Service Integrity & Availability Sample Clauses

Service Integrity & Availability. Modifications to operating system resources and application software are governed by IBM’s change management process. Changes to firewall rules are also governed by the change management process and are separately reviewed by the IBM security staff before implementation. IBM monitors the data center resources 24x7. Internal and external vulnerability scanning is regularly conducted by authorized administrators and third party vendors to help detect and resolve potential system security exposures. Malware detection (antivirus, intrusion detection, vulnerability scanning, and intrusion prevention) systems are in place throughout all IBM data centers. IBM’s data center services support a variety of information delivery protocols for transmission of data over public networks. Examples include HTTPS/SFTP/FTPS/S/MIME and site-to-site VPN. Backup data intended for off-site storage is encrypted prior to transport.
Service Integrity & Availability. Modifications to operating system resources (OSRs) and application software are governed by IBM’s change management process. Hardware, software, access logs, read only access and encryption controls are used within the network infrastructure and on the workstations of individuals working in IBM data centers or with client data in IBM’s data centers to help lessen the likelihood of the propagation and execution of computer viruses and other forms of known harmful code. IBM uses over-the-network encryption via standard SSL (https) connections and the IBM infrastructure employs technology solutions for end-to-end security, including firewall, intrusion prevention, and anti-malware technologies. Transmission Control Protocols/Internet Protocols (TCP/IP) vulnerability scanning is periodically conducted by authorized administrators to detect and resolve potential system security exposures. IBM warehouse data is copied to secondary storage in the IBM data center, and tertiary archival (tape) is encrypted and duplicated for storage at a 3rd party offsite disaster recovery facility.
Service Integrity & Availability a. Cloud Service has personnel with formally assigned roles and responsibilities. b. Formal procedures govern all changes to Cloud Service. Changes are logged and tested, authorized. Privileges to promote changes to production environment are restricted to authorized personal. c. The Cloud Service is monitored 24X7 by Cloud administrators for availability and performance. d. Cloud Service security incidents are handled in accordance with IBM incident response procedures. e. Backups are executed regularly. Data recovery tests are also conducted. f. The TM1 on Cloud transaction logs capture changes to data, hierarchies and configurations on the Cloud Service.
Service Integrity & Availability. Modifications to operating system resources and application software are governed by IBM’s change management process. Changes to firewall rules are also governed by the change management process and are separately reviewed by the IBM security staff before implementation. IBM systematically monitors the data center resources 24x7. Internal and external vulnerability scanning is regularly conducted by authorized administrators to help detect and resolve potential system security exposures. Anti-virus detectionsystems are in place throughout all IBM data centers. IBM’s data center services support a variety of information delivery protocols for transmission of data over public networks. Examples include HTTPS/SFTP/FTPS. Backup data intended for off-site storage is encrypted prior to transport.