Common use of Intrusion Detection Clause in Contracts

Intrusion Detection. Bluecore’s intrusion detection capabilities include sophisticated data processing pipelines which integrate host-based signals on individual devices, network-based signals from various monitoring points in the infrastructure, and signals from infrastructure services. Rules and machine intelligence built on top of these pipelines give operational security and operational personnel warnings of possible incidents.

Appears in 4 contracts

Samples: get.bluecore.com, get.bluecore.com, get.bluecore.com

AutoNDA by SimpleDocs

Intrusion Detection. Bluecore’s intrusion detection capabilities include sophisticated data processing pipelines which integrate host-based signals on individual devices, network-based signals from various monitoring points in the infrastructure, and signals from infrastructure services. Rules and machine intelligence built on top of these pipelines give operational security and operational personnel warnings of possible incidents.. Appendix 3 CROSS BORDER DATA TRANSFER MECHANISMS

Appears in 2 contracts

Samples: get.bluecore.com, get.bluecore.com

AutoNDA by SimpleDocs

Intrusion Detection. Bluecore’s intrusion detection capabilities include sophisticated data processing pipelines which integrate host-host- based signals on individual devices, network-based signals from various monitoring points in the infrastructure, and signals from infrastructure services. Rules and machine intelligence built on top of these pipelines give operational security and operational personnel warnings of possible incidents.. SCHEDULE 2 CROSS BORDER DATA TRANSFER MECHANISMS

Appears in 1 contract

Samples: Data Processing Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.