HIDS definition
Examples of HIDS in a sentence
The HIDS Participating Member shall exercise its right under this Section 3.11 by delivery to the HIDS Seller of written notice of such election (which notice, once so delivered to the HIDS Seller, shall be irrevocable.
If the HIDS Participating Member does not deliver to the HIDS Seller written notice of its election pursuant to this Section 3.11 prior to the closing of the sale or contribution of the Highest Incentive Distribution Splits, then upon such closing, the HIDS Participating Member shall be issued a Class D Membership interest (a "CLASS D MEMBERSHIP INTEREST") having a right to distributions in accordance with SECTION 5.3.
ACS shall provide both NIDS (Network-based Intrusion Detection Service) and HIDS (Host-based Intrusion Detection Service).
Host Intrusion Detection (HIDS) O O O O - Platform Support Tickets entered outside of service window will be addressed next contracted support period.
At Supplier’s discretion, this requirement is optional for implementations of Host Intrusion Detection Systems (HIDS) and/or Host Intrusion Prevention Systems (HIPS) on mobile devices.
These procedures include: a) Active/passive firewall configuration to prevent unapproved port access; b) Use of core configuration to reduce server security attack surface; c) Host Intrusion Detection System (HIDS) to monitor suspicious activity; and, d) Backup strategies storing multiple copies of Customer’s data on varied technology solutions at different locations.
Supplier shall also implement HIDS to cover one hundred thirteen (113) servers designated by Health Net.
Atos provides host-based intrusion detection systems (HIDS) for each Internet point-of- presence (iPOP).
These procedures include: a) Active/passive firewall configuration to prevent unapproved port access; b) Use of core configuration to reduce server security attack surface; c) Host Intrusion Detection System (HIDS) to monitor suspicious activity; and, d) Backup strategies storing multiple copies of Customer’s Data on varied technology solutions at different locations.
On Linux servers, the integrity of files is regularly checked by a host-based intrusion detection system (HIDS).