Enterprise Security definition
Examples of Enterprise Security in a sentence
The parties understand and agree that the State’s Enterprise Security Policy is based on industry-standard best practices, policy, and guidelines at the time of contract execution.
The parties understand and agree that the State’s Enterprise Cloud and Offsite Hosting Security Policy is based on industry- standard best practices, policy, and guidelines at the time of contract execution and augments the Enterprise Security Policy.
Enterprise Security Log Management, Analytics, and Response consists of multiple components that support and provide enterprise security operations, including Security Information and Event Management (SIEM), Security Orchestration, Automation, and Response (SOAR), and backend capabilities for log collection, storage, aggregation and analytics.
The parties understand and agree that the State’s Enterprise Cloud and Offsite Hosting Security Policy is based on industry-standard best practices, policy, and guidelines at the time of contract execution and augments the Enterprise Security Policy.
Vendor shall adhere to the DIR Security Policies included in 1 TAC Chapter 202, Information Security Standards and be consistent with the best practices as outlined in the State Enterprise Security Plan.
Contractor and Customer understand and agree that all products and services provided by Contractor under this Master Agreement must allow Customer to be and remain in compliance with the State of Mississippi’s Enterprise Security Policy.
Certificate No.: A-IO-_ Cut-off Date: March 1, 2004 First Distribution Date: April 25, 2004 Initial Principal Balance (Notional) of this Certificate ("Denomination"): $22,837,000 Initial Certificate Principal Balance (Notional) of Class A-IO Certificates: $22,837,000 Latest Possible Maturity Date: September 25, 2006 CUSIP: 07384Y SX 5 Interest Rate: For each Distribution Date, the lesser of 5.00% per annum and the applicable Interest Rate Cap.
The Vendor must certify that within 30 days of the delivery of said reports and information, all subsequent copies, both hard copies and electronic copies have been properly shredded, otherwise destroyed, or deleted using procedures consistent with the State of Mississippi Enterprise Security Policy and NIST Special Publication 800-88.
Seller and Purchaser understand and agree that all products and services provided by Seller under this EPL Agreement must be and remain in compliance with the State of Mississippi’s Enterprise Security Policy.
Seller and Purchaser understand and agree that the State of Mississippi’s Enterprise Security Policy mandates that all remote access to and/or from the State network must be accomplished via a Virtual Private Network (VPN).