Managed Firewall Sample Clauses

A managed-firewall clause defines the responsibilities and terms under which a service provider will supply, configure, and maintain firewall protection for a client’s network. Typically, this clause outlines the scope of firewall management, such as monitoring traffic, applying security updates, and responding to security incidents, and may specify service levels or response times. Its core function is to ensure that network security is proactively managed by experts, reducing the client’s risk of cyber threats and clarifying accountability for firewall-related issues.
POPULAR SAMPLE Copied 1 times
Managed Firewall. CNI will provide a managed firewall to clients. CNI will manage and update the software components at CNI’s sole discretion. Such devices are CNI Equipment, owned by CNI and to be returned to CNI or purchased from CNI in the event of termination of this Agreement. The management and updates for these devices will be immediately terminated in the event this Agreement is terminated. All configurations, operations, and formats implemented by CNI are the proprietary work of CNI will be removed in the event of termination.
Managed Firewall. The Service also includes a managed firewall feature for routers which CCI will configure for you on an ongoing basis.
Managed Firewall. Managed Firewall Services include management of Cisco ASA or Fortinet devices. You supply the device. You must have a Cisco Smartnet warranty on any managed Cisco device and Fortinet support and on Fortinet device. Managed Firewall Services include: a) management of your existing Cisco ASA or Fortinet firewall;

Related to Managed Firewall

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Managed Services HP will provide the services as described in a Statement of Work (“SOW”) attached to this Agreement or incorporating it by reference. Each party will appoint a single point of contact as set forth in the SOW who will serve as their primary representative, have overall responsibility for managing performance, and meet with the other party’s representative to review progress. Change requests are governed by the change management procedures as set forth in the SOW.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Registry Interoperability and Continuity Registry Operator shall comply with the Registry Interoperability and Continuity Specifications as set forth in Specification 6 attached hereto (“Specification 6”).

  • Virus Management DST shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within DST environment.