Threat and Vulnerability Management Sample Clauses

Threat and Vulnerability Management. Vulnerability scans (authenticated and unauthenticated) must be performed, both internally and externally, for production systems. Processes must be in place to ensure tracking and remediation.
AutoNDA by SimpleDocs
Threat and Vulnerability Management. Trane regularly performs vulnerability scans and addresses detected vulnerabilities on a risk basis. Periodically, Trane engages third-parties to perform network vulnerability assessments and penetration testing. Vulnerabilities will be reported in accordance with Trane’s cybersecurity vulnerability reported process. Trane periodically provides security updates and software upgrades.
Threat and Vulnerability Management. Matterport will maintain measures meant to regularly identify, manage, assess, mitigate and/or remediate vulnerabilities within the Matterport computing environments. Measures include: • Patch management • Anti-virus / anti-malware • Threat notification advisories • Vulnerability scanning (all internal systems) • Annual penetration testing (Internet facing systems) within remediation of identified vulnerabilities by a third-party security firm.
Threat and Vulnerability Management. Coalfire maintains a full vulnerability detection and remediation program, which includes weekly scans and annual penetration tests, as well as annual code review. Coalfire leverages Carbon Black Defense, a next-generation AV/anti-malware tool. All internal networks are monitored by IDS at key points. Coalfire maintains a full monitoring program that includes central event aggregation and alerting within our SIEM, as well as cloud service monitoring within our CASB. Logging on processes are subject to the controls outlined in the SOC2 "Assessment Environment" and Coalfire’s written information security plan. A full description of the security controls is outlined in Coalfire’s SOC2 report.
Threat and Vulnerability Management. Arm yourself with the tactical, operational, and strategic insights you need to understand how you are being targeted and invest wisely in the right set of countermeasures. We facilitate the development of an effective threat and vulnerability management program that starts with the endpoint and ends with successful security assurance practices. We help you continuously identify and address weaknesses, analyze assessment output with business risk in mind, and take new approaches to remediating security concerns.

Related to Threat and Vulnerability Management

  • Quality Management Grantee will:

  • Traffic Management 9.2.1 During the Operating Period, Developer shall be responsible for the general management of traffic on the Facility. Developer shall manage traffic so as to preserve and protect safety of traffic on the Facility and Related Transportation Facilities and, to the maximum extent practicable, to avoid disruption, interruption or other adverse effects on traffic flow, throughput or level of service on the Facility and Related Transportation Facilities. Developer shall conduct traffic management in accordance with all applicable Technical Provisions, Technical Documents, Laws and Governmental Approvals, and in accordance with the Traffic Management Plan.

Time is Money Join Law Insider Premium to draft better contracts faster.