Effective Date: December 30, 2025 | Version 1.0
Vyuhxti Threat Intelligence Platform
Effective Date: December 30, 2024 Version: 1.0
This End User License Agreement ("Agreement") is a legal agreement between you (either an individual or a single entity, "Licensee," "you," or "your") and Vyuhnet Technologies Private Limited ("Licensor," "we," "us," or "our") for the use of the Vyuhxti Threat Intelligence Platform software, including any associated documentation, updates, and services (collectively, the "Software").
BY INSTALLING, COPYING, ACCESSING, OR OTHERWISE USING THE SOFTWARE, YOU ACKNOWLEDGE THAT YOU HAVE READ, UNDERSTOOD, AND AGREE TO BE BOUND BY THE TERMS OF THIS AGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS, DO NOT INSTALL OR USE THE SOFTWARE.
1.1 "Software" means the Vyuhxti Threat Intelligence Platform, including all features, modules, APIs, user interfaces, documentation, and any updates or upgrades provided by Licensor.
1.2 "Threat Intelligence Data" means vulnerability information, threat actor profiles, indicators of compromise (IOCs), CVE data, and other security-related information provided through the Software.
1.3 "Third-Party Data Sources" means data obtained from external sources including but not limited to NIST National Vulnerability Database (NVD), CISA Known Exploited Vulnerabilities (KEV), MITRE ATT&CK Framework, and AlienVault Open Threat Exchange (OTX).
1.4 "Authorized Users" means individuals who are employees, contractors, or agents of Licensee who have been granted access to the Software under this Agreement.
1.5 "Subscription Term" means the period during which Licensee is authorized to use the Software as specified in the applicable order form or subscription agreement.
2.1 Grant of License. Subject to the terms and conditions of this Agreement, Licensor grants Licensee a limited, non-exclusive, non-transferable, revocable license to:
(a) Install and use the Software for Licensee's internal business purposes;
(b) Allow Authorized Users to access and use the Software;
(c) Generate reports and analyses using the Software for internal security operations;
(d) Integrate the Software with Licensee's existing security infrastructure.
2.2 Subscription Tiers. The scope of the license may vary based on the subscription tier purchased:
2.3 MSSP Usage. Licensees with an MSSP subscription may:
(a) Deploy the Software to serve multiple client organizations;
(b) Generate and distribute threat intelligence reports to clients;
(c) Integrate the Software into managed security services offerings.
3.1 Prohibited Activities. Licensee shall NOT:
(a) Sublicense, sell, resell, rent, lease, or distribute the Software to third parties except as expressly permitted under an MSSP license;
(b) Modify, adapt, translate, reverse engineer, decompile, disassemble, or create derivative works of the Software;
(c) Remove, alter, or obscure any proprietary notices, labels, or marks on the Software;
(d) Use the Software for any unlawful purpose or in violation of any applicable laws or regulations;
(e) Use the Software to develop a competing product or service;
(f) Share login credentials or allow unauthorized access to the Software;
(g) Attempt to gain unauthorized access to any systems or networks connected to the Software;
(h) Use the Software to conduct attacks, unauthorized penetration testing, or any malicious activities;
(i) Redistribute raw threat intelligence data as a standalone commercial product;
(j) Misrepresent the source or attribution of threat intelligence data.
3.2 Compliance with Laws. Licensee shall use the Software in compliance with all applicable laws, regulations, and industry standards, including but not limited to data protection laws, export control regulations, and cybersecurity regulations.
4.1 Data Source Acknowledgment. The Software incorporates threat intelligence data from multiple third-party sources. Licensee acknowledges and agrees that:
(a) NIST National Vulnerability Database (NVD): CVE data is provided by NIST and is in the public domain. This product uses data from the NVD API but is not endorsed or certified by NIST.
(b) CISA Known Exploited Vulnerabilities (KEV): KEV data is provided by the Cybersecurity and Infrastructure Security Agency and is in the public domain.
(c) MITRE ATT&CK Framework: Threat actor techniques and tactics data is provided under the Apache License 2.0. ATT&CK is a registered trademark of The MITRE Corporation.
(d) AlienVault Open Threat Exchange (OTX): Threat pulse data and IOCs are provided under the Apache License 2.0. OTX is a trademark of AT&T Cybersecurity.
4.2 Attribution Requirements. When using or redistributing threat intelligence derived from the Software, Licensee shall:
(a) Maintain appropriate attribution to original data sources;
(b) Not imply endorsement by any third-party data provider;
(c) Comply with any additional attribution requirements specified in the documentation.
4.3 Third-Party Terms. Licensee's use of Third-Party Data Sources is subject to the terms and conditions of those third parties. Licensor is not responsible for changes to third-party data availability or terms.
5.1 No Guarantee of Completeness. THE SOFTWARE AND THREAT INTELLIGENCE DATA ARE PROVIDED FOR INFORMATIONAL PURPOSES ONLY. LICENSOR DOES NOT GUARANTEE THAT:
(a) The threat intelligence data is complete, accurate, or current;
(b) All vulnerabilities, threats, or threat actors have been identified;
(c) The Software will detect or prevent all security incidents;
(d) Threat actor profiles are exhaustive or fully accurate;
(e) CVE severity scores or exploitation status are definitive.
5.2 Supplementary Tool. THE SOFTWARE IS INTENDED TO SUPPLEMENT, NOT REPLACE, LICENSEE'S EXISTING SECURITY MEASURES. LICENSEE REMAINS SOLELY RESPONSIBLE FOR:
(a) Implementing appropriate security controls;
(b) Conducting independent verification of critical security decisions;
(c) Maintaining comprehensive security programs;
(d) Responding to security incidents;
(e) Compliance with applicable security standards and regulations.
5.3 Rapidly Evolving Threat Landscape. Licensee acknowledges that:
(a) The cybersecurity threat landscape changes rapidly;
(b) New vulnerabilities and threats may emerge between data updates;
(c) Historical threat data may not reflect current threat actor activity;
(d) Attribution of threat actors involves uncertainty.
6.1 Exclusion of Damages. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL LICENSOR BE LIABLE FOR:
(a) Any indirect, incidental, special, consequential, or punitive damages;
(b) Any loss of profits, revenue, business, data, or goodwill;
(c) Any security breaches, data breaches, or cyber attacks experienced by Licensee;
(d) Any damages arising from reliance on threat intelligence data;
(e) Any damages arising from information not included in the Software;
(f) Any damages resulting from third-party data source errors, omissions, or unavailability;
(g) Any damages arising from Licensee's failure to implement appropriate security measures.
6.2 Liability Cap. LICENSOR'S TOTAL CUMULATIVE LIABILITY UNDER THIS AGREEMENT SHALL NOT EXCEED THE FEES PAID BY LICENSEE FOR THE SOFTWARE DURING THE TWELVE (12) MONTHS IMMEDIATELY PRECEDING THE CLAIM.
6.3 Essential Basis. THE LIMITATIONS SET FORTH IN THIS SECTION SHALL APPLY REGARDLESS OF WHETHER THE ALLEGED BREACH OR DEFAULT IS A BREACH OF A FUNDAMENTAL CONDITION OR TERM, OR A FUNDAMENTAL BREACH, AND NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF ANY LIMITED REMEDY.
6.4 Acknowledgment. LICENSEE ACKNOWLEDGES THAT THE FEES REFLECT THE ALLOCATION OF RISK SET FORTH IN THIS AGREEMENT AND THAT LICENSOR WOULD NOT ENTER INTO THIS AGREEMENT WITHOUT THESE LIMITATIONS ON ITS LIABILITY.
7.1 Licensee Indemnification. Licensee shall defend, indemnify, and hold harmless Licensor and its officers, directors, employees, agents, and affiliates from and against any claims, damages, losses, liabilities, costs, and expenses (including reasonable attorneys' fees) arising out of or related to:
(a) Licensee's use of the Software;
(b) Licensee's violation of this Agreement;
(c) Licensee's violation of any applicable laws or regulations;
(d) Any security incident occurring on Licensee's systems;
(e) Any claim that Licensee's use of the Software infringed a third party's rights;
(f) Licensee's redistribution of threat intelligence data in violation of this Agreement.
7.2 Indemnification Procedure. Licensor shall promptly notify Licensee of any claim subject to indemnification, cooperate with Licensee in the defense, and allow Licensee to control the defense and settlement.
8.1 "AS IS" Provision. THE SOFTWARE AND ALL THREAT INTELLIGENCE DATA ARE PROVIDED "AS IS" AND "AS AVAILABLE" WITHOUT WARRANTY OF ANY KIND.
8.2 Disclaimer of Warranties. LICENSOR EXPRESSLY DISCLAIMS ALL WARRANTIES, WHETHER EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE, INCLUDING BUT NOT LIMITED TO:
(a) IMPLIED WARRANTIES OF MERCHANTABILITY;
(b) FITNESS FOR A PARTICULAR PURPOSE;
(c) NON-INFRINGEMENT;
(d) ACCURACY, COMPLETENESS, OR RELIABILITY;
(e) UNINTERRUPTED OR ERROR-FREE OPERATION;
(f) SECURITY OR FREEDOM FROM VIRUSES.
8.3 Third-Party Data. LICENSOR MAKES NO REPRESENTATIONS OR WARRANTIES REGARDING THIRD-PARTY DATA SOURCES AND DISCLAIMS ALL LIABILITY FOR ERRORS, OMISSIONS, OR CHANGES IN SUCH DATA.
9.1 Licensor Ownership. Licensor retains all right, title, and interest in and to the Software, including all intellectual property rights. This Agreement does not transfer any ownership rights to Licensee.
9.2 Feedback. Any feedback, suggestions, or improvements provided by Licensee regarding the Software shall become the property of Licensor without any obligation to Licensee.
9.3 Third-Party Components. The Software may include open-source components subject to their respective licenses. A list of such components and their licenses is available in the LICENSES file included with the Software.
10.1 Term. This Agreement is effective upon Licensee's acceptance and continues for the Subscription Term unless terminated earlier.
10.2 Termination for Breach. Either party may terminate this Agreement if the other party materially breaches this Agreement and fails to cure such breach within thirty (30) days of written notice.
10.3 Termination for Convenience. Either party may terminate this Agreement for any reason upon sixty (60) days' prior written notice.
10.4 Effect of Termination. Upon termination:
(a) All licenses granted hereunder shall immediately terminate;
(b) Licensee shall cease all use of the Software;
(c) Licensee shall destroy all copies of the Software in its possession;
(d) Sections 5, 6, 7, 8, 9, 11, and 12 shall survive termination.
11.1 Confidential Information. Each party agrees to maintain the confidentiality of the other party's confidential information and not to disclose it to third parties without prior written consent.
11.2 Exclusions. Confidential information does not include information that:
(a) Is or becomes publicly available through no fault of the receiving party;
(b) Was known to the receiving party prior to disclosure;
(c) Is independently developed by the receiving party;
(d) Is received from a third party without restriction.
12.1 Governing Law. This Agreement shall be governed by and construed in accordance with the laws of India, without regard to conflicts of law principles.
12.2 Dispute Resolution. Any disputes arising under this Agreement shall be resolved through binding arbitration in Bangalore, India, in accordance with the Arbitration and Conciliation Act, 1996.
12.3 Entire Agreement. This Agreement constitutes the entire agreement between the parties regarding its subject matter and supersedes all prior agreements and understandings.
12.4 Amendment. This Agreement may only be amended by a written instrument signed by both parties.
12.5 Waiver. No waiver of any provision of this Agreement shall be effective unless in writing and signed by the waiving party.
12.6 Severability. If any provision of this Agreement is held invalid or unenforceable, the remaining provisions shall continue in full force and effect.
12.7 Assignment. Licensee may not assign this Agreement without Licensor's prior written consent. Licensor may assign this Agreement in connection with a merger, acquisition, or sale of all or substantially all of its assets.
12.8 Notices. All notices under this Agreement shall be in writing and sent to the addresses specified in the order form or subscription agreement.
12.9 Force Majeure. Neither party shall be liable for any failure or delay in performance due to causes beyond its reasonable control, including acts of God, natural disasters, war, terrorism, riots, embargoes, acts of civil or military authorities, fire, floods, or strikes.
12.10 Export Compliance. Licensee shall comply with all applicable export control laws and regulations in connection with its use of the Software.
For questions regarding this Agreement, please contact:
Vyuhnet Technologies Private Limited Legal Department Email: legal@vyuhxti.ai Website: https://vyuhxti.ai
BY CLICKING "I ACCEPT" OR BY INSTALLING, COPYING, OR OTHERWISE USING THE SOFTWARE, YOU ACKNOWLEDGE THAT YOU HAVE READ THIS AGREEMENT, UNDERSTAND IT, AND AGREE TO BE BOUND BY ITS TERMS AND CONDITIONS.
Last Updated: December 30, 2024