facility external warehouse doors alarmed to detect unauthorized opening and linked to main alarm system.
Intrusion Detection System. The Contractor must design, procure, install, program, test, document, and provide training to multiple personnel, for a complete turn-key system. • The work will include, but may not be limited to the following; - Install a TSA Office of Security approved Bosch intrusion detection system or approved equal. - Install a Bosch Model D9412Gv4 or approved equal. - The installer must be a certified vendor who is experienced in the programming the advanced software features associated with this panel and which is required for this security application. - The host panel and all associated control equipment will be located in LAN/Server room (Door 3). - All equipment serving the IDS/Access Control system will be wall mounted on the wall of LAN/SERVER room. - The contractor will provide all equipment mounts, slides, shelves or other items. - Bosch D1265 arm/disarm keypads will be mounted inside the Public Entrances (Door 1) and internal to the LAN ROOM (Door 3), to the facility and will be programmed to accept all password combinations and will have the capability to arm and disarm all alarm points designated as general office security points. - Vendors: The contractor is responsible to ensure selected vendor is competent and current on the required panels. - The alarm system will notify via telephone connection or Internet connection the agency specified location violations of the security system. - Power for all intrusion detection devices installed on the floors are centrally powered and monitored from the LAN ROOM. - All intrusion detection devices are required to interface with the Bosch Model D9412Gv4 system or approved equal. • The Contractor will maintain and warranty the system for one year after the acceptance date. For Official Use Only (FOUO) • The Battle Creek Michigan Federal Protective Service (FPS) Mega Center will remotely monitor the installed system and must be compatible with FPS existing hardware and software. Bosch D9412Gv4 • The contractor will be responsible for all the initial input of user codes and completion of the FPS Mega Center Alarm Requirements Document to be provided by the TSA Office of Security once the system has been installed and is ready for set up and programming. • The minimum number of user pass codes must be 249. • All installed equipment must have sufficient power supplies as necessary to provide battery backup for a 4-hour minimum outage.
Intrusion Detection System. (IDS) Software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or disabling computer systems, mainly through a network, such as the Internet. These attempts may take the form of attacks - for example: by crackers, malware and/or disgruntled employees. Invoicing Requirement The requirements set out in Attachment 4-G (Form of Invoice) of Exhibit 4 (Pricing and Financial Provisions).
Intrusion Detection System. (IDS) The IDS SC implements the required threat detection techniques. There are two primary threat detection techniques: signature-based detection and anomaly-based detection. The first technique uses known characteristics of such attacks to identify them in the monitored traffic or system. For anomaly-based detection, this technique stores the normalised baseline and generates an alert when detecting an unknown behaviour or activity. These detection techniques are essential when deciding whether to go with a signature- or anomaly-based detection engine. At the implementation level, presented in section 4.1.1, most of the software listed incorporates signature-based rules. The anomaly-based detection approach will be implemented with the help of the Multi-Modal Machine Learning (MMML) and Remediation and Recommendation (RR) subcomponents, being designed and implemented by PALANTIR’s T5.2 and T5.4 respectively, as part of the Threat Intelligence (TI) component. The IDS is commonly installed into one or more systems, devices or sensors of the network with the purpose of correctly analysing all parts of the environment. The workflow of an IDS is the following: the IDS has a predefined knowledge base with characteristics of known threats. Leveraging this, the IDS is able to match the traffic analysed via attack signatures. After detecting a threat, the IDS can enable established rules to generate an alert to notify of the intrusion found. This alert will be transmitted to the specific Xxxxx broker for a further (more holistic approach) analysis.

Related to Intrusion Detection System

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • DTC DIRECT REGISTRATION SYSTEM AND PROFILE MODIFICATION SYSTEM (a) Notwithstanding the provisions of Section 2.4 of the Deposit Agreement, the parties acknowledge that DTC’s Direct Registration System (“DRS”) and Profile Modification System (“Profile”) apply to the American Depositary Shares upon acceptance thereof to DRS by DTC. DRS is the system administered by DTC that facilitates interchange between registered holding of uncertificated securities and holding of security entitlements in those securities through DTC and a DTC participant. Profile is a required feature of DRS that allows a DTC participant, claiming to act on behalf of an Owner of American Depositary Shares, to direct the Depositary to register a transfer of those American Depositary Shares to DTC or its nominee and to deliver those American Depositary Shares to the DTC account of that DTC participant without receipt by the Depositary of prior authorization from the Owner to register that transfer.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Signaling Link Transport 9.2.1 Signaling Link Transport is a set of two or four dedicated 56 kbps transmission paths between Global Connection-designated Signaling Points of Interconnection that provide appropriate physical diversity.

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • SPRINKLER SYSTEM If there now is or shall be installed in the Building a "sprinkler system", and such system or any of its appliances shall be damaged or injured or not in proper working order by reason of any act or omission of Tenant, Tenant's agents, servants, employees, licensees or visitors, Tenant shall forthwith restore the same to good working condition at its own expense; and if the New York Board of Fire Underwriters or the New York Fire Insurance Rating Organization or any bureau, department or official of the state or city government, shall require or recommend that any changes, modifications, alterations or additional sprinkler heads or other equipment be made or supplied by reason of Tenant's business, or the location of the partitions, trade fixtures, or other contents of the Premises, Tenant shall, at Tenant's expense, promptly make and supply such changes, modifications, alterations, additional sprinkler heads or other equipment.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Information Systems The Official Agency in conjunction with the Authority will meet the relevant requirements of Articles 131 to 136 of Regulation (EU) 2017/625 and Implementing Regulation (EU) 2019/1715 as appropriate to the Official Agency. The Official Agency shall record appropriate data in the Official Agency Premises Inspection database (OAPI), which will be further developed over the life of the contract. Data should be entered into the database on an ongoing basis but shall be entered within one month of the activity taking place, unless otherwise agreed with the Authority.

  • System and Data Access Services a.System. Subject to the terms and conditions of this Addendum and solely for the purpose of providing access to Fund Data as set forth herein, State Street hereby agrees to provide the Fund, or certain third parties approved by State Street that serve as the Fund`s investment advisors, investment managers or fund accountants (the "Fund Accountants") or as the Fund`s independent auditors (the "Auditor"), with access to State Street`s Multicurrency HORIZONR Accounting System and the other information systems described in Attachment A (collectively, the "System") on a remote basis solely on the computer hardware, system software and telecommunication links described in Attachment B (the "Designated Configuration") or on any designated substitute or back-up equipment configuration consented to in writing by State Street, such consent not to be unreasonably withheld.

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

Time is Money Join Law Insider Premium to draft better contracts faster.