Common use of Intrusion Detection Clause in Contracts

Intrusion Detection. Protection and Firewall Appliances — Provide comprehensive inline network firewall security from worms, Trojans, spyware, key loggers, and other malware. This includes Next-Generation Firewalls (NGFW), which offer a wire-speed integrated network platform that performs deep inspection of traffic and blocking of attacks. Intrusion Detection/Protection and Firewall Appliances should provide: • Non-disruptive in-line bump-in-the-wire configuration • Standard first-generation firewall capabilities, e.g., network-address translation (NAT), stateful protocol inspection (SPI) and virtual private networking (VPN), etc. • Application awareness, full stack visibility and granular control • Capability to incorporate information from outside the firewall, e.g., directory-based policy, blacklists, white lists, etc. • Upgrade path to include future information feeds and security threats • SSL decryption to enable identifying undesirable encrypted applications (Optional)

Appears in 4 contracts

Samples: Cooperative Contract, Cooperative Contract, bidopportunities.iowa.gov

AutoNDA by SimpleDocs

Intrusion Detection. Protection and Firewall Appliances Provide comprehensive inline network firewall security from worms, Trojans, spyware, key loggers, and other malware. This includes Next-Generation Firewalls (NGFW), which offer a wire-speed integrated network platform that performs deep inspection of traffic and blocking of attacks. Intrusion Detection/Protection and Firewall Appliances should provide: • Non-disruptive in-line bump-in-the-wire configuration • Standard first-generation firewall capabilities, e.g., network-address translation (NAT), stateful protocol inspection (SPI) and virtual private networking (VPN), etc. • Application awareness, full stack visibility and granular control • Capability to incorporate information from outside the firewall, e.g., directory-based policy, blacklists, white lists, etc. • Upgrade path to include future information feeds and security threats • SSL decryption to enable identifying undesirable encrypted applications (Optional)

Appears in 4 contracts

Samples: Cooperative Contract, End User License Agreement, Service and License Agreement

Intrusion Detection. Protection and Firewall Appliances Provide comprehensive inline network firewall security from worms, Trojans, spyware, key loggers, and other malware. This includes Next-Generation Firewalls (NGFW), which offer a wire-speed integrated network platform that performs deep inspection of traffic and blocking of attacks. Intrusion Detection/Protection and Firewall Appliances should provide: Non-disruptive in-line bump-in-the-wire configuration Standard first-generation firewall capabilities, e.g., network-address translation (NAT), stateful protocol inspection (SPI) and virtual private networking (VPN), etc. Application awareness, full stack visibility and granular control Capability to incorporate information from outside the firewall, e.g., directory-based policy, blacklists, white lists, etc. Upgrade path to include future information feeds and security threats SSL decryption to enable identifying undesirable encrypted applications (Optional)

Appears in 1 contract

Samples: End User License Agreement

Intrusion Detection. Protection and Firewall Appliances Provide comprehensive inline network firewall security from worms, Trojans, spyware, key loggers, and other malware. This includes Next-Generation Firewalls (NGFW), which offer a wire-speed integrated network platform that performs deep inspection of traffic and blocking of attacks. Intrusion Detection/Protection and Firewall Appliances should provide: Non-disruptive in-line bump-in-the-wire configuration Standard first-generation firewall capabilities, e.g., network-address translation (NAT), stateful protocol inspection (SPI) and virtual private networking (VPN), etc. Application awareness, full stack visibility and granular control Capability to incorporate information from outside the firewall, e.g., directory-based policy, blacklists, white lists, etc. Upgrade path to include future information feeds and security threats SSL decryption to enable identifying undesirable encrypted applications (Optional)

Appears in 1 contract

Samples: www.ok.gov

AutoNDA by SimpleDocs

Intrusion Detection. Protection and Firewall Appliances — Provide comprehensive inline network firewall security from worms, Trojans, spyware, key loggers, and other malware. This includes Next-Generation Firewalls (NGFW), which offer a wire-speed integrated network platform that performs deep inspection of traffic and blocking of attacks. Intrusion Detection/Protection and Firewall Appliances should provide: • Non-disruptive in-line bump-in-the-wire configuration • Standard first-generation firewall capabilities, e.g., network-address translation (NAT), stateful protocol inspection (SPISPl) and virtual private networking (VPN), etc. • Application awareness, full stack visibility and granular control • Capability to incorporate information from outside the firewall, e.g., directory-based policy, blacklists, white lists, etc. • Upgrade path to include future information feeds and security threats • SSL decryption to enable identifying undesirable encrypted applications (Optional)

Appears in 1 contract

Samples: Cooperative Contract

Intrusion Detection. Protection and Firewall Appliances - Provide comprehensive inline network firewall security from worms, Trojans, spyware, ,key loggers, and other malware. This includes Next-Generation Firewalls (NGFW), which offer a wire-speed integrated network platform that performs deep inspection of traffic and blocking of blockingof attacks. Intrusion Detection/Protection and Firewall Appliances should provideshouldprovide: Non-disruptive in-line bump-in-the-wire configuration Standard first-generation firewall capabilities, e.g., network-address translation (NAT), stateful protocol inspection (SPI) and virtual private networking (VPN), etc. Application awareness, full stack visibility and granular control Capability to incorporate information from outside the firewall, e.g., directory-directory- based policy, blacklists, white lists, etc. Upgrade path to include future information feeds and security threats SSL decryption to enable identifying undesirable encrypted applications (Optional)

Appears in 1 contract

Samples: Assignment Agreement Terms and Conditions

Time is Money Join Law Insider Premium to draft better contracts faster.