Security Infrastructure Sample Clauses

The Security Infrastructure clause outlines the requirements and standards for the systems and measures that must be in place to protect data, networks, and other sensitive assets. It typically specifies the types of security controls, such as firewalls, encryption, access controls, and monitoring tools, that a party must implement and maintain. By establishing clear expectations for security practices, this clause helps prevent unauthorized access, data breaches, and other security incidents, thereby reducing risk and ensuring compliance with relevant regulations.
POPULAR SAMPLE Copied 2 times
Security Infrastructure eArcu shall ensure that the Software Service and the Customer Data is protected by state-full inspection firewalls, anti-malware software, and intruder detection technology.
Security Infrastructure.  Provider shall be in charge of acquisition, installation and operation of security solution as well as equipment so that the Client’s service could be provided in a stable manner. ‚ Provider shall be in charge of security review and abusing response and also respond to the security breaches.
Security Infrastructure. The security infrastructure associated with the AP1000 Plant includes the security system (SES) for the design and hardware inside the Standard Plant and the access portals, equipment and barriers to control access to the Protected Area. The Protected Area access and barriers will be designed and constructed to include: · [**] · [**] · [**] · [**] · [**] · [**] · [**] · [**] · [**] · [**] · [**] · [**] A detailed description of the Site security infrastructure will be provided in Phase 1.
Security Infrastructure. The security infrastructure associated with the AP1000 Plant includes the security system (SES) for the design and hardware inside the Standard Plant and the access portals, equipment and barriers to control access to the Protected Area. The Protected Area access and barriers will be designed and constructed to include: • Barriers to vehicle access including big rocks and pop-up road barrier • Fencing • Gravel base between fencing • Lighting • Communications • Access control system • Intruder detection systems including cameras and infrared sensing systems • Security building at main access portal • Vehicle access portal • Main road security post • Search area equipment • Security power system A detailed description of the Site security infrastructure will be provided in Phase 1.
Security Infrastructure. Each facility is protected by a “defense-in-depth” security architecture consisting of firewalls, IDS (Intrusion Detection Systems), anti-virus/anti-malware protection, monitoring capabilities, and DDoS protection monitoring and mitigation.
Security Infrastructure. The following infrastructure and security is provided at the Company’s data centres in the United Kingdom with 1 and 1
Security Infrastructure. To ensure that an adequate level of information security is achieved and maintained, a security structure has been developed to support the information systems. The security structure includes senior business managers who are responsible for ensuring that a level of information security is achieved which is commensurate with both the business need to provide the system, and the overall threat to the information systems. Key appointments in the security infrastructure that support the information systems are:
Security Infrastructure. 3.4.3.1 Security applies to all aspects of the BEAP design and operation, from the policies and procedures of the people working with the BEAP, right through to the physical security of the data centre(s) that host the BEAP.
Security Infrastructure. Rhaegal do not store but only processes data on your behalf. We understand the nature of our role as a Data Processor and take appropriate measures to protect any unauthorized use or access. Our Security Infrastructure includes Intrusion detection services, security monitoring, Restricted Physical Access, Restricted Network Access, Encrypted Data Access, Redundant firewalls, Isolated public/private LANs, Isolated NAS and SAN access, and Real-time anti-virus. In addition, only restricted individuals and workstations may update critical elements of the system such as Firewall rules, Settings, recovery procedures, and backup procedures. System monitors and logs all major components including application services, system settings, load balancers, firewalls and LAN traffic. Any security inquiries can be addressed at ▇▇▇▇▇▇▇▇@▇▇▇▇▇▇▇.▇▇▇.