Security Resources Sample Clauses

Security Resources. The Parties’ may, upon mutual agreement, provide resources from its security group to assist with an identified Data Security Breach for the purpose of meeting its obligations in relation to the notification of a Data Security Breach under Applicable Laws or other notification obligations or requirements.
Security Resources. Dropbox provides the following Security Resources for these services: (a) the Dropbox Security Whitepaper available at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇.▇▇▇/static/business/resources/Security_Whitepaper.pdf; and
Security Resources. The next sections present three individual scenarios providing an example of each of the available security resource types. For each example, we choose to deploy the resource inside the ADS testbed. The newly created machine will be attached to the private network and OpenStack will provide a floating IP to reach the resource. In order to log on the machine, we provide our public SSH key. Below there are the yaml definition of the security resources available. 4.2.1. Example 1
Security Resources. A Security Resource is a commonly used security agent that the Experimenter can include in her experiment. She can access and configure it through a static initial configuration, included in the TOSCA description of the Resource, or, once deployed, through a REST interface that exposes its main services. The Experimenter can also ask the Security Resource to send its log messages to a remote log collector, which makes them available in a simple web page reserved to her. The Experimenter could easily access it through its web browser and check the behaviour of her all security agents, and to see some statistics. The Experimenter can get the Security Resource in two different formats:  As an agent directly installed in the VM that she wants to monitor. The system will provide her a script that the Experimenter has just to run inside the VM. It will be already configured as required in the TOSCA description of the resource. The output of the script will provide to the Experimenter information on how to access the deployed resource (URLs, etc.)  As a standalone VM the Security Resource will be deployed directly by the Security Manager in the testbed chosen by the Experimenter. The Security Manager will take care of the initial configuration of the resource. The Experimenter has to set up on her own the redirection of the network traffic that she wants to control through the Security Resource VM (by means of tunnelling or SDN capabilities). To date the only Security Resource available on the SoftFIRE environment is the firewall.
Security Resources. Security Resources regarding these Services are available at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/trust/security.