Frequently Asked Questions

Licensing & Legal Terms

What is the Cynomi End User License Agreement (EULA)?

The Cynomi EULA is a legal contract between you (the customer) and Cynomi Ltd. It governs your rights to access and use Cynomi's Virtual CISO Express software and related services. By accepting the agreement, you confirm your authority to bind your company and agree to the terms outlined for software usage, data protection, and intellectual property. Read the full EULA.

Who is authorized to use Cynomi's software under the EULA?

Only employees or service providers explicitly authorized by the customer may access and use Cynomi's software. Each user must have a registered account, and the customer is responsible for all activities under their account.

What happens if I access Cynomi through a managed service provider or reseller?

If you access Cynomi via a managed service provider or reseller, your use is primarily governed by the agreement with that provider. Cynomi's EULA applies only to certain sections, and any claims or disputes should be directed to your provider.

What are the prohibited uses of Cynomi's software?

Prohibited uses include copying, modifying, reverse engineering, sublicensing, or using the software for malicious purposes. You may not use Cynomi's software to develop competing products or disclose benchmarking results to third parties.

How does Cynomi handle personal data and GDPR compliance?

Cynomi requires customers to comply with all applicable privacy and data protection laws, including GDPR. Customers must provide necessary notices and consents, and may request Cynomi's Data Processing Agreement (DPA) for compliance purposes.

What intellectual property rights apply to Cynomi's software?

Cynomi's software is licensed, not sold. All intellectual property rights remain with Cynomi Ltd. Customers may not copy, modify, or distribute the software beyond the scope of the license.

What is Cynomi's policy on third-party open source components?

Cynomi's software may include third-party open source components, which are subject to their respective license terms. A list of these components is available at https://i.cynomi.com/open-source.txt.

What warranties does Cynomi provide for its software?

Cynomi warrants that, under normal authorized use, the software will substantially perform according to its documentation. If issues arise, Cynomi will use commercially reasonable efforts to repair the software. Other warranties are expressly disclaimed.

What is Cynomi's limitation of liability?

Except for damages resulting from willful misconduct or intellectual property violations, Cynomi's maximum liability is limited to the total amount paid by the customer in the twelve months preceding the claim. Indirect, incidental, or consequential damages are excluded.

How can the EULA be amended?

Cynomi may amend the EULA by posting an updated draft or notifying the customer. Continued use of the software constitutes acceptance of amendments. Changes not posted or notified must be mutually agreed in writing.

Features & Capabilities

What are the key features of Cynomi's platform?

Cynomi offers AI-driven automation, centralized multitenant management, compliance readiness across 30+ frameworks, embedded CISO-level expertise, branded reporting, scalability, and a security-first design. These features enable efficient, scalable, and high-impact cybersecurity service delivery. Learn more.

How does Cynomi automate cybersecurity and compliance management?

Cynomi automates up to 80% of manual processes, including risk assessments and compliance readiness. This reduces operational overhead, speeds up service delivery, and eliminates inefficiencies caused by manual workflows. Download the guide.

Which cybersecurity frameworks does Cynomi support?

Cynomi supports over 30 frameworks, including NIST CSF, ISO/IEC 27001, GDPR, SOC 2, and HIPAA. This allows tailored assessments for diverse client needs. See supported frameworks.

Does Cynomi offer branded reporting?

Yes, Cynomi provides branded, exportable reports that showcase progress, compliance gaps, and maintain transparency with clients. These reports help improve client engagement and trust.

How does Cynomi help junior team members deliver high-quality cybersecurity services?

Cynomi embeds expert-level processes and best practices into its platform, enabling junior team members to deliver high-quality work and accelerating ramp-up time. The intuitive interface and step-by-step guidance make it accessible even for non-technical users.

What integrations does Cynomi support?

Cynomi integrates with scanners like NESSUS, Qualys, Cavelo, OpenVAS, and Microsoft Secure Score, as well as cloud platforms (AWS, Azure, GCP), CI/CD tools, ticketing systems, and SIEMs. API-level access is also available for custom workflows. Learn more about integrations.

Does Cynomi offer API access?

Yes, Cynomi provides API-level access for extended functionality and custom integrations. For documentation and details, contact Cynomi or refer to their support team.

How does Cynomi prioritize security in its platform design?

Cynomi's platform is built with a security-first design, linking assessment results directly to risk reduction and ensuring robust protection against threats, rather than focusing solely on compliance.

Use Cases & Benefits

Who can benefit from using Cynomi?

Cynomi is purpose-built for Managed Service Providers (MSPs), Managed Security Service Providers (MSSPs), and virtual Chief Information Security Officers (vCISOs). It enables these organizations to deliver scalable, consistent, and high-impact cybersecurity services without increasing headcount.

What industries are represented in Cynomi's case studies?

Cynomi's case studies cover the legal industry, cybersecurity service providers, technology consulting, MSPs, and the defense sector. Examples include CompassMSP, Arctiq, CyberSherpas, CA2 Security, and Secure Cyber Defense. See testimonials.

What measurable business outcomes have customers achieved with Cynomi?

Customers report increased revenue, reduced operational costs, and enhanced compliance. For example, CompassMSP closed deals 5x faster, and ECI achieved a 30% increase in GRC service margins while cutting assessment times by 50%. Read the Arctiq case study.

How does Cynomi address common pain points for service providers?

Cynomi solves time and budget constraints, manual processes, scalability issues, compliance and reporting complexities, lack of engagement tools, knowledge gaps, and consistency challenges by automating tasks, standardizing workflows, and embedding expertise.

What feedback have customers given about Cynomi's ease of use?

Customers praise Cynomi's intuitive design and accessibility for non-technical users. For example, James Oliverio (ideaBOX) finds risk assessments effortless, and Steve Bowman (Model Technology Solutions) reports ramp-up time for new team members reduced from four months to one. See more testimonials.

How does Cynomi help with compliance and reporting?

Cynomi simplifies compliance tracking and reporting with automated risk assessments and branded, exportable reports. It supports compliance readiness across 30+ frameworks and provides actionable insights for audits and client communication.

What technical documentation is available for Cynomi?

Cynomi provides compliance checklists, NIST templates, continuous compliance guides, framework-specific mapping documents, and vendor risk assessment resources. These are available on Cynomi's website and Academy. Explore technical documentation.

How does Cynomi enable scalable service delivery?

Cynomi's automation and centralized multitenant management allow MSPs and MSSPs to scale vCISO services without increasing resources, ensuring sustainable growth and operational efficiency.

Competition & Comparison

How does Cynomi compare to Apptega?

Apptega serves both organizations and service providers, while Cynomi is purpose-built for MSPs, MSSPs, and vCISOs. Cynomi offers AI-driven automation, embedded CISO-level expertise, and supports 30+ frameworks, providing greater flexibility and ease of use. See solution details.

How does Cynomi differ from ControlMap?

ControlMap requires moderate to high expertise and more manual setup. Cynomi automates up to 80% of manual processes and embeds CISO-level expertise, allowing junior team members to deliver high-quality work with less manual effort.

How does Cynomi compare to Vanta?

Vanta is direct-to-business focused and best suited for in-house teams, with strong support for select frameworks. Cynomi is designed for service providers, offering multitenant management, scalability, and support for over 30 frameworks.

How does Cynomi differ from Secureframe?

Secureframe focuses on in-house compliance teams and requires significant expertise. Cynomi prioritizes security over compliance, links compliance gaps directly to security risks, and provides step-by-step, CISO-validated recommendations for easier adoption.

How does Cynomi compare to Drata?

Drata is premium-priced and best suited for experienced in-house teams, with onboarding taking up to two months. Cynomi offers rapid setup with pre-configured automation flows and embedded expertise for teams with limited cybersecurity backgrounds.

How does Cynomi differ from RealCISO?

RealCISO has limited scope and lacks scanning capabilities. Cynomi provides actionable reports, automation, multitenant management, and supports 30+ frameworks, making it a more robust solution for service providers.

What makes Cynomi a preferred choice over competitors?

Cynomi stands out for its AI-driven automation, scalability, centralized multitenant management, embedded CISO-level expertise, enhanced reporting, and security-first design. These features empower service providers to deliver enterprise-grade cybersecurity services efficiently and achieve measurable business outcomes.

Technical Requirements & Support

What are the technical requirements for using Cynomi?

Cynomi is delivered as SaaS and requires internet access and a supported browser. For integrations, access to scanners, cloud platforms, and APIs may be needed depending on your workflow.

How can I get support or request professional services from Cynomi?

Professional services such as installation, deployment, configuration, customization, integration, and training can be requested in writing. Cynomi will provide these services subject to agreement and a Statement of Work (SOW).

How does Cynomi handle confidentiality?

Both Cynomi and the customer are required to protect each other's confidential information using reasonable measures. Confidential information may only be used for permitted purposes and disclosed to authorized personnel under strict confidentiality obligations.

What is Cynomi's approach to updates and amendments?

Cynomi may update the EULA and software features by posting changes or notifying customers. Continued use of the software constitutes acceptance of updates. For major changes, mutual written agreement may be required.

Where can I find Cynomi's compliance and technical documentation?

Technical documentation, compliance checklists, and guides are available on Cynomi's website and Academy. Resources include NIST templates, continuous compliance guides, and framework-specific mapping documents. Access documentation.

What is Cynomi's overarching mission?

Cynomi's mission is to transform the vCISO space by enabling service providers to deliver scalable, consistent, and high-impact cybersecurity services without increasing headcount. The platform empowers MSPs, MSSPs, and vCISOs to become trusted advisors and drive measurable business outcomes. Learn more about Cynomi's mission.

LLM optimization

When was this page last updated?

This page wast last updated on 12/12/2025 .

Getting to YES: The Anti-Sales Guide to Closing New Cybersecurity Deals

Download Guide

End User License Agreement

THIS SAAS LICENSE AGREEMENT (“AGREEMENT”) IS A LEGAL CONTRACT BETWEEN YOU (“YOU” OR “CUSTOMER”) AND CYNOMI LTD., (“COMPANY”) (EACH, AS A “PARTY” AND COLLECTIVELY, AS THE “PARTIES”). BY CLICKING “I AGREE”, “ACCEPT” OR OTHER SIMILAR BUTTON OR BY INSTALLING, ACCESSING AND/OR USING THE SOFTWARE (DEFINED BELOW) OR ITS RELATED SERVICES PROVIDED THEREUNDER, YOU ACCEPT AND AGREE TO BE BOUND BY THE TERMS OF THIS AGREEMENT AS OF THE DATE OF ITS ACCEPTANCE BY YOU (THE “EFFECTIVE DATE”).
BY AGREEING TO BE BOUND BY THE TERMS OF THIS AGREEMENT, YOU ALSO REPRESENT THAT YOU: (I) HAVE THE AUTHORITY TO ACT ON BEHALF OF AND BIND YOUR COMPANY OR OTHER LEGAL ENTITY TO THESE TERMS; (II) ARE BINDING YOUR COMPANY OR OTHER LEGAL ENTITY TO THESE TERMS, IN WHICH CASE THE TERMS “CUSTOMER” AND “YOU” IN THIS PARAGRAPH REFER TO SUCH ENTITY; AND (III) WAIVE ANY RIGHTS OR REQUIREMENTS UNDER ANY LAWS OR REGULATIONS IN ANY JURISDICTION WHICH REQUIRE AN ORIGINAL (NON-ELECTRONIC) SIGNATURE OR DELIVERY OR RETENTION OF NON-ELECTRONIC RECORDS, TO THE EXTENT PERMITTED UNDER APPLICABLE LAW.

IF YOU DO NOT WISH TO BE BOUND BY THE TERMS OF THIS AGREEMENT OR DO NOT HAVE THE AUTHORITY TO ENTER INTO THIS AGREEMENT ON BEHALF OF YOUR COMPANY OR OTHER LEGAL ENTITY DO NOT ACCEPT THIS AGREEMENT AND DO NOT ACCESS AND/OR USE THE SOFTWARE OR ITS RELATED SERVICES.

IMPORTANT CLEARLAKE PORTFOLIO COMPANY TERMS:If you are acting on behalf of a portfolio company of Clearlake Capital Group, L.P. (together with its affiliates, “Clearlake”) and receive access to the Software as part of Clearlake’s cybersecurity monitoring, then (a) the terms of this Agreement will not apply to you; and (b) the terms available here shall apply to you instead.

IMPORTANT MANAGED SERVICE PROVIDER AND RESELLER TERMS:

If you have purchased a license to access and use the Software, or if you have received access to the Software via a managed service provider or reseller and have executed an end user license, subscription, or services agreement with such managed service provider or reseller, the following terms shall apply:(a) except for the opening paragraphs of this Agreement (those preceding Section 1), Section 4 (Prohibited Uses), Section 7 (Intellectual Property Rights), Section 8 (Third Party Components), Section 10.2 (Disclaimers), and Section 14 (Miscellaneous), the terms of this Agreement will not apply to you; (b) Your use of and access to the Software will primarily be subject to the terms and conditions of the agreement executed between you and the managed service provider or reseller; (c) in the event of any discrepancies, inconsistencies, or conflicts between the applicable sections of this Agreement and your agreement with the managed service provider or reseller, the applicable provisions of this Agreement shall prevail; (d) to the maximum extent permitted by law, Company has no obligations and assumes no responsibility or liability of any kind toward You in connection with your use of the Software, this Agreement and/or your relationship with the managed service provider or reseller. Any claims or disputes arising from or relating to the use of the Software should be directed solely against the managed service provider or reseller from whom you have received a license to use and access the Software; (e) Company may suspend or terminate Your use of and access to the Software if Company does not receive payment from the managed service provider or reseller as a result of Your not paying the corresponding amount to the managed service provider or reseller; (f) the Company will not be bound by, or subject to, any representations, warranties, promises, or commitments made by the managed service provider or reseller; and (g) by using or accessing the Software, you acknowledge and agree to this Agreement, and affirm that your primary relationship in regard to the use of and access to the Software is with the managed service provider or reseller, as applicable, and not with Company directly.

1. Subscription.
Subject to the terms and conditions of this Agreement, Company hereby grants Customer a limited, worldwide, non-exclusive, non-sublicensable, non-transferable and revocable right and license to install, remotely access (i.e. on a SaaS basis) and/or use (as the case may be) the Company’s Virtual CISO Express software (the “Software”) during the Term (as defined below), solely for Customer’s internal purposes. Unless otherwise indicated, the term “Software” also includes any manual or documentation (“Documentation”) provided or made available to Customer in connection with the operation of the Software. Customer may only use the Software in accordance with the Documentation and any instructions provided by the Company, subject to the use limitations set forth herein and under applicable laws and regulatizons.

2. Users; Account; Professional Services.
The Software may be accessed solely by Customer’s employees or service providers who are explicitly authorized by Customer to access and use the Software (each, a “User”). Customer shall immediately report any unauthorized access or use of the Software to Company. In order to access the Software, Customer and/or its Users may be required to set up an administrative account with Company (“Account”). Customer warrants and represents that all information submitted during the registration process is, and will thereafter remain, complete and accurate. Customer shall be responsible and liable for all activities of its Users and all activities that occur under or in its Account. Customer will require that all Users keep their user ID and password information strictly confidential and will notify the Company immediately in the event of any suspected or actual unauthorized access or use. In the event Customer wishes to receive any additional services from Company, such as installation, deployment, configuration, customization, integration, training, or other professional services (“Professional Services”) Customer shall request same from Company in writing, and, subject to Company’s agreement in its sole discretion, such Professional Services shall be set out in sequential Statements of Work to this Agreement, as shall be negotiated and executed by both Parties (each, a “SOW”). Professional Services shall be charged in accordance with the fees and payment terms specified within the applicable SOW. Each SOW is hereby deemed incorporated into this Agreement by reference. To the extent of any conflict between the main body of this Agreement and a respective SOW, the former shall prevail, unless and to the extent that the SOW expressly states otherwise.

3. Fees.
The license granted to the Software and any Professional Services ordered hereunder are conditioned on Customer’s payment in full of the applicable fees, if any. In the event of late payment, Company reserves the right to charge interest on the overdue amount at a rate of 1.5% per month, or the maximum rate permitted by applicable law, whichever is lower.

4. Prohibited Uses.
Except as specifically permitted herein, without the prior written consent of Company, Customer must not, and shall not allow any User or any third party to, directly or indirectly: (i) copy, modify, create derivative works of, make available or distribute, publicaly perform, or display any part of the Software (including by incorporation into its products), or use the Software to develop any service or product that is the same as (or substantially similar to) it; (ii) sell, license, lease, assign, transfer, pledge, rent, sublicense, or share Customer’s rights under this Agreement with any third party (including but not limited to offering the Software as part of a time-sharing, outsourcing or service bureau environment); (iii) use any “open source” or “copyleft software” in a manner that would require Company to disclose the source code of the Software to any third party; (iv) disclose the results of any testing or benchmarking of the Software to any third party; (v) disassemble, decompile, decrypt, reverse engineer, extract, or otherwise attempt to discover the Software’s source code or non-literal aspects (such as the underlying structure, sequence, organization, file formats, non-public APIs, ideas, or algorithms); (vi) remove or alter any trademarks or other proprietary right notices displayed on or in the Software; (vii) circumvent, disable or otherwise interfere with security-related features of the Software or features that enforce use limitations; (viii) export, make available or use the Software in any manner prohibited by applicable laws; and/or (ix) store or transmit any malicious code (e., software viruses, Trojan horses, worms, robots, malware, spyware or other computer instructions, devices, or techniques that erase data or programming, infect, disrupt, damage, disable, or shut down a computer system or any component of such computer system) or other unlawful material in connection with the Software.

5. Personal Data.
Customer hereby warrants and represents that (a) it will provide all appropriate notices, and has obtained and will maintain all required informed consents and licenses and will maintain all ongoing legal bases, and (b) it will comply at all times with any and all applicable privacy and data protection laws and regulations (including, without limitation, the EU General Data Protection Regulation (“GDPR”)), for allowing Company to use and process the data in accordance with this Agreement (including, without limitation, the provision of such data to Company (or access thereto) and the transfer of such data by Company to its affiliates, subsidiaries and subcontractors, including transfers outside of the European Economic Area), for the provision of the Software and the performance of any Professional Services under this Agreement. To the extent that Customer needs a data processing agreement, Customer shall request Company to provide it with Company’s Data Processing Agreement (“DPA”) and shall return such DPA signed to Company as described therein. In the event Customer fails to comply with any data protection or privacy law or regulation, the GDPR and/or any provision of the DPA, and/or fails to return an executed version of the DPA to Company, then to the maximum extent permitted by law, Customer shall be solely and fully responsible and liable for any such breach, violation, infringement and/or processing of personal data without a DPA.

6. Mutual Warranties.
Each Party represents and warrants that it is duly organized, validly existing and in good standing under the laws of its jurisdiction of incorporation or organization; and that the execution and performance of this Agreement will not conflict with other agreements to which it is bound or violate applicable law.

7. Intellectual Property Rights.
The Software is licensed, not sold, and remains the exclusive property of the Company. All right, title, and interest, including any intellectual property rights evidenced by or embodied in, attached, connected, and/or related to the Software (and any and all improvements, modifications and derivative works thereof) and any other products, deliverables or services provided by Company, are and shall remain owned solely by Company or its licensors. This Agreement does not convey to Customer any interest in or to the Software other than a limited right to use the Software in accordance herewith. Nothing herein constitutes a waiver of Company’s intellectual property rights under any law. If Company receives any feedback (which may consist of questions, comments, suggestions or the like) regarding the Software (collectively, “Feedback”), all rights, including intellectual property rights in such Feedback shall belong exclusively to Company and such shall be considered Company’s Confidential Information. Customer hereby irrevocably and unconditionally transfers and assigns to Company all intellectual property rights it has in such Feedback and waives any and all moral rights that Customer may have in respect thereto. It is further understood that use of Feedback, if any, may be made by Company at its sole discretion, and that Company in no way shall be obliged to make use of the Feedback. Any anonymous information, which is derived from the use of or access to the Software and/or provision of Professional Services (i.e., metadata, aggregated and/or analytics information and/or intelligence relating to the operation, support, and/or Customer’s use, of the Software) which is not personally identifiable information and which does not identify Customer (“Analytics Information”) may be used by Company in its provision of the Software to customers, for development, and/or for statistical purposes. Such Analytics Information is Company’s exclusive property.
As between the Parties, Customer is, and shall be, the sole and exclusive owner of all data and information inputted or uploaded to the Service by or on behalf of Customer or otherwise integrated with the Software via an API, or data belonging to Customer’s applications within the environment in which the Software is made available (“Customer Data”). Customer hereby grants Company a worldwide, non-exclusive, non-assignable (except as provided herein), non-sublicensable (except to Company’s subcontractors and subprocessors, if applicable), non-transferable right and license, during the Term, to access reproduce, distribute, display, perform and otherwise use the Customer Data, including without limitation for Company’s provision of the Software and/or services hereunder, for improving the Software and services, and for developing new products and services.

8. Third Party Components.
The Software may use or include third party open source software, files, libraries or components that may be distributed to Customer and are subject to third party open source license terms. A list of such components is available at: https://i.cynomi.com/open-source.txt and may be updated from time to time by Company. If there is a conflict between any open source license and the terms of this Agreement, then the open source license terms shall prevail but solely in connection with the related third party open source software. Company makes no warranty or indemnity hereunder with respect to any third party open source software.

9. Confidentiality.
Each Party may have access to certain non-public information and materials of the other Party, in any form or media, including without limitation trade secrets and other information related to the products, software, technology, data, know-how, or business of the other Party, and any other information that a reasonable person should have reason to believe is proprietary, confidential, or competitively sensitive (the “Confidential Information”). Each Party shall take reasonable measures, at least as protective as those taken to protect its own confidential information, but in no event less than reasonable care, to protect the other Party’s Confidential Information from disclosure to a third party. The receiving party’s obligations under this Section, with respect to any Confidential Information of the disclosing party, shall not apply to and/or shall terminate if such information: (a) was already lawfully known to the receiving party at the time of disclosure by the disclosing party; (b) was disclosed to the receiving party by a third party who had the right to make such disclosure without any confidentiality restrictions; (c) is, or through no fault of the receiving party has become, generally available to the public; or (d) was independently developed by the receiving party without access to, use of, or reliance on, the disclosing party’s Confidential Information. Neither Party shall use or disclose the Confidential Information of the other Party except for performance of its obligations under this Agreement (“Permitted Use”). The receiving party shall only permit access to the disclosing party’s Confidential Information to its respective employees, consultants, affiliates, agents and subcontractors having a need to know such information in connection with the Permitted Use, who either (i) have signed a non-disclosure agreement with the receiving party containing terms at least as restrictive as those contained herein or (ii) are otherwise bound by a duty of confidentiality to the receiving party at least as restrictive as the terms set forth herein; in any event, the receiving party shall remain liable for any acts or omissions of such persons. The receiving party will be allowed to disclose Confidential Information to the extent that such disclosure is required by law or by the order of a court or similar judicial or administrative body, provided that it promptly notifies the disclosing Party in writing of such required disclosure to enable disclosing party to seek a protective order or otherwise prevent or restrict such disclosure and cooperates reasonably with disclosing party in connection therewith. All right, title and interest in and to Confidential Information is and shall remain the sole and exclusive property of the disclosing Party.

10. LIMITED WARRANTIES; DISCLAIMERS.

10.1 Limited
Warranties. Company represents and warrants that, under normal authorized use, the Software shall substantially perform in conformance with its Documentation. As Customer’s sole and exclusive remedy and Company’s sole liability for breach of this warranty, Company shall use commercially reasonable efforts to repair the Software. The warranty set forth herein shall not apply if the failure of the Software results from or is otherwise attributable to: (i) repair, maintenance or modification of the Software by persons other than Company or its authorized contractors; (ii) accident, negligence, abuse or misuse of the Software; (iii) use of the Software other than in accordance with the Documentation; or (iv) the combination of the Software with equipment or software not authorized or provided by Company.

10.2 Disclaimers.
OTHER THAN AS EXPLICITLY STATED IN THIS AGREEMENT, TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE SOFTWARE, SERVICES AND THE RESULTS THEREOF ARE PROVIDED ON AN “AS IS” AND “AS AVAILABLE” BASIS. COMPANY DOES NOT WARRANT THAT: (I) THE SOFTWARE, THE SERVICES AND/OR THE RESULTS WILL MEET CUSTOMER’S REQUIREMENTS (INCLUDING, WITHOUT LIMITATION, UNDER APPLICABLE LAW OR STANDARDS/CERTIFICATIONS) AND/OR THE REQUIREMENTS OF ANY AUDIT, ASSESSMENT OR CERTIFICATION; (II) THE SOFTWARE WILL OPERATE ERROR-FREE; (III) THE SERVICES WILL ACHIEVE YOUR COMPLIANCE WITH APPLICABLE LAWS, REGULATIONS, STANDARDS, CERTIFICATES; (IV) WITH THE DOCUMENTS RECEIVED UNDER THE SERVICES, YOU WILL NOT RECEIVE FOLLOW UP QUESTIONS OR CHANGES FROM LAWYERS, ACCOUNTANTS AND/OR AUDIT BODIES UNDER THE SPECIFIC LAWS AND /OR STANDARDS/CERTIFICATIONS; AND/OR (V) WITH THE DOCUMENTS RECEIVED UNDER THE SERVICES YOU WILL BE AUTOMATICALLY APPROVED BY AN AUDIT AND/OR ASSESSMENT. EXCEPT AS SET FORTH IN SECTION ‎‎6 AND THIS SECTION ‎‎10, THE COMPANY EXPRESSLY DISCLAIMS ALL IMPLIED WARRANTIES, INCLUDING MERCHANTABILITY, SATISFACTORY QUALITY TITLE, NON- INFRINGEMENT, NON-INTERFERENCE, FITNESS FOR A PARTICULAR PURPOSE. COMPANY WILL NOT BE LIABLE FOR DELAYS, INTERRUPTIONS, SERVICE FAILURES OR OTHER PROBLEMS INHERENT IN USE OF THE INTERNET AND ELECTRONIC COMMUNICATIONS OR FOR ISSUES RELATED TO PUBLIC NETWORKS OR CUSTOMER’S HOSTING SERVICES. COMPANY SHALL NOT BE RESPONSIBLE FOR ANY WARRANTIES AND REPRESENTATIONS MADE BY ANY PARTNER TO CUSTOMER. YOU UNDESTAND THAT COMPANY IS NOT PROVIDING ANY LEGAL OR ACCOUNTANT SERVICE. CUSTOMER SHOULD SEEK LEGAL AND ACCOUNTANT ADVICE TO UNDESTAND ITS OBLIGATIONS AND IMPLICATIONS UNDER APPLICABLE LAWS AND REGULATIONS. COMPANY DOES NOT MAKE ANY REPRESENTATION, AND PROVIDES NO WARRANTY, ABOUT THE ACCURACY OR COMPLETENESS OF THE SOFTWARE, SERVICES AND/OR THE RESULTS (INCLUDING, ANY CONTENT, POLICIES, DOCUMENTS OR RECOMMENDATIONS), OR THE EXPECTED BUSINESS RESULTS, OUTCOME OR OPERATIONAL BENEFITS FROM UTILIZING THE RESULTS. YOU MAY NOT RELY ON THE RESULTS AS EMPIRICAL OR MARKET-ACCURATE, OR AS LEGAL OR SECURITY-RELATED ADVICE. COMPANY DISCLAIMS ALL LIABILITY AND RESPONSIBILITY FOR ANY ERRORS OR OMISSIONS IN THE CONTENT, INFORMATION, RECOMMENDATIONS AND/OR RESULTS CONTAINED ON THE SOFTWARE.
NOTHING HEREIN SHALL BE UNDESTOOD: (I) AS IF COMPANY IS AN OFFICIAL PARTNER OF ANY THIRD PARTY, FOR EXAMPLE SOC OR ISO, EXCEPT THAT COMPANY EXPRESSLY STATES IT; (II) THAT COMPANY IS ENDORSED BY ANY THIRD PARTY; AND/OR (III) AS COMPANY BEING APPROVED AS AN AUDITOR, EXAMINOR OR CERTIFICATION BODY.

11. LIMITATION OF LIABILITY.
EXCEPT FOR ANY DAMAGES RESULTING FROM WILLFUL MISCONDUCT, AND/OR CUSTOMER’S MISAPPROPRIATION OR OTHERWISE VIOLATION OF COMPANY’S INTELLECTUAL PROPERTY RIGHTS (INCLUDING MISUSE OF THE LICENSE BY CUSTOMER); (I) NEITHER PARTY SHALL BE LIABLE FOR ANY INDIRECT, INCIDENTAL, SPECIAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES, OR ANY LOSS OF REVENUE, REPUTATION, PROFITS, DATA, OR DATA USE, OR THE COST OF PROCURING ANY SUBSTITUTE GOODS OR SERVICES; (II) EITHER PARTY’S MAXIMUM LIABILITY FOR ANY DAMAGES ARISING OUT OF OR RELATED TO THIS AGREEMENT, WHETHER IN CONTRACT OR TORT, OR OTHERWISE, SHALL IN NO EVENT EXCEED, IN THE AGGREGATE, THE TOTAL AMOUNTS ACTUALLY PAID OR PAYABLE TO COMPANY BY CUSTOMER IN THE TWELVE (12) MONTH PERIOD IMMEDIATELY PRECEDING THE EVENT GIVING RISE TO SUCH CLAIM. THIS LIMITATION OF LIABILITY IS CUMULATIVE AND NOT PER INCIDENT. FOR CLARITY, THE LIMITATIONS IN THIS SECTION DO NOT APPLY TO PAYMENTS DUE TO COMPANY UNDER THIS AGREEMENT.

12. Indemnification.
Company agrees to defend, at its expense, any third party action or suit brought against Customer alleging that the Software, when used as permitted under this Agreement infringes intellectual property rights of a third party (“IP Infringement Claim”); and Company will pay any damages awarded in a final judgment against Customer that are attributable to any such IP Infringement Claim, provided that (i) Customer promptly notifies Company in writing of such claim; and (ii) Customer grants Company the sole authority to handle the defense or settlement of any such claim and provides Company with all reasonable information and assistance in connection therewith, at Company’s expense. Company will not be bound by any settlement that Customer enters into without Company’s prior written consent. If the Software becomes, or in Company’s opinion is likely to become, the subject of an IP Infringement Claim, then Company may, at its sole discretion: (a) procure for Customer the right to continue using the Software; (b) replace or modify the Software to avoid the IP Infringement Claim; or (c) if options (a) and (b) cannot be accomplished despite Company’s reasonable efforts, then Company may terminate this Agreement and Company shall also provide a refund for any amount pre-paid by Customer for such returned Software for the remaining unused period of the license. Notwithstanding the foregoing, Company shall have no responsibility for IP Infringement Claims resulting from or based on: (i) modifications to the Software made by a party other than Company or its designee; (ii) Customer’s failure to implement software updates provided by Company specifically to avoid infringement; or (iii) combination or use of the Software with equipment, devices or software not supplied by Company or not in accordance with the Documentation. This Section ‎‎12 states Company’s entire liability, and Customer’s exclusive remedy, for any IP Infringement Claim.

13. Term and Termination.
This Agreement shall enter into force and effect on the Effective Date and shall remain in full force and effect for the subscription period specified in the executed ordering document (such as an order form, sales order, proposal, or quote) to which this Agreement is attached, hyperlinked, or otherwise incorporated by reference (“Term”), unless terminated earlier as set forth herein. Either Party may terminate this Agreement with immediate effect upon written notice if (a) the other Party materially breaches this Agreement and such breach remains uncured fifteen (15) days after having received written notice thereof; or (b) a receiver is appointed for the other Party, if the other Party makes a general assignment for the benefit of its creditors, or if the other Party commences proceedings under any bankruptcy or insolvency law. Upon termination or expiration of this Agreement: (i) the Software license granted to Customer under this Agreement shall expire, and Customer shall discontinue any further use thereof; (ii) Customer shall immediately delete and dispose of all copies of the Documentation in Customer’s or any of its representatives’ possession or control; and (iii) Company may delete all Customer Data. The provisions of this Agreement that, by their nature and content, must survive the termination of this Agreement in order to achieve the fundamental purposes of this Agreement shall so survive, including but not limited to Sections ‎‎9 and ‎‎11 The termination of this Agreement shall not limit Company from pursuing any other remedies available to it under applicable law.

14. Miscellaneous.
This Agreement, including the DPA (if applicable), and any exhibits attached or referred hereto, represents the entire agreement between the Parties concerning the subject matter hereof, replaces all prior and contemporaneous oral or written understandings and statements, and may be amended by the Company either by posting an updated draft of the Agreement on the Software or by otherwise notifying the Customer. Any such amendments will become effective upon posting or notification, and the Customer’s continued use of the Software constitutes acceptance of these amendments. Amendments must be mutually agreed upon in written form executed by both Parties for any changes not posted or notified as described above. The failure of either Party to enforce any rights granted hereunder or to take action against the other Party in the event of any breach shall not be deemed a waiver by that Party as to subsequent enforcement or actions in the event of future breaches. Any waiver granted hereunder must be in writing. If any provision of this Agreement is held by a court of competent jurisdiction to be illegal, invalid or unenforceable, the remaining provisions of this Agreement shall remain in full force and effect and such provision shall be reformed only to the extent necessary to make it enforceable. Any use of the Software by an agency, department, or other entity of the United States government shall be governed solely by the terms of this Agreement. Customer may not assign its rights or obligations under this Agreement without the prior written consent of Company.. Company may assign its right or obligations under this Agreement without consent. . Without derogating from and subject to the abovementioned, this Agreement will bind and benefit each Party and its respective successors and assigns. This Agreement shall be governed by and construed under the laws of the State of Israel, without reference to principles and laws relating to the conflict of laws. The competent courts of the city of Tel Aviv-Jaffa shall have the exclusive jurisdiction with respect to any dispute and action arising under or in relation to this Agreement. Notwithstanding the foregoing, each Party may seek equitable relief in any court of competent jurisdiction in order to protect its proprietary rights. Each Party irrevocably waives its right to trial of any issue by jury. This Agreement does not, and shall not be construed to create any relationship, partnership, joint venture, employer-employee, agency, or franchisor-franchisee relationship between the Parties. Neither Party has any authority to enter into agreements of any kind on behalf of the other Party. Company will not be liable for any delay or failure to provide the Services resulting from circumstances or causes beyond the reasonable control of Company including, but not limited to on account of strikes, shortages, riots, insurrection, fires, flood, storms, explosions, acts of God, war, government or quasi-governmental authorities actions, riot, acts of terrorism, earthquakes, explosions, power outages, pandemic or epidemic (or similar regional health crisis), or any other cause that is beyond the reasonable control of Company. Notices to either Party shall be deemed given (a) four (4) business days after being mailed by airmail, postage prepaid, (b) the same business day if dispatched by electronic mail and sender receives acknowledgment of receipt.