Common use of Preventing Unauthorized Product Use Clause in Contracts

Preventing Unauthorized Product Use. Applozic implements industry standard access controls and detection capabilities for the internal networks that support its products. Access controls: Network access control mechanisms are designed to prevent network traffic using unauthorized protocols from reaching the product infrastructure. The technical measures implemented differ between infrastructure providers and include Virtual Private Cloud (VPC) implementations, security group assignment, and traditional firewall rules. Intrusion detection and prevention: Applozic implemented a Web Application Firewall (WAF) solution to protect hosted customer websites and other internet-accessible applications. The WAF is designed to identify and prevent attacks against publicly available network services. Static code analysis: Security reviews of code stored in Applozic’s source code repositories is performed, checking for coding best practices and identifiable software flaws. Penetration testing: Applozic maintains relationships with industry recognized penetration testing service providers for four annual penetration tests. The intent of the penetration tests is to identify and resolve foreseeable attack vectors and potential abuse scenarios. Bug bounty: A bug bounty program invites and incentivizes independent security researchers to ethically discover and disclose security flaws. Applozic implemented a bug bounty program in an effort to widen the available opportunities to engage with the security community and improve the product defenses against sophisticated attacks.

Appears in 1 contract

Sources: Data Processing Agreement

Preventing Unauthorized Product Use. Applozic Contexxt implements industry standard access controls and detection capabilities for the internal networks that support its products. Access controls: Network access control mechanisms are designed to prevent network traffic using unauthorized protocols from reaching the product infrastructure. The technical measures implemented differ between infrastructure providers and include Virtual Private Cloud (VPC) implementations, security group assignment, and traditional firewall rules. Intrusion detection and prevention: Applozic Contexxt implemented a Web Application Firewall (WAF) solution to protect hosted customer websites and other internet-accessible applications. The WAF is designed to identify and prevent attacks against publicly available network services. Static code analysis: Security reviews of code stored in ApplozicContexxt’s source code repositories is performed, checking for coding best practices and identifiable software flaws. Penetration testing: Applozic Contexxt maintains relationships with industry recognized penetration testing service providers for four annual penetration tests. The intent of the penetration tests is to identify and resolve foreseeable attack vectors and potential abuse scenarios. Bug bounty: A bug bounty program invites and incentivizes independent security researchers to ethically discover and disclose security flaws. Applozic Contexxt implemented a bug bounty program in an effort to widen the available opportunities to engage with the security community and improve the product defenses against sophisticated attacks.

Appears in 1 contract

Sources: Data Processing Agreement

Preventing Unauthorized Product Use. Applozic Aritic implements industry standard access controls and detection capabilities for the internal networks that support its products. Access controls: Network access control mechanisms are designed to prevent network traffic using unauthorized protocols from reaching the product infrastructure. The technical measures implemented differ between infrastructure providers and include Virtual Private Cloud (VPC) implementations, security group assignment, and traditional firewall rules. Intrusion detection and prevention: Applozic Aritic implemented a Web Application Firewall (WAF) solution to protect hosted customer websites and other internet-accessible applications. The WAF is designed to identify and prevent attacks against publicly available network services. Static code analysis: Security reviews of code stored in ApplozicAritic’s source code repositories is performed, checking for coding best practices and identifiable software flaws. Penetration testing: Applozic Aritic maintains relationships with industry recognized penetration testing service providers for four annual penetration tests. The intent of the penetration tests is to identify and resolve foreseeable attack vectors and potential abuse scenarios. Bug bounty: A bug bounty program invites and incentivizes independent security researchers to ethically discover and disclose security flaws. Applozic Aritic implemented a bug bounty program in an effort to widen the available opportunities to engage with the security community and improve the product defenses against sophisticated attacks.

Appears in 1 contract

Sources: Data Processing Agreement