• The paper provides the security from the following 3 ways: authentication provided, network protection and endpoint protection.

    接入认证网络各层的防护以及端点保护三个方面软交换提供安全的保障。

    youdao

  • For it operations administrators who manage endpoint protection, it provides a unified view into the configuration and security of the endpoints, as such it 'operationalizes' security.

    IT运营管理人员管理端点保护提供了一个配置端点安全统一看法,因此它付诸实施的安全。

    youdao

  • Endpoint protection requires quick analysis of threats in real time: evaluating files based on their attributes (static), how they behave (dynamic) and their global context (reputation).

    端点保护需要快速分析实时威胁基于评价文件及其属性(静态),他们行为方式(动态)全局上下文(名誉)。

    youdao

  • They aim to protect everything at the endpoint by treating everything with equal risk, resulting in excessive complexity and ineffective protection.

    他们目的保护所有终点治疗具有同等风险从而导致过度的复杂性无效的保护。

    youdao

  • These distinct threats require layered protection and intelligent security at the endpoint.

    为了防御这些与众不同的威胁需要端点采用分层防护智能防护技术。

    youdao

  • These distinct threats require layered protection and intelligent security at the endpoint.

    为了防御这些与众不同的威胁需要端点采用分层防护智能防护技术。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定