Intrusion Detection Systems Clause Samples
POPULAR SAMPLE Copied 1 times
Intrusion Detection Systems. Databricks leverages security capabilities provided natively by Cloud Service Providers for security detection.
Intrusion Detection Systems. We have implemented and maintain a host-based intrusion detection system and network- based instruction detection system designed to alert us in the event of suspicious activity.
Intrusion Detection Systems. Describe the intrusion detection system (“lDS”) environment and the Security Breach and event escalation process. Indicate who manages the IDS environment. Specify the services, tools and connectivity required to manage the IDS environment, and if the IDS network is host based.
Intrusion Detection Systems. The Vendor must implement and comply with Customer's preferred security protocols, including but not limited to Single Sign On and Secure Email.
Intrusion Detection Systems. The Hosting Vendor shall use a wide variety of automated monitoring systems to provide a high level of performance and availability for the Vendor System to Customer. Hosting Vendor monitoring tools shall be designed to detect unusual or unauthorized activities and conditions at ingress and egress communication points. These tools shall monitor server and network usage, port scanning activities, application usage, and unauthorized intrusion attempts. The tools shall have the ability to set custom performance metrics thresholds for unusual activity. Such thresholds shall be established from time to time subject to Customer approval, which shall not be unreasonably withheld.
Intrusion Detection Systems. The Hosting Vendor shall use a wide variety of automated monitoring systems to provide a high level of performance and availability for the Vendor System to Customer. Hosting Vendor monitoring tools shall be designed to detect unusual or unauthorized activities and conditions at ingress and egress communication points. These tools shall monitor server and network usage, port scanning activities, application usage, and unauthorized intrusion attempts. The tools shall have the ability to set custom performance metrics thresholds for unusual activity. Such thresholds shall be established from time to time subject to Customer approval, which shall not be unreasonably withheld.