Vulnerability Assessment. Defendant will agree to implement automated vulnerability scanning tools that cover its systems and will set policies for prompt remediation; (c) Firewall Implementation – Defendant agrees to enhance existing firewall protections; (d) Remote Access – Defendant agrees to enhance existing multi-factor authentication processes for remote access. Defendant will have access to features to alert it of unsuccessful administrative account logins; (e)
Appears in 2 contracts
Sources: Settlement Agreement, Settlement Agreement