Telecommunication and Network Security. a. Convercent will deploy reasonably appropriate firewall technology in the operation of Convercent's sites. Traffic between Customer and Convercent will be protected and authenticated by industry standard cryptographic technologies. Specifically, firewall(s) must be able to effectively perform the following functions: stateful inspection, logging, support for all IPSec standards and certificates, support for strong encryption and hashing, ICMP and SNMP based monitoring and anti-spoofing.
Appears in 2 contracts
Sources: Master Services Agreement, Master Services Agreement
Telecommunication and Network Security. a. Convercent will deploy reasonably appropriate firewall technology in the operation of Convercent's sites. Traffic between Customer and Convercent will be protected and authenticated by industry standard cryptographic technologies. Specifically, firewall(s) must be able to effectively perform the following functions: stateful inspection, logging, support for all IPSec standards and certificates, support for strong encryption and hashing, ICMP and SNMP based monitoring and anti-spoofinganti‐spoofing.
Appears in 1 contract
Sources: Master Services Agreement