• Host -based intrusion -prevention system (HIPS ) technology protects endpoints behind the network perimeter .

    基于主机入侵防护系统HIPS技术保护网络边界

    youdao

  • In recent years, as organizations have linked with suppliers, customers, and business partners, the network perimeter has dissolved and the notion of external versus internal threats has blurred.

    近些年来,随着各企业供应商客户业务合作伙伴联系日益紧密网络边界逐渐消失,外部内部威胁概念日渐融为一体。

    youdao

  • The specific type of security zone we will create is a perimeter network.

    我们创建特定类型安全区域一个周边网络

    youdao

  • However, there are several drawbacks to deploying MIS in a perimeter network.

    不过,在周边网络部署MIS存在若干弊端

    youdao

  • This paper protests that primary work of network security should change from perimeter protection to direct information protection.

    本文提出将网络安全工作重心边界安全保护转变直接针对信息的安全保护。

    youdao

  • Internal clouds reside within an organizations network security perimeter and external clouds reside outside the same perimeter.

    内部存在组织网络安全边界之内外部云存在于网络安全边界之外

    youdao

  • Internal clouds reside within an organizations network security perimeter and external clouds reside outside the same perimeter.

    内部存在组织网络安全边界之内外部云存在于网络安全边界之外

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定