Browse
Search
2017-212-E CJRM - Automon LLC for Criminal Justice Resource Management (CJRM) Case Management Software
OrangeCountyNC
>
Board of County Commissioners
>
Contracts and Agreements
>
General Contracts and Agreements
>
2010's
>
2017
>
2017-212-E CJRM - Automon LLC for Criminal Justice Resource Management (CJRM) Case Management Software
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
6/26/2018 10:08:53 AM
Creation date
6/9/2017 11:27:54 AM
Metadata
Fields
Template:
Contract
Date
5/22/2017
Contract Starting Date
5/22/2017
Contract Ending Date
5/21/2020
Contract Document Type
Contract
Amount
$4,400.00
Document Relationships
R 2017-212-E CJRM - Automon LLC for Criminal Justice Resource Management (CJRM) Case Management Software
(Linked To)
Path:
\Board of County Commissioners\Contracts and Agreements\Contract Routing Sheets\Routing Sheets\2017
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
21
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
DocuSign Envelope ID:D164BE86-F785-4067-B01F-BFFEBB5FF1B9 <br /> 31. How does the cloud provider defend against malware, including but not limited to <br /> viruses, bots, spyware, spam, phishing and pharming? <br /> Microsoft Azure Government published a blog regarding its threat management practices. <br /> An example of a recent entry can be found here: https://www.microsoft.com/en- <br /> us/TrustCenter/Security/ThreatManagement <br /> 32. What system hardening strategies are employed by the cloud provider? <br /> Microsoft Azure Government published on its website blog and white papers regarding <br /> its some of its strategies threat management practices. Other strategies are kept <br /> confidential and are proprietary to protect its customers. <br /> 33. How does the cloud provider perform security testing, including logging, correlation, <br /> intrusion detection, intrusion prevention, file integrity monitoring, time synchronization, <br /> security assessments, penetration testing? <br /> Microsoft Azure Government publishes a blog regarding its security testing. An example <br /> of a recent entries can be found here: https://docs.microsoft.com/en-us/azure/security/ <br /> and here: https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-security. A <br /> search of Microsoft's website contains many more entries which will be of interest to our <br /> customers. <br /> 34. What technologies and methods does the cloud vendor provide for strong authentication? <br /> Ce Pretrial leverages Active Directory polices enforced by our customers to log on to the <br /> application. Forms based authentication is also used for customers who do not use <br /> Active Directory. Password complexity and frequency of password changes reflect <br /> customer policies. <br /> 35. Provide any other comments and explanations: <br /> u Aida rc w u <br />
The URL can be used to link to this page
Your browser does not support the video tag.