Vulnerability Scanning Sample Clauses

Vulnerability Scanning. Alteryx maintains a vulnerability management program and performs regular vulnerability scanning against services and key infrastructure utilizing industry standard tools or well-known external suppliers.
AutoNDA by SimpleDocs
Vulnerability Scanning. Service vulnerability audits must be conducted with reference to the results of the port/protocol scans and the network design. The audit should detail:  Low, medium and high risk vulnerabilities so that a risk assessments can be made and fixes implemented where necessary  List any mitigations to medium and high risk.
Vulnerability Scanning. Both parties shall: • Disseminate intrusion detection alerts to respective BO counterparts for all subnets within the scope of this ISA; • Report to the both the CMS BO and the Non-CMS Organization’s BO any security incident that either organizations subnets within the scope of this ISA; and • Block inbound and outbound access for any CMS or Non-CMS Organization information systems on the subnets within the scope of this ISA that are the source of unauthorized access attempts, or the subject of any security events, until the risk is remediated.
Vulnerability Scanning. Provides monthly vulnerability assessment and intrusion detection.
Vulnerability Scanning. 12.10.1 Envestnet shall allow Fidelity, or its designee, to perform annual network security vulnerability assessments (including non-intrusive security scans) on any Envestnet internet facing web server that hosts or provides access to any Fidelity Confidential Information. Prior to performing any non-intrusive security scan, Fidelity will provide Envestnet with the date and time of the scan and the IP addresses from which the scan will originate.
Vulnerability Scanning. The identified appliances / services will be used to attempt to exploit weaknesses in the client’s infrastructure. Building upon what was mapped, Provider attempts to exploit identified vulnerabilities. Examples include: • SNMP Scanning – Captures both the physical and logic construct of the device. • Operating System Scanning – Identifies the target’s operating system in order to tailor applicable and specific attacks for that platform.
Vulnerability Scanning. The RC Service Provider shall scan network ranges or specified devices, including mobile applications, for known vulnerabilities. RC Service Provider shall be able to perform these services with either credentialed or non-credentialed access.
AutoNDA by SimpleDocs
Vulnerability Scanning. 1.21.4.1 The EC system shall be scanned for vulnerabilities prior to delivery. The EC system shall be scanned using NESSUS or equivalent. The EC system shall be scanned for vulnerabilities using the most recently released signatures.
Vulnerability Scanning. 13. Is vulnerability scanning of your development environments that will interface with Motricity a regular and ongoing process? Briefly describe the process, and provide the names of vulnerability testing tools used. ***. We are using *** as our IDS and IPS. Details about *** as a system is available on the link provided. Please refer to Section 4.10 of Appendix for our IDS/IPS management policy.
Vulnerability Scanning. Castellan: (i) scans for vulnerabilities in the hosted application at least annually and when new vulnerabilities potentially affecting the system/applications are identified; (ii) employs vulnerability scanning tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for enumerating platforms, software flaws, and improper configurations, formatting checklists and test procedures, and measuring vulnerability impact ; (iii) analyzes vulnerability scan reports and results from security control assessments; (iv) remediates vulnerabilities in accordance with organizational risk assessment; (v) shares information from the vulnerability scanning and security control assessments with appropriate Personnel to help eliminate similar vulnerabilities in other information systems; and (vi) employs periodic external vulnerability scanning and annual penetration testing to assess the overall strength of the Castellan’s defenses (technology, processes, and employees). Upon Customer’s written request, Xxxxxxxxx will deliver to Customer a summary of the results of the most recent vulnerability scans and penetration tests.
Time is Money Join Law Insider Premium to draft better contracts faster.