Secure Hosting Sample Clauses

Secure Hosting. We utilize an Infrastructure as Code (IaC) process. This gives us a good overview on our cluster and security rules. In this container-based architecture we have rules in place for firewalls, patch/package management, vulnerability scans, health monitoring and alerting, and so on. Firewalls (with a deny-by-default posture) protect the internal network zones and the network as a whole.
AutoNDA by SimpleDocs
Secure Hosting. For our hosting needs, Foleon relies on the services of Rackspace. They are responsible for our complete hardware setup and are required to notify us of any security incident. They assist us in infrastructure deployment, configuration, maintenance, and various aspects of information security, including Intrusion Detection System (IDS), Intrusion Prevention System (IPS), firewalls, patch management, health monitoring and alerting, and so on. Firewalls (with a deny-by-default posture) protect the internal network zones and the network as a whole.
Secure Hosting. A proven hosting process and facility with Quest that meets and exceeds required security standards including HIPAA.
Secure Hosting. For our hosting needs, Foleon relies on the services of GCP. They are responsible for our complete hardware setup and are required to notify us of any security incident. In our Kubernetes clusters we have a high standard in infrastructure deployment, configuration, maintenance, and various aspects of information security, including Egress, firewalls, health monitoring and alerting, and so on. Each docker image that has been created by Foleon has to pass a Vulnerability scan performed by Container Registry service.

Related to Secure Hosting

  • Program Management 1.1.01 Implement and operate an Immunization Program as a Responsible Entity

  • Network Management 60.1 CLEC and CenturyLink will exchange appropriate information (e.g., network information, maintenance contact numbers, escalation procedures, and information required to comply with requirements of law enforcement and national security agencies) for network management purposes. In addition, the Parties will apply sound network management principles to alleviate or to prevent traffic congestion and to minimize fraud associated with third number billed calls, calling card calls, and other services related to this Agreement.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Hosting 46.7.4.1 At CLEC’s request, SBC-SWBT and SBC-AMERITECH shall perform hosting responsibilities for the provision of billable message data and/or access usage data received from CLEC for distribution to the appropriate billing and/or processing location or for delivery to CLEC of such data via SBC-SWBT’s and SBC-AMERITECH’s internal network or the nationwide CMDS network pursuant to the applicable Appendix HOST, which is/are attached hereto and incorporated herein by reference.

  • Network Maintenance and Management 36.1 The Parties will work cooperatively to implement this Agreement. The Parties will exchange appropriate information (for example, maintenance contact numbers, network information, information required to comply with law enforcement and other security agencies of the Government, escalation processes, etc.) to achieve this desired result.

  • Infrastructure (a) The Borrower has and will maintain a sufficient infrastructure to conduct its business as presently conducted and as contemplated to be conducted following its execution of this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.