These authorized rules have considered the user attribute and the enterprise security policy.
这些授权规则考虑了用户属性和企业安全策略。
For this reason, ObjectGrid also possesses the ability to integrate with other enterprise security software.
由于这个原因,ObjectGrid还具有与其他企业安全性软件集成的功能。
One key factor that prevents widespread adoption of IPMI is its lack of support for enterprise security protocols.
一个阻碍广泛使用IPMI的关键因素是缺少对企业安全协议的支持。
Enterprise security policies might be considered part of the conformance dimension, but security is often a complex cultural issue.
企业安全策略可能作为一致性维度的一部分,但安全性常常是一个复杂的文化问题。
Integrated security features including authentication and authorization support integrated with existing enterprise security infrastractures
集成的安全特性包括对认证和授权的支持并与现有的企业安全基础设施相集成。
Above that so many on the brand value can bring the benefits of enterprise, enterprise Security does look at what is the value of the brand?
上面说了那么多关于品牌价值可以带给企业的益处,那究竟安防企业又是怎样看待品牌价值的呢?
Initially, it shows typical EA disciplines, such as enterprise security and systems management, which are also key SOA implementation aspects.
刚开始时,它显示了典型的ea规则,例如企业安全和系统管理,它通常是关键的SOA实施方面。
The management vacancy and the hidden danger darkly become the foundational factor which influences the work result of the enterprise security management.
管理缺位、隐患暗存成为影响企业安全管理工作成效的基础性因素。
As we discussed earlier, enterprise security products, such as Tivoli Access Manager, are typically designed to solve sets of classes of authorization problems.
正如我们前面所讨论的,TivoliAccessManager之类的企业安全产品通常设计用于解决一系列授权问题。
What neither SAML nor XACML provide is an infrastructure to deliver and manage security services; it is up to the enterprise security vendor to provide this.
SAML和XACML 都没有提供用于交付和管理安全服务的基础设施;需由企业安全供应商提供此基础设施。
Encryption and signing are the basis for most enterprise security implementations, so check back to see how you can apply these features in your own web services.
加密和签名是大多数企业安全实现的基础,回顾一下这些特性,看看如何在您自己的Web服务中应用它们。
Organize enterprise security management, it management, and risk management functions to promote efficient exchange of information and leverage corporate knowledge.
组织企业的安全管理,信息技术管理以及风险管理功能,以提高信息的有效交换及企业知识的提升。
The agreement covers enterprise security and calls for support of information technology services that improve awareness of emerging cyber threats and network intrusions.
该协议涵盖企业安全,并呼吁支持信息技术服务,对新出现的网络威胁和网络入侵提高认识。
This article through to the railroad enterprise security culture's essence understood that with the significance analysis, proposed the feasible construction countermeasure.
本文通过对铁路企业安全文化的本质理解和意义分析,提出了可行性的建设对策。
Unlike other access control solutions, K-WEB does not compromise building or enterprise security by placing access panels on the Web, and it requires no monthly access fees.
与其他出入口控制的解决方案不同,K -WEB不会将观察板放在网络上危害建筑物或企业的安全,而且它不要求月接入费。
In this way, an identity can be authenticated and mapped appropriately between the source and target applications while still being consistent with an enterprise security model.
通过这种方式,可以对标识进行身份验证,并在源和目标应用程序之间相应地映射,同时仍然与企业安全模型保持一致。
To predict the development trend of the building safe trouble, for drawing up enterprise security policy and safe early warning control system , has important reference meaning.
预测建筑安全事故的发展趋势,为制定企业安全政策和安全预警控制系统具有重要的参考意义。
Prove what this text design the whole set of way and standard of the enterprise security evaluation of the road conveyance have stronger possibility and maneuverability as a result.
结果证明,本文所设计的整套道路运输企业安全评价办法和标准具有较强的可行性和可操作性。
Econolite’s StrongPoint network security appliance was recently the subject of an ITS network vulnerability assessment and penetration test performed by Sword & Shield Enterprise Security.
美国Econolite公司开发的StrongPoint网络安全装置最近接受了Sword&Shield企业安全公司的智能交通系统(ITS)易损性评估和渗透性试验。
The majors such as Public Security Administration, Property Administration, Fire - fighting, Enterprise Security Supervising, Civil Guard, Public Security Product Productions and Sales.
相应设置社会公共安全管理,物业安全管理,消防、企业安全监督、民用护卫、公共安全产品生产与营销等专业。
It is designed to handle the growing demands of enterprise security architecture by using updated cutting-edge analysis and correlation features that were not present in the previous products.
它是专门通过使用最新的前缘分析和相关性分析特性来处理快速增长的企业安全性架构需求,而这些特性是以前的产品所不具备的。
From the current point of view, their vulnerability to operating system of many enterprises has been neglected, leading to hackers, malware swoop, caused serious harm to enterprise security.
从目前来看,很多企业一直忽略的操作系统自身漏洞,导致黑客、恶意程序趁虚而入,给企业安全造成了严重危害。
You should also be aware of existing enterprise components, such as security mechanisms, business process and business rules engines, workflow engines, and packaged applications.
您还应该了解现有的各种企业组件,如安全机制、业务流程和业务规则引擎、工作流引擎和打包的应用程序。
One of the key challenges of enterprise systems is properly implementing strong system security controls.
企业系统的主要挑战之一就是恰当地实现强系统安全控制。
In particular, it examined access to enterprise data, privacy and security concerns, and some lightweight development tools.
特别是,其中研究了企业数据访问、隐私和安全顾虑,以及某些轻量级开发工具。
Base services can be implemented to integrate with common enterprise components that support workflow, security, and audit logging.
基本服务可以与支持工作流、安全性和审计日志记录的通用企业组件集成。
Security gaps throughout the enterprise because of non-secured assets.
由于没有安全资产,安全缺口存在于整个企业。
The EJB container relieves developers from managing common enterprise functions such as security, transaction handling, connection pooling, and external resource management.
ejb容器使开发人员不必管理常见的企业功能,如安全性、事务处理、连接合用和外部资源管理。
Plan enterprise architecture and deployment with security in mind.
依照安全的理念,规划企业的架构和部署。
Proxy servers are commonly used for content caching, Internet connectivity, security, and enterprise content filtering.
代理服务器通常被用作内容缓存,因特网连接,安全,以及企业内容过滤。
应用推荐