Vulnerability Management Sample Clauses

Vulnerability Management. BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.
AutoNDA by SimpleDocs
Vulnerability Management. BNYM will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the Services. BNYM will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its Confidential And Proprietary Execution Version networks, hardware and software including regular penetration testing and ethical hack assessments. BNYM will remediate identified security vulnerabilities in accordance with its process. Malicious Code. BNYM will deploy industry standard malicious code protection and identification tools across its systems and software used to provide the Services.
Vulnerability Management. Braze’s infrastructure and applications are continuously scanned by a Vulnerability Management System. Alerts are monitored by our Security Team and addressed at least monthly by the Braze Vulnerability Management Team. Xxxxx also maintains a list membership to various CVE vulnerability mailing lists. Patches and ‘critical’ and ‘high’ vulnerabilities are remediated no later than 30 days following discovery. Braze also uses static code analysis tools during the build process (such as Brakeman and bundler-audit) to perform static security analysis.
Vulnerability Management. ServiceNow conducts periodic independent security risk evaluations to identify critical information assets, assess threats to such assets, determine potential vulnerabilities, and provide for remediation. When software vulnerabilities are revealed and addressed by a vendor patch, ServiceNow will obtain the patch from the applicable vendor and apply it within an appropriate timeframe in accordance with ServiceNow’s then-current vulnerability management and security patch management standard operating procedure and only after such patch is tested and determined to be safe for installation in all production systems.
Vulnerability Management. HTL as a matter of process undertakes to assess on a regular basis all software and hardware for vulnerabilities identified using industry recognised sources such as vendor information, CVE\NIST lists and internal testing regimes.
Vulnerability Management. Incident reporting and response policies and procedures are in place to guide Xxxxxx personnel in reporting the information technology incident. Vulnerabilities meeting defined risk criteria trigger alerts and are prioritized for remediation based on their potential impact to the Services.
Vulnerability Management. Vendor shall ensure that all Vendor assets, systems or software used to store, process, transmit or maintain Confidential Information are protected from known, discovered, documented, and/or reported vulnerabilities to external threats to functionalities or security by installing applicable and necessary security patches within a reasonable timeframe. As a baseline for reasonableness, Vendor must, at least, provide critical security patches immediately, high security patches within 1 month of release, medium security patches within 60 days, and low security patches within 90 days. Security patch severity will be categorized using the Common Vulnerability Scoring System and the timeframes begin upon the earlier to occur of: (a) the date Customer notifies Vendor of a vulnerability; (b) the date Vendor becomes aware of the vulnerability; or (c) the date the vulnerability is published with Common Vulnerabilities and Exposures.
AutoNDA by SimpleDocs
Vulnerability Management. Vendor shall address vulnerabilities in accordance with NIST vulnerability management controls including, but not limited to, addressing vulnerabilities in the applicable timeframes set forth in such policies. Vendor shall provide a monthly vulnerability report and a risk mitigation plan to address any identified vulnerabilities. Critical and high vulnerabilities, as defined in NIST management controls, shall be reported to the USAC Chief Information Officer and Chief Information Security Officer, and Vendor shall remedy such vulnerabilities as described in Attachment 7. In the event that Vendor cannot meet the applicable timeframe, Vendor shall provide USAC a plan of action and milestones to address such vulnerabilities promptly and shall prioritize remediation based on the risks implicated by such vulnerabilities. Failure to meet the applicable timeframe will result in USAC receiving a Service Level Credit as set forth in Attachment 5.
Vulnerability Management. Supplier is responsible for running its own vulnerability management. In addition, McAfee Enterprise requires daily vulnerability scans performed on all internet facing web sites where McAfee Enterprise has branded content and is the primary site owner or ‘McAfee Enterprise’ is part of the URL. McAfee Enterprise uses the McAfee Enterprise Secure vulnerability scanning solution. Vulnerabilities will be reported to the Supplier for remediation. The Supplier can request information for: vulnerability reports, demonstration of the vulnerabilities (when available) and remediation support. McAfee Enterprise does not charge the Supplier for the McAfee Enterprise Secure scanning service. McAfee Enterprise requires daily access to the reports. Upon identification of security vulnerabilities in a production application, the Supplier must remediate within the following time lines: Critical: 7 days High: 30 days Medium: 90 days Low: 180 days If the security vulnerabilities identified by the McAfee Enterprise vulnerability scanning process have not been addressed in the above timelines, McAfee Enterprise may shut down the web site until the vulnerabilities are remediated. Returning the site to production status requires the site to pass a scan for McAfee Enterprise compliance. McAfee Enterprise considers a web site compliant when McAfee Enterprise security standards are met. McAfee Security will notify Suppliers of each of the McAfee Enterprise security standards not met. Any changes to the architecture or function of a service or data model in the cloud must first be reviewed and approved by McAfee Enterprise. Applications that require physical separation cannot be on a cloud-based service. Cloud vendors are required to have background checks and validation of employees with privileged account access. This includes any third-party vendors that may contract with those vendors and have privileged access as well. Network & Client Security
Vulnerability Management. The EBSCO IS team scans for security threats using commercial, automated and manual methods. The team is also responsible for tracking and following up on any potential vulnerabilities that might be detected. The team has the capability to scan environments (both internal and external) and is updated on new systems within our environment. Once EBSCO’s Technology and IS teams have identified a vulnerability, it is prioritized according to severity and impact and remediated accordingly. The EBSCO IS team tracks risk and vulnerabilities until remediation. Malware Prevention, Detection & Remediation EBSCO uses multiple tools to address malware and phishing risks (e.g., firewalls, anti-virus, backups, automated and manual scanning, end-user awareness). EBSCO’s IS team periodically evaluates new technologies to mitigate malware and Advance Persistent Threats (APTs) to stay as protected as possible from these risks. Network Security EBSCO employs multiple layers of defense to secure information under our control, including protecting the network perimeter from external attacks – allowing only authorized services and protocols to access EBSCO’s systems and services. EBSCO’s network security strategies, among other capabilities, include network segregation (e.g., production vs. testing, DMZ, service delivery vs. corporate).
Time is Money Join Law Insider Premium to draft better contracts faster.