Protected Servers definition
Examples of Protected Servers in a sentence
On completion of the Build Stage for each Protected Servers, Interactive will notify the Customer of the date the Customer may commence conducting Acceptance Tests (“Acceptance Test Commencement Date”).
On the other hand, Protected Servers which are designated as onDemand Recovery Nodes, will first need to be built before they can be run or tested.
Protected Servers which are cloned as R2R Recovery Nodes allow, essentially, instant recovery with a very low recovery time objective.
Such options include the ability to designate the level of protection to individual Protected Servers according to their criticality to your business.
Only authorized users who need access to the Protected Servers and Protected Files for authorized purposes shall be granted such access.
Protected Files must be encrypted at rest (including when on internal Protected Servers and encrypted in transit (including when transmitted on an internal network, e.g., Protected Files must be transmitted via a secure virtual private network or via an industry-standard encrypted IPsec VPN).