My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Item 26 - Agreement with Allied Network Solutions, Inc. for Adobe Software and Subscription
Clerk
>
Agenda Packets / Staff Reports
>
City Council (2004 - Present)
>
2025
>
01/21/2025 Regular & Special SA
>
Item 26 - Agreement with Allied Network Solutions, Inc. for Adobe Software and Subscription
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
1/27/2025 5:03:20 PM
Creation date
1/21/2025 2:16:24 PM
Metadata
Fields
Template:
City Clerk
Doc Type
Agenda Packet
Agency
Information Technology
Item #
26
Date
1/21/2025
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
762
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
Security Policies and Procedures <br />D. Enforcement <br />Any workforce member found to have violated this policy may be subject to <br />disciplinary action, up to and including termination of employment. See Sanction Policy. <br />XXIV. Networks <br />A. Overview <br />Virtru's networks and devices shall designed, deployed and operated in a manner so as <br />to provide proper levels of protection for the data being accessed and transported. <br />Significant changes in network designs must be piloted before deployment. <br />Mechanisms must be in place to alert the ISO of possible attacks and breaches, to <br />include: <br />1. Denial of service attacks <br />2. Improper access <br />3. Virus infections <br />4. Unauthorized software installations, email, FTP or other improper usage <br />Analysis must be conducted at least annually to validate the failure mode and recovery <br />for all devices, network circuits and protocols. See Change Logs for details. <br />Responsibilities must be defined for: <br />1. Administration of network and communications connections <br />2. Operations of all devices <br />3. Monitoring <br />4. Timely review of audit logs and response to alerts or alarms <br />S. Review of unusual patterns of usage or activity <br />To minimize risks, any network connections or network segments should be <br />disconnected when not in use. <br />B. Monitoring <br />Virtru uses AlienVault's Unified Security Management System to monitor all traffic on <br />their network. Notifications are set to alert the IT staff of any unusual traffic and <br />vulnerabilities, as well as log any security events that may occur. <br />C. Access control and physical security <br />Sites where Virtru's network equipment or communications lines exist are considered <br />to be high -value and are subject to the access control and physical security rules <br />Rev.2015.8.6 <br />47 <br />
The URL can be used to link to this page
Your browser does not support the video tag.