Web Application Firewall Clause Samples

Web Application Firewall. Implemented Cloud Based web application Firewall to protect Rady web applications. The value of this measure is approximately $31,000.00.
Web Application Firewall. (WAF) layer that is embedded in all web applications for protection against Open Web Application Security Project
Web Application Firewall. 1002 The Contractor shall provide a state-of-the-art, highly-available Web Application Firewall service 1003 component to protect selected internet-facing web applications indicated by ECHA. 1004 The Contractor shall be able to take ECHA’s current Web Application Firewall (F5 ASM) 1005 configuration and migrate it to the offered service to the greatest extent possible. This 1006 configuration is currently applied to few ECHA critical applications. This migration shall be part 1007 of the Transition Project. 1008 The Web Application Firewall detects and blocks attacks primarily based on the attack signatures 1009 provided by the Web Application Firewall suppliers. On request of ECHA or ECHA third party, the 1010 Contractor shall collaborate to define the appropriate configuration of the Web Application 1011 firewall (Normal Change). 1012 The Contractor should provide reports or a dashboard view on the detection activity of the Web 1013 Application Firewall to the ECHA third party in charge of the application management. 1014 It is understood that these services are based on largely emerging technologies. Thus, ECHA 1015 expects that the Contractor will provided added value by proposing more advanced and efficient 1016 ways of leveraging the potential of the technology. Such proposal could very well fit in the rolling 1017 plan for optimisation (ref. chapter 10 Continuous optimisation and cost reduction over time).
Web Application Firewall. Yes Yes (upon agreement) No

Related to Web Application Firewall

  • Mobile Application If Red Hat offers products and services through applications available on your wireless or other mobile Device (such as a mobile phone) (the "Mobile Application Services"), these Mobile Application Services are governed by the applicable additional terms governing such Mobile Application Service. Red Hat does not charge for these Mobile Application Services unless otherwise provided in the applicable additional terms. However, your wireless carrier's standard messaging rates and other messaging, data and other rates and charges will apply to certain Mobile Application Services. You should check with your carrier to find out what plans your carrier offers and how much the plans cost. In addition, the use or availability of certain Mobile Application Services may be prohibited or restricted by your wireless carrier, and not all Mobile Application Services may work with all wireless carriers or Devices. Therefore, you should check with your wireless carrier to find out if the Mobile Application Services are available for your wireless Device, and what restrictions, if any, may be applicable to your use of such Mobile Application Services.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Server Software Subject to the terms and conditions of this ▇▇▇▇, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

  • Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇/E-Verify.

  • Interfaces GTE provides the CLECs with choices for access to OSS pre-ordering, ordering, maintenance and repair systems. Availability of the interfaces is fundamental to the CLEC being able to effectively do business with GTE. Additionally, in many instances, CLEC personnel must work with the service personnel of GTE. Measurements in this category assess the availability to the CLECs of systems and personnel at GTE work centers.