Trend Micro Vulnerability Management Services Sample Clauses

Trend Micro Vulnerability Management Services. The Services are cloud-based security services that leverage world-class vulnerability discovering technologies from suppliers such as Qualys and provide a SaaS service for detecting and reporting customer system and application level vulnerabilities for the purposes of vulnerability management, PCI compliance and policy compliance. All or a portion of these features or components are available to You subject to payment of the applicable annual subscription fees or as agreed to by Trend Micro on a trial or evaluation basis. You will receive a customized version of written or electronic reports detailing the results of the scanning and mapping functions of the Services (“VMS Reports”). These VMS Reports may be delivered to an email address provided by You or You may access and review the VMS Reports online as instructed by Trend Micro. Depending on the components or features that are part of Your subscription to the Services, the VMS Reports may contain information designed to meet criteria of the PCI Security Standards Council (the “Card Program”). You acknowledge and agree that third party payment card organizations, and not Trend Micro and its resellers and suppliers, establish the security criteria and other terms and conditions of the Card Programs (“Criteria”). The following is a summary of the various components or features available under the Services:
AutoNDA by SimpleDocs

Related to Trend Micro Vulnerability Management Services

  • Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.

  • Project Management Services Contractor shall provide business analysis and project management services necessary to ensure technical projects successfully meet the objectives for which they were undertaken. Following are characteristics of this Service:

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Quality Management System Supplier hereby undertakes, warrants and confirms, and will ensue same for its subcontractors, to remain certified in accordance with ISO 9001 standard or equivalent. At any time during the term of this Agreement, the Supplier shall, if so instructed by ISR, provide evidence of such certifications. In any event, Supplier must notify ISR, in writing, in the event said certification is suspended and/or canceled and/or not continued.

  • Quality Management Grantee will:

  • Development Services During the term of this Agreement, the Provider agrees to provide to or on behalf of the Port the professional services and related items described in Exhibit A (collectively, the “Development Services”) in accordance with the terms and conditions of this Agreement. The Provider specifically agrees to include at least one Port representative in any economic development negotiations or discussions in which the Provider is involved concerning (i) a port-related business prospect or (ii) a business transaction which will ultimately require Port involvement, financial or otherwise.

  • Financial Management Services ‌ Definition: Financial Management Services includes the planning, directing, monitoring, organizing, and controlling of the monetary resources of an organization. Examples: Service areas that are included under the Financial Management Services discipline include, but are not limited to the following:

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • EFT SERVICES If approved, you may conduct any one (1) or more of the EFT services offered by the Credit Union.

  • Outpatient Services The following services are covered only at the Primary Care Provider’s office[selected by a [Member], or elsewhere [upon prior written Referral by a [Member]'s Primary Care Provider ]:

Time is Money Join Law Insider Premium to draft better contracts faster.