Threat Intelligence Profiler Sample Clauses

Threat Intelligence Profiler. The ProSOC services includes the Proficio Threat Intelligence Profiler reputation service that compiles bad actors, malware servers, malware beacon hosts, command and control servers, and other malicious activity sources aggregated from trusted security groups into a list that ProSOC SIEM correlates with ingress and egress network traffic and pattern rules to discover active threats. These threats include discoveries like:
AutoNDA by SimpleDocs

Related to Threat Intelligence Profiler

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Procurement of Recovered Materials (1) In the performance of this contract, the Contractor shall make maximum use of products containing recovered materials that are EPA-designated items unless the product cannot be acquired

  • Use of artificial intelligence or data analytics You acknowledge that we may use artificial intelligence or data analytics (i.e. technologies that assist or replace human decision-making) whilst providing products and services to you, for purposes including but not limited to risk assessment, statistical, trend analysis and planning; and to make decisions, provide, operate, process and administer your accounts and services with us.

  • PROCUREMENT OF RECOVERED MATERIAL H-GAC and the Respondent must comply with section 6002 of the Solid Waste Disposal Act, as amended by the Resource Conservation and Recovery Act. The requirements of Section 6002 include: (1) procuring only items designated in guidelines of the Environmental Protection Agency (EPA) at 40 CFR part 247 that contain the highest percentage of recovered materials practicable, consistent with maintaining a satisfactory level of competition, where the purchase price of the item exceeds $10,000 or the value of the quantity acquired during the preceding fiscal year exceeded $10,000; (2) procuring solid waste management services in a manner that maximizes energy and resource recovery; and (3) establishing an affirmative procurement program for procurement of recovered materials identified in the EPA guidelines. Pursuant to the Federal Rule above, as required by the Resource Conservation and Recovery Act of 1976 (42 U.S.C. § 6962(c)(3)(A)(i)), Respondent certifies that the percentage of recovered materials content for EPA-designated items to be delivered or used in the performance of the Contract will be at least the amount required by the applicable contract specifications or other contractual requirements. A RTICLE 40: XXXXXXXX “ANTI-KICKBACK” ACT Contractor shall comply with 18 U.S.C. § 874, 40 U.S.C. § 3145, and the requirements of 29 C.F.R. pt. 3 as may be applicable, which are incorporated by reference into the contract. The contractor or subcontractor shall insert in any subcontracts the clause above and such other clauses as appropriate agency instructions require, and also a clause requiring the subcontractors to include these clauses in any lower tier subcontracts. The prime contractor shall be responsible for the compliance by any subcontractor or lower tier subcontractor with all of these contract clauses. A breach of the contract clauses above may be grounds for termination of the Contract, and for debarment as a contractor and subcontractor as provided in 29 C.F.R. § 5.12.

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • DNSSEC Registry Operator shall sign its TLD zone files implementing Domain Name System Security Extensions (“DNSSEC”). During the Term, Registry Operator shall comply with RFCs 4033, 4034, 4035, 4509 and their successors, and follow the best practices described in RFC 4641 and its successors. If Registry Operator implements Hashed Authenticated Denial of Existence for DNS Security Extensions, it shall comply with RFC 5155 and its successors. Registry Operator shall accept public-­‐key material from child domain names in a secure manner according to industry best practices. Registry shall also publish in its website the DNSSEC Practice Statements (DPS) describing critical security controls and procedures for key material storage, access and usage for its own keys and secure acceptance of registrants’ public-­‐key material. Registry Operator shall publish its DPS following the format described in XXX 0000.

  • Network Congestion Reduced Speed for Routing or Answering 911 Dialing Calls. There may be a greater possibility of network congestion and/or reduced speed in the routing of a 911 Dialing call made utilizing the Service as compared to traditional 911 dialing over traditional public telephone networks.

  • Management of Special and Technical Environment Each certificated support person demonstrates an acceptable level of performance in managing and organizing the special materials, equipment and environment essential to the specialized programs.

  • Workplace Violence Prevention and Crisis Response (applicable to any Party and any subcontractors and sub-grantees whose employees or other service providers deliver social or mental health services directly to individual recipients of such services): Party shall establish a written workplace violence prevention and crisis response policy meeting the requirements of Act 109 (2016), 33 VSA §8201(b), for the benefit of employees delivering direct social or mental health services. Party shall, in preparing its policy, consult with the guidelines promulgated by the U.S. Occupational Safety and Health Administration for Preventing Workplace Violence for Healthcare and Social Services Workers, as those guidelines may from time to time be amended. Party, through its violence protection and crisis response committee, shall evaluate the efficacy of its policy, and update the policy as appropriate, at least annually. The policy and any written evaluations thereof shall be provided to employees delivering direct social or mental health services. Party will ensure that any subcontractor and sub-grantee who hires employees (or contracts with service providers) who deliver social or mental health services directly to individual recipients of such services, complies with all requirements of this Section.

Time is Money Join Law Insider Premium to draft better contracts faster.