对云安全保障的问题和指导,创建一致的清单。
Create consensus lists of issues and guidance for cloud security assurance.
云安全策略主要关注用户管理、数据保护和虚拟机保护。
A cloud security policy focuses on managing users, protecting data, and securing virtual machines.
对我来说,云安全联盟的建议由领先的从业者来驱动很重要。
It is important to me that the Cloud Security Alliance's recommendations are being driven by leading practitioners.
发起恰当利用云计算和云安全解决方案的宣传活动和教育计划。
Launch awareness campaigns and educational programs on the appropriate USES of cloud computing and cloud security solutions.
但是真正的问题在于有很多人想要制定一种全新的云安全框架。
What I do see, though, is so many people trying to define a new cloud security frame-work.
本文还会讨论移动云安全的深入问题,也会提到开发人员的机遇。
Future issues for securing the mobile cloud are also discussed, and opportunities for developers are noted.
春风依然沉睡在深山幽谷之中。玫瑰似的轻云安详地挂在空中。
Breezes are still sleeping in the deep and quiet valley. Rosy light clouds are standing quietly in the sky.
我们先快速看一下目前黑客行为的情况,深入了解移动云安全威胁。
Begin by taking a quick look at the current state of hacking to gain some insight into the mobile cloud security threat.
另外一个关于云的基本问题就是安全,在云安全方面,惠普能够提供什么?
The other fundamental concern in the cloud is around security. What can HP offer on the cloud security front?
此外,随着企业业务数据不断往云上迁移,云安全也进入了一个全新的阶段。
In addition, as business data continue to migrate to the cloud, cloud security has entered a new stage.
杭州文签网络科技有限公司CEO李旭阳以《电子签名与云安全》为题发言。
Hangzhou signed Network Technology Co., Ltd. CEO Li Xuyang to electronic signature and cloud security, the title of speech.
当讨论移动云安全威胁的时候,主要关注的是对智能手机和平板电脑平台的威胁。
When discussing mobile cloud security threats, the primary concern is threats to smartphones and tablet platforms. These threats can be divided into three categories.
另外,针对基于Web的云控制界面的跨站脚本攻击会对整个云安全产生严重的影响。
Additionally, Cross Site Scripting attacks against Web-based cloud control interfaces have severe repercussions for the overall cloud security.
实际上,云安全是很多供应商在致力于解决的一个问题,并将其作为云产品的一项特性。
In fact, cloud security is a topic that many vendors have addressed and present as a feature of their cloud offerings.
趋势科技已推出了虚拟化及云安全解决方案:服务器深度安全防护8.0和安全云2.0。
Trend Micro has launched its virtualization and cloud security solutions, Deep security 8.0 and SecureCloud 2.0.
然而,IDC认为,供应商提供云安全能力与多数终端用户企业对安全性的需求之间还存在着差距。
However, IDC believes that there is a still a gap between the security many end-user organisations need and the vendors' ability to provide cloud security.
法云安缦位于杭州市郊区,占地14公顷,共有住所47处,周围由茶园、自然森林和苍翠茂密的竹林所包围。
Situated on 14 hectares on the outskirts of Hangzhou, the resort is comprised of 47 dwellings surrounded by tea fields, natural forest and lush groves of bamboo.
这是关于“中国大陆广东省云浮市云安县镇安镇永丰村委覃青”邮政编码的网页,以及详细地区信息和在线地图。
This is a page about postal code of "Zhen An Zhen Yong Feng Cun Wei Qin Qing , Yun'an County, Yunfu City, Guangdong Province, China", with area information and online map.
对于云交付模型,使用者对部署的应用程序、操作系统、硬件、软件、存储和网络的控制能力不同,这会影响云安全策略。
It is influenced by how much control a consumer can have over deployed applications, operating systems, hardware, software, storage and networking for a cloud delivery model.
该联盟准备在即将召开的RSA数据安全展示会议上进行首次亮相。云安全联盟成立的目的是为了在云计算环境下提供最佳的安全方案。
The alliance, which plans to make its first big splash at the upcoming RSA Conference, was formed to promote security best practices in a cloud computing environment.
软件与云安全服务提供商Centrify公司的CEO汤姆•坎姆指出:“全美各地的警察局几乎都被智能手机被盗的案子给淹没了。”
"Police departments across the U. S. are starting to drown in smart phone thefts, "says Tom Kemp, CEO of Centrify, a software and cloud security provider.
以可视化的形式展示企业的云安全管理情况,直观的体现出企业在云安全管理方面的优势和不足,帮助客户将资源利用最大化,改进运营效率,降低成本。
A visual representation of the status of a business and instantly highlights where the strengths, weaknesses, allowing clients to maximize resources, improve operational efficiencies and reduce costs.
以可视化的形式展示企业的云安全管理情况,直观的体现出企业在云安全管理方面的优势和不足,帮助客户将资源利用最大化,改进运营效率,降低成本。
A visual representation of the status of a business and instantly highlights where the strengths, weaknesses, allowing clients to maximize resources, improve operational efficiencies and reduce costs.
应用推荐