云业务,就其天性而言,会使得自己处于安全业务的位置。
The cloud business, by its very nature, puts them in the security business.
今年几起严重的客户和雇员资料泄漏事件使得管理者们匆忙仔细检查他们复杂的信息系统和业务流程,以寻找可能存在的安全隐患。
Several massive leakages of customer and employee data this year have left managers hurriedly peering into their intricate IT systems and business processes in search of potential vulnerabilities.
每个数据源必须有确定的管理人(业务角色)负责数据的精确性、完整性和安全性。
Every data source must have a defined custodian (a business role) responsible for the accuracy, integrity, and security of that data.
服务的其他实现决策不同于业务功能包括:服务的安全、管理和监视。
Other realization decisions for services other than business functionality include: security, management and monitoring of services.
归根结底,需要什么安全级别是一个业务决策,而不是技术决策。
Ultimately, the level of security that is required is a business decision, not a technical one.
这些强大的安全特性对于许多业务数据交换都至关重要,但是它们在处理开销方面会增加成本。
These powerful security features are essential for many types of business data exchange, but they do come with a cost in terms of added processing overhead.
请记住,业务逻辑和安全数据应该在服务器上进行维护。
Keep in mind that business logic and secure data should be maintained on the server.
在服务请求者和每个所需的业务服务之间安全通信的能力。
The ability to securely communicate between the service requestor and each required business service.
惠普计划力推自行开发的应用,李艾科将业务分析和安全这两个领域列为该公司关注的重心。
HP plans on pushing its own applications, and Apotheker singled out business analytics and security as two areas on which the company will focus.
大多数“白帽”安全顾问都同意,在任何业务中,总是存在盗窃的机会。
Most "white hat" security consultants will agree that in every business there are always ways someone could steal.
安全威胁正在不断快速演变,让自己凌驾于这些威胁之上,确保每一位客户的数据安全是云业务的职责所在。
Security threats are evolving at a rapid pace, and cloud businesses make it their job to stay on top of them and ensure the safety of every customer's data.
即便CSP将变更流程记录在案,包括安全审核、业务压力可能也会在管理上驱使虚拟化无时延实施,而延时则是变更管理固有的特征。
Even if a CSP has documented change processes, including security reviews, business pressure might drive management to force virtual implementations without the delays inherent in change management.
解决方案必须安全,但业务合作伙伴对需要自己进行大量工作和需要持续进行密码维护的解决方案不感兴趣。
The solution had to be secure, but business partners were not interested in a solution that required a great deal of work for them or that would require their ongoing effort to maintain the passwords.
在前面的示例中,使用SSL的决策可能由业务安全需求驱动,因此应在这里引用。
In the previous example, the decision to use SSL is likely driven by business security requirements, and thus they should be referenced here.
业务流程和策略管理组件使用了下面的安全组件,以实现它对业务应用程序的安全职责。
The business process and policy management component USES the following security components to fulfill its security obligations to the business applications.
您还应该了解现有的各种企业组件,如安全机制、业务流程和业务规则引擎、工作流引擎和打包的应用程序。
You should also be aware of existing enterprise components, such as security mechanisms, business process and business rules engines, workflow engines, and packaged applications.
这些包协同工作以简化与SOA中的业务服务相关联的业务、技术、安全、治理和流程互操作性问题。
These packs work together to simplify the business, technology, security, governance and process interoperability issues associated with business services in an SOA.
业务策略在同一个时间跨越所有作用范围,如安全性、业务过程、总体架构和操作策略。
Where the business policy spans subject areas like security, business process, overall architecture and operational policies all at the same time.
这一层可以看作业务安全服务与IT 安全服务之间的链接,它包括策略管理和分发等领域。
This tier can be thought of as the link between business security services and IT security services and includes areas such as policy administration and distribution.
必须在SOA生命周期中考虑到soa安全性,并反映安全性是业务需求而不只是技术特性的事实。
SOA security must be factored into the SOA life cycle, reflecting the fact that security is a business requirement and not just a technology attribute.
法则要求它们关闭各类高毛利中心,专注于相对安全和低毛利的业务。
The rule forces them to shut down a variety of high margin profit centers and focus on safer, lower margin businesses.
不久之前,安全握手是双方的业务得以实现的一个标记。
Not too long ago, a secure handshake was the sign that business between two parties was going to be on sound footing.
添加可定制的业务逻辑引擎来执行实体验证、业务和安全规则。
Adds customizable business rules engine to enforce entity validation, business and security rules.
“这是向商界发出的响亮信息:醒醒吧,现实不完全是皆大欢喜、善行和新业务,”安全公司RSA副总裁萨姆·克里(SamCurry)表示。
"This is a loud message for the commercial world, which is wake up, this isn't all happiness and goodness and new business," said Sam Curry, vice-president of security firm RSA.
业务应用程序和安全基础设施。
“传统的”安全影响(业务连续性、灾难恢复、物理安全)。
"Traditional" security impact (business continuity, disaster recovery, physical security).
验证数据集市设计没有违背任何业务安全性设置。
Verify that the data mart design does not violate any business security Settings.
大多数遵从性需求(但不是全部)都涉及信息安全性和相关的业务风险。
Most of the compliance requirements (but not all) involve information security and the associated business risk.
大多数遵从性需求(但不是全部)都涉及信息安全性和相关的业务风险。
Most of the compliance requirements (but not all) involve information security and the associated business risk.
应用推荐