Endpoint Security Sample Clauses
The Endpoint Security clause establishes requirements and standards for protecting devices that connect to a network, such as computers, smartphones, and tablets. It typically mandates the use of security measures like antivirus software, firewalls, regular updates, and access controls to prevent unauthorized access or data breaches. By setting these expectations, the clause helps ensure that all endpoints are adequately protected, reducing the risk of security incidents and safeguarding sensitive information within the organization.
Endpoint Security. (a) You may install the “agent” software component of the Endpoint Security Product on the number of Endpoints (or “Nodes”) stated in the applicable Grant Letter. For Endpoint Security Product, “Nodes” or “Endpoints” are computing devices owned or controlled by You (such as laptops, workstations, and servers), on which You install the agent software.
(b) Your purchase of Endpoint Security on a Subscription basis may either be an Enterprise Edition version or a Per-User Edition Version. • The Enterprise Edition versions of the Product are licensed according to the number of Endpoints purchased.
Endpoint Security. Industry-standard firewalls are in place and configured to only permit traffic on ports necessary for the functioning of the Service with all others denied by default.
Endpoint Security. Wolters Kluwer implements and maintains security mechanisms on endpoints, including firewalls, automated locking of devices after a specified period of inactivity, updated anti-virus, an advanced endpoint detection and response (EDR) solution, and full disk encryption. Wolters Kluwer restricts personnel from disabling security mechanisms.
Endpoint Security. Ntrepid will maintain suitably-designed endpoint security controls for Ntrepid Systems, that include but are not limited to:
6.1 Processes for provisioning, and hardening, in addition to anti-virus/anti- malware software and patching updates to the same;
6.2 Encryption of all Ntrepid System hard drives (e.g., desktops, laptops, workstations, servers, mobile devices) that contain Customer Confidential Information;
6.3 Encryption of Customer Confidential Information that Ntrepid transmits or sends wirelessly or across public networks, using prevailing industry standards for encryption while in transit and at rest;
6.4 Safeguards for all encryption keys associated with Customer Confidential Information; and
6.5 Management of security configurations of Ntrepid Systems based on prevailing industry standards to protect Customer Confidential Information from a Security Incident.
Endpoint Security. 24x7 endpoint security monitoring and management for 101 desktops and servers - 1 year.
Endpoint Security. The Services receive and deliver documents to and from Customer environments. Customer documents are scanned using anti-malware solutions when stored and processed within Basware environments. Documents detected to contain malware may be quarantined or deleted depending on the case. Where applicable, Basware provides reports for such rejected documents to Customer.
Endpoint Security. Data Processor shall ensure that endpoints used for Processing are protected. Minimum requirements:
a. Endpoints shall be installed with managed anti-malware with up to date versions that will ensure up- to-date protection or other similar mitigation mechanisms to protect against malware.
b. Endpoints shall be protected with personal firewall.
c. External storage devices shall be not be used to store Controller data unless the device is fully encrypted.
d. Endpoints shall be installed with latest Operating System and application updates/patches.
e. Endpoints shall be managed with clear registration and decommissioning process. If the endpoints are decommissioned or reallocated to other personnel, then the data is wiped in such a manner that it is not recoverable.
f. All unnecessary and insecure services shall be disabled on endpoints.
Endpoint Security. At this time, Endpoint Security is not subject to the SLAs described in this document.
Endpoint Security. Ntrepid will maintain suitably-designed endpoint security controls for Ntrepid Systems, that include but are not limited to:
Endpoint Security. Veego protect its endpoints against malware, ransomware, and exploitation using a leading Endpoint Protection Platform (EPP) and Endpoint Detection and Response (EDR) solution. Veego ensure endpoint security posture (e.g., approves operations systems and versions, host firewall, security patches, disk encryption, password-protection, lock screen after inactivity period, etc.).