Common use of Preventing Unauthorized Product Use Clause in Contracts

Preventing Unauthorized Product Use. We implement industry standard access controls and detection capabilities for the internal networks that support its products. DocuSign Envelope ID: 0BD26021-91CB-402B-A98F-F0AF7413357D Access controls: Network access control mechanisms are designed to prevent network traffic using unauthorized protocols from reaching the product infrastructure. The technical measures implemented differ between infrastructure providers and include Virtual Private Cloud (VPC) implementations, security group assignment, and traditional firewall rules. Intrusion detection and prevention: We implement a Web Application Firewall (WAF) solution to protect hosted customer websites and other internet-accessible applications. The WAF is designed to identify and prevent attacks against publicly available network services. Static code analysis: Code stored in our source code repositories is checked for best practices and identifiable software flaws using automated tooling. Penetration testing: We maintain relationships with industry-recognized penetration testing service providers for penetration testing of both the HubSpot web application and internal corporate network infrastructure at least annually. The intent of these penetration tests is to identify security vulnerabilities and mitigate the risk and business impact they pose to the in-scope systems. Bug bounty: A bug bounty program invites and incentivizes independent security researchers to ethically discover and disclose security flaws. We implement a bug bounty program in an effort to widen the available opportunities to engage with the security community and improve the product defenses against sophisticated attacks.

Appears in 1 contract

Samples: 742851.fs1.hubspotusercontent-na1.net

AutoNDA by SimpleDocs

Preventing Unauthorized Product Use. We implement industry standard access controls and detection capabilities for the internal networks that support its products. DocuSign Envelope ID: 0BD26021-91CB-402B-A98F-F0AF7413357D Access controls: Network access control mechanisms are designed to prevent network traffic using unauthorized protocols from reaching the product infrastructure. The technical measures implemented differ between infrastructure providers and include Virtual Private Cloud (VPC) implementations, security group assignment, and traditional firewall rules. DocuSign Envelope ID: 1A08F25F-AA85-44CB-9938-9904100C1242 Intrusion detection and prevention: We implement a Web Application Firewall (WAF) solution to protect hosted customer websites and other internet-accessible applications. The WAF is designed to identify and prevent attacks against publicly available network services. Static code analysis: Code Security reviews of code stored in our source code repositories is checked performed, checking for coding best practices and identifiable software flaws using automated toolingflaws. Penetration testing: We maintain relationships with industry-industry recognized penetration testing service providers for four annual penetration testing of both the HubSpot web application and internal corporate network infrastructure at least annuallytests. The intent of these the penetration tests is to identify security vulnerabilities and mitigate the risk resolve foreseeable attack vectors and business impact they pose to the in-scope systemspotential abuse scenarios. Bug bounty: A bug bounty program invites and incentivizes independent security researchers to ethically discover and disclose security flaws. We implement a bug bounty program in an effort to widen the available opportunities to engage with the security community and improve the product defenses against sophisticated attacks.

Appears in 1 contract

Samples: fs.hubspotusercontent00.net

Preventing Unauthorized Product Use. We implement industry standard access controls and detection capabilities for the internal networks that support its products. DocuSign Envelope ID: 0BD26021-91CB-402B-A98F-F0AF7413357D Access controls: Network access control mechanisms are designed to prevent network traffic using unauthorized protocols from reaching the product infrastructure. The technical measures implemented differ between infrastructure providers and include DocuSign Envelope ID: 368BC309-4EEF-49C7-B0A2-839AE6A16234 Virtual Private Cloud (VPC) implementations, security group assignment, and traditional firewall rules. Intrusion detection and prevention: We implement a Web Application Firewall (WAF) solution to protect hosted customer websites and other internet-accessible applications. The WAF is designed to identify and prevent attacks against publicly available network services. Static code analysis: Code Security reviews of code stored in our source code repositories is checked performed, checking for coding best practices and identifiable software flaws using automated toolingflaws. Penetration testing: We maintain relationships with industry-industry recognized penetration testing service providers for four annual penetration testing of both the HubSpot web application and internal corporate network infrastructure at least annuallytests. The intent of these the penetration tests is to identify security vulnerabilities and mitigate the risk resolve foreseeable attack vectors and business impact they pose to the in-scope systemspotential abuse scenarios. Bug bounty: A bug bounty program invites and incentivizes independent security researchers to ethically discover and disclose security flaws. We implement a bug bounty program in an effort to widen the available opportunities to engage with the security community and improve the product defenses against sophisticated attacks.

Appears in 1 contract

Samples: f.hubspotusercontent00.net

Preventing Unauthorized Product Use. We implement industry standard access controls and detection capabilities for the internal networks that support its products. DocuSign Envelope ID: 0BD26021F7C6C8CE-91CB-402BC2D3-A98F4C77-F0AF7413357D 8537-9EAA155EDB9A Access controls: Network access control mechanisms are designed to prevent network traffic using unauthorized protocols from reaching the product infrastructure. The technical measures implemented differ between infrastructure providers and include Virtual Private Cloud (VPC) implementations, security group assignment, and traditional firewall rules. Intrusion detection and prevention: We implement a Web Application Firewall (WAF) solution to protect hosted customer websites and other internet-accessible applications. The WAF is designed to identify and prevent attacks against publicly available network services. Static code analysis: Code stored in our source code repositories is checked for best practices and identifiable software flaws using automated tooling. Penetration testing: We maintain relationships with industry-recognized penetration testing service providers for penetration testing of both the HubSpot web application and internal corporate network infrastructure at least annually. The intent of these penetration tests is to identify security vulnerabilities and mitigate the risk and business impact they pose to the in-scope systems. Bug bounty: A bug bounty program invites and incentivizes independent security researchers to ethically discover and disclose security flaws. We implement a bug bounty program in an effort to widen the available opportunities to engage with the security community and improve the product defenses against sophisticated attacks.

Appears in 1 contract

Samples: 742851.fs1.hubspotusercontent-na1.net

Preventing Unauthorized Product Use. We implement industry standard access controls and detection capabilities for the internal networks that support its products. DocuSign Envelope ID: 0BD2602146E60E31-91CB-402BED23-A98F4987-F0AF7413357D AF99-B3E1F5F85507 Access controls: Network access control mechanisms are designed to prevent network traffic using unauthorized protocols from reaching the product infrastructure. The technical measures implemented differ between infrastructure providers and include Virtual Private Cloud (VPC) implementations, security group assignment, and traditional firewall rules. Intrusion detection and prevention: We implement a Web Application Firewall (WAF) solution to protect hosted customer websites and other internet-accessible applications. The WAF is designed to identify and prevent attacks against publicly available network services. Static code analysis: Code stored in our source code repositories is checked for best practices and identifiable software flaws using automated tooling. Penetration testing: We maintain relationships with industry-industry recognized penetration testing service providers for four annual penetration testing of both the HubSpot web application and internal corporate network infrastructure at least annuallytests. The intent of these the penetration tests is to identify security vulnerabilities and mitigate resolve foreseeable attack vectors and potential abuse scenarios. Penetration tests are performed against the risk application layers and business impact they pose to infrastructure layers of the in-scope systemsHubSpot technology stack. Bug bounty: A bug bounty program invites and incentivizes independent security researchers to ethically discover and disclose security flaws. We implement a bug bounty program in an effort to widen the available opportunities to engage with the security community and improve the product defenses against sophisticated attacks.

Appears in 1 contract

Samples: 742851.fs1.hubspotusercontent-na1.net

Preventing Unauthorized Product Use. We implement industry standard access controls and detection capabilities for the internal networks that support its products. DocuSign Envelope ID: 0BD26021-91CB-402B-A98F-F0AF7413357D Access controls: Network access control mechanisms are designed to prevent network traffic using unauthorized protocols from reaching the product infrastructure. The technical measures implemented differ between infrastructure providers and include DocuSign Envelope ID: 8FA8B10C-C4DE-427D-9466-DBB9ACDC5D06 Virtual Private Cloud (VPC) implementations, security group assignment, and traditional firewall rules. Intrusion detection and prevention: We implement a Web Application Firewall (WAF) solution to protect hosted customer websites and other internet-accessible applications. The WAF is designed to identify and prevent attacks against publicly available network services. Static code analysis: Code Security reviews of code stored in our source code repositories is checked performed, checking for coding best practices and identifiable software flaws using automated toolingflaws. Penetration testing: We maintain relationships with industry-industry recognized penetration testing service providers for four annual penetration testing of both the HubSpot web application and internal corporate network infrastructure at least annuallytests. The intent of these the penetration tests is to identify security vulnerabilities and mitigate the risk resolve foreseeable attack vectors and business impact they pose to the in-scope systemspotential abuse scenarios. Bug bounty: A bug bounty program invites and incentivizes independent security researchers to ethically discover and disclose security flaws. We implement a bug bounty program in an effort to widen the available opportunities to engage with the security community and improve the product defenses against sophisticated attacks.

Appears in 1 contract

Samples: f.hubspotusercontent00.net

AutoNDA by SimpleDocs

Preventing Unauthorized Product Use. We implement industry standard access controls and detection capabilities for the internal networks that support its products. DocuSign Envelope ID: 0BD2602136823DEF-91CB-402BA160-A98F4E2B-89F3-F0AF7413357D F08620F47810 Access controls: Network access control mechanisms are designed to prevent network traffic using unauthorized protocols from reaching the product infrastructure. The technical measures implemented differ between infrastructure providers and include Virtual Private Cloud (VPC) implementations, security group assignment, and traditional firewall rules. Intrusion detection and prevention: We implement a Web Application Firewall (WAF) solution to protect hosted customer websites and other internet-accessible applications. The WAF is designed to identify and prevent attacks against publicly available network services. Static code analysis: Code stored in our source code repositories is checked for best practices and identifiable software flaws using automated tooling. Penetration testing: We maintain relationships with industry-industry recognized penetration testing service providers for four annual penetration testing of both the HubSpot web application and internal corporate network infrastructure at least annuallytests. The intent of these the penetration tests is to identify security vulnerabilities and mitigate resolve foreseeable attack vectors and potential abuse scenarios. Penetration tests are performed against the risk application layers and business impact they pose to infrastructure layers of the in-scope systemsHubSpot technology stack. Bug bounty: A bug bounty program invites and incentivizes independent security researchers to ethically discover and disclose security flaws. We implement a bug bounty program in an effort to widen the available opportunities to engage with the security community and improve the product defenses against sophisticated attacks.

Appears in 1 contract

Samples: 742851.fs1.hubspotusercontent-na1.net

Preventing Unauthorized Product Use. We implement industry standard access controls and detection capabilities for the internal networks that support its products. DocuSign Envelope ID: 0BD26021A78763C4-91CB-402BC8BA-450C-A98FB722-F0AF7413357D DA1C620E9415 Access controls: Network access control mechanisms are designed to prevent network traffic using unauthorized protocols from reaching the product infrastructure. The technical measures implemented differ between infrastructure providers and include Virtual Private Cloud (VPC) implementations, security group assignment, and traditional firewall rules. Intrusion detection and prevention: We implement a Web Application Firewall (WAF) solution to protect hosted customer websites and other internet-accessible applications. The WAF is designed to identify and prevent attacks against publicly available network services. Static code analysis: Code stored in our source code repositories is checked for best practices and identifiable software flaws using automated tooling. Penetration testing: We maintain relationships with industry-recognized penetration testing service providers for penetration testing of both the HubSpot web application and internal corporate network infrastructure at least annually. The intent of these penetration tests is to identify security vulnerabilities and mitigate the risk and business impact they pose to the in-scope systems. Bug bounty: A bug bounty program invites and incentivizes independent security researchers to ethically discover and disclose security flaws. We implement a bug bounty program in an effort to widen the available opportunities to engage with the security community and improve the product defenses against sophisticated attacks.

Appears in 1 contract

Samples: 742851.fs1.hubspotusercontent-na1.net

Preventing Unauthorized Product Use. We implement industry standard access controls and detection capabilities for the internal networks that support its products. DocuSign Envelope ID: 0BD26021CCF1FB4B-34E5-91CB-402B43F8-A98F9502-F0AF7413357D A0796D702BCD Access controls: Network access control mechanisms are designed to prevent network traffic using unauthorized protocols from reaching the product infrastructure. The technical measures implemented differ between infrastructure providers and include Virtual Private Cloud (VPC) implementations, security group assignment, and traditional firewall rules. Intrusion detection and prevention: We implement a Web Application Firewall (WAF) solution to protect hosted customer websites and other internet-accessible applications. The WAF is designed to identify and prevent attacks against publicly available network services. Static code analysis: Code stored in our source code repositories is checked for best practices and identifiable software flaws using automated tooling. Penetration testing: We maintain relationships with industry-recognized penetration testing service providers for penetration testing of both the HubSpot web application and internal corporate network infrastructure at least annually. The intent of these penetration tests is to identify security vulnerabilities and mitigate the risk and business impact they pose to the in-scope systems. Bug bounty: A bug bounty program invites and incentivizes independent security researchers to ethically discover and disclose security flaws. We implement a bug bounty program in an effort to widen the available opportunities to engage with the security community and improve the product defenses against sophisticated attacks.

Appears in 1 contract

Samples: 742851.fs1.hubspotusercontent-na1.net

Time is Money Join Law Insider Premium to draft better contracts faster.