It is designed to handle the growing demands of enterprise security architecture by using updated cutting-edge analysis and correlation features that were not present in the previous products.
它是专门通过使用最新的前缘分析和相关性分析特性来处理快速增长的企业安全性架构需求,而这些特性是以前的产品所不具备的。
This means that customers of the BlackBerry enterprise solution can maintain confidence in the integrity of the security architecture without fear of compromise.
这意味着黑莓手机企业方案的用户不必担心妥协,在安全结构的整体结构中仍可保持隐私。
Plan enterprise architecture and deployment with security in mind.
依照安全的理念,规划企业的架构和部署。
For too long, information security has been considered a separate discipline, isolated from the enterprise architecture.
长久以来,信息安全一直被认为是一门单独的学科,孤立于企业架构之外。
RIM has spent over a decade building a very strong security architecture to meet our enterprise customers' strict security requirements around the world.
RIM公司历经十数年研发创造出迎合全球企业用户最高安全需求的强大安全结构。
Also, in an enterprise context, you might design the architecture around implementing an external security application, such as Tivoli Access Manager.
另外,在企业上下文中,您可以围绕实现外部安全应用程序(如TivoliAccess Manager)设计体系结构。
Augmenting the architecture of Enterprise Web 2.0 with manageability attributes adds configurability, fault resistance, the ability to measure performance, security enforcement, and more.
为EnterpriseWeb 2.0体系结构增加可管理性属性,这样做可以添加可配置性、抗故障能力、性能度量能力、安全强制,以及其他更多功能。
You model domain architecture views, such as Applications, Infrastructure, Networks, and Security, by creating ABBs to describe enterprise-critical system composition and behavioral patterns.
通过创建ABB以描述企业关键系统组成与行为性的模式,您可以为域架构视图建模,例如应用、基础设施(Infrastructure)、网络和安全。
So the article presents the new architecture of Enterprise Security Management Center based on log mining which is distributed and supports multi-protocol. It is extensible, reusable and migratory.
为此,本文对企业安全管理方法和机制进行了研究,提出了一种新型的、分布式的、支持多种协议的企业安全管理框架,即基于日志挖掘的企业安全管理中心。
So the article presents the new architecture of Enterprise Security Management Center based on log mining which is distributed and supports multi-protocol. It is extensible, reusable and migratory.
为此,本文对企业安全管理方法和机制进行了研究,提出了一种新型的、分布式的、支持多种协议的企业安全管理框架,即基于日志挖掘的企业安全管理中心。
应用推荐