As endpoint security learns from network security, and vice versa, threats can be identified and blocked at either control point.
作为端点安全学会从网络安全和反之亦然,威胁可以识别和阻止在任一控制点。
End-users are gradually moving to better-integrated multi-products, particularly in areas such as endpoint security and identity and access management.
最终用户将逐步采用更好地集成的多种产品,特别是在端点安全以及身份识别和接入管理等方面。
We will be at the meeting to share with you on the cloud, network, local and endpoint security methods, to help you understand how to protect the user and data everywhere.
我们将在会中与您分享关于云端、网络、本地及端点的安全防护方法,带您了解如何保护“身处各地”的用户与数据。
On this basis, the proposed campus network security solutions, focusing on network access control, endpoint security, protocol analysis and network security monitoring and other related technologies.
在此基础上,提出了校园网安全方案,重点介绍了网络访问控制、端点安全保护、协议分析和网络安全监控等相关技术。
Examples of metadata include interface descriptions, endpoint address, and policies covering service level agreements, security relationships, and so on.
元数据的示例包括接口描述、端点地址和涵盖服务级别协议、安全关系等的策略。
Security issues aside, such a change requires that a different endpoint be given to the sender, and that he be required to alter his client to use the new endpoint.
这时安全问题也出现了,这样的修改需要给发送者一个不同的端点,而且这样他就需要去更改他的客户端来使用新的端点。
The container uses the proxy to wrap the actual endpoint in order to provide services such as transactions and security.
容器使用代理来包装实际的端点,以便提供事务和安全性这样的服务。
An SOA programming model must ensure that each service invocation adheres to security policies that are valid for both the requester and service endpoint.
SOA编程模型必须确保每个服务调用都符合对请求者和服务端点均有效的安全策略。
SSL security can be used for establishing communications inbound from (and outbound to) an endpoint.
SSL安全可用于建立来自端点的入站通信和指向端点的出站通信。
This architecture provides something of a combination of the features of the gateway as SSL endpoint architecture and the simple WS-Security architecture. It provides the following.
此体系结构提供网关作为ssl端点的体系结构和简单WS - Security体系结构的综合特性。
Figure 5 shows an architecture using transport security with Web Services Gateway acting as SSL endpoint.
图5显示了通过将Web服务网关作为ssl端点实现传输安全的体系结构。
You don't need to by extra XML security hardware just to lock down the basics of an endpoint.
你不需要额外使用XML安全硬件,只需要锁定端点的基本信息就可以。
The tunnel endpoint is the tunneling computer closest to the IP traffic destination, as specified by the security rule's IP filter list.
隧道终结点是最接近IP通讯目标的隧道操作计算机,正如安全规则的IP筛选器列表所指定的。
This Client offers Endpoint policy Enforcement for monitoring the centrally specified security policy.
此客户端提供端点政策执行监测中心指定的安全策略。
Use this property to specify the endpoint address and binding to use when contacting your local Security Token Service.
使用这个属性,即可指定要在连络本机安全性权杖服务时使用的端点位址和系结。
For it operations administrators who manage endpoint protection, it provides a unified view into the configuration and security of the endpoints, as such it 'operationalizes' security.
IT运营管理人员谁管理的端点保护,它提供了一个到配置和端点的安全统一的看法,因此它付诸实施的安全。
Generates a security token using the system and the specified endpoint, policy, token issuer, and token serializer.
使用系统和指定之端点、原则、权杖签发者及权杖序列化程序,产生安全性权杖。
The paper provides the security from the following 3 ways: authentication provided, network protection and endpoint protection.
从接入认证、网络各层的防护以及端点保护三个方面对软交换提供了安全的保障。
These distinct threats require layered protection and intelligent security at the endpoint.
为了防御这些与众不同的威胁,需要在端点采用分层防护和智能防护技术。
These distinct threats require layered protection and intelligent security at the endpoint.
为了防御这些与众不同的威胁,需要在端点采用分层防护和智能防护技术。
应用推荐