• Create consensus lists of issues and guidance for cloud security assurance.

    安全保障问题指导创建一致清单

    youdao

  • What I do see, though, is so many people trying to define a new cloud security frame-work.

    但是真正的问题在于有很多制定一种全新安全框架

    youdao

  • A cloud security policy focuses on managing users, protecting data, and securing virtual machines.

    安全策略主要关注用户管理数据保护虚拟保护。

    youdao

  • In addition, as business data continue to migrate to the cloud, cloud security has entered a new stage.

    此外随着企业业务数据不断上迁移,云安全进入了一个全新的阶段。

    youdao

  • The other fundamental concern in the cloud is around security. What can HP offer on the cloud security front?

    另外一个关于基本问题就是安全云安全方面惠普能够提供什么

    youdao

  • It is important to me that the Cloud Security Alliance's recommendations are being driven by leading practitioners.

    我来说安全联盟建议领先从业者来驱动重要

    youdao

  • Trend Micro has launched its virtualization and cloud security solutions, Deep security 8.0 and SecureCloud 2.0.

    趋势科技推出虚拟化安全解决方案:服务器深度安全防护8.0安全云2.0。

    youdao

  • In fact, cloud security is a topic that many vendors have addressed and present as a feature of their cloud offerings.

    实际上安全很多供应商致力于解决问题作为产品的一项特性

    youdao

  • Begin by taking a quick look at the current state of hacking to gain some insight into the mobile cloud security threat.

    我们快速一下目前黑客行为情况深入了解移动安全威胁

    youdao

  • Launch awareness campaigns and educational programs on the appropriate USES of cloud computing and cloud security solutions.

    发起恰当利用计算安全解决方案宣传活动教育计划

    youdao

  • Hangzhou signed Network Technology Co., Ltd. CEO Li Xuyang to electronic signature and cloud security, the title of speech.

    杭州文网络科技有限公司CEO李旭阳以《电子签名安全》为题发言。

    youdao

  • Additionally, Cross Site Scripting attacks against Web-based cloud control interfaces have severe repercussions for the overall cloud security.

    另外针对基于Web控制界面脚本攻击整个安全产生严重影响

    youdao

  • "Police departments across the U. S. are starting to drown in smart phone thefts, "says Tom Kemp, CEO of Centrify, a software and cloud security provider.

    软件安全服务提供商Centrify公司CEO汤姆姆指出:“全美各地的警察局几乎都被智能手机被盗的案子淹没了。”

    youdao

  • However, IDC believes that there is a still a gap between the security many end-user organisations need and the vendors' ability to provide cloud security.

    然而IDC认为供应商提供安全能力多数终端用户企业安全性需求之间存在差距。

    youdao

  • When discussing mobile cloud security threats, the primary concern is threats to smartphones and tablet platforms. These threats can be divided into three categories.

    讨论移动安全威胁的时候,主要关注的智能手机平板电脑平台的威胁。

    youdao

  • Finally, proposes a cloud security scheme based on the construction of digital campus, in order to solve security problems when carrying digital campus on a cloud.

    基于数字化校园建设提出一种计算安全解决方案解决数字化校园搭载在云上时所面临的安全问题

    youdao

  • Cloud service security can be threatened by poor credentials, protocol exposure, and implementation flaws in remote management.

    远程管理中的劣质凭证协议暴露实现缺陷都可能威胁服务安全性

    youdao

  • The log should show what type security problem a cloud service type had and when and how the problem was fixed.

    日志应该显示一个服务类型拥有何种类型的安全问题以及问题在何时如何修复的。

    youdao

  • However, as you will see in later parts of this series, cloud computing also raises questions of ownership, security, and cost.

    然而正如系列后面部分看到的,计算带来所有权安全成本方面的问题

    youdao

  • Many of these cloud services have good security, but prying hackers are relentless, so consumers should be careful about what they store in the cloud.

    许多服务安全性很高暗中窥探黑客毫不留情的,因此消费者应该小心保管他们存储云中的数据。

    youdao

  • You will also examine the significant security and governance issues that affect cloud computing.

    我们研究能够影响计算的安全管理方面重要问题。

    youdao

  • The issues of cloud computing are clear-with privacy and security being two of the most important.

    计算问题显而易见—其中重要两个问题保密性安全性

    youdao

  • Some argue that clouds are more secure than many private networks, while others consider that cloud computing may open more security holes.

    有些认为许多私有网络安全一些人则认为计算可能敞开更多安全漏洞。

    youdao

  • Of course, there must be global cooperation if the cloud computing process is to attain optimal security and general operational standards.

    当然如果计算达到最佳安全性一般运营标准,必须全球协作

    youdao

  • Most of the discussion about cloud computing has focused on tools, providers, economics, and security.

    计算讨论大多数集中工具提供商经济安全上。

    youdao

  • This article presented some of the issues that are pertinent for planning how to provide security for the mobile cloud.

    本文介绍了关于如何进行规划以便移动提供安全保障一些问题

    youdao

  • A carefully crafted security policy Outlines what cloud computing service consumers and providers should do; it can save providers many hours of management time if they develop a security policy.

    精心制定的安全策略应该描述计算服务使用者提供者应该做什么可以提供者减少很多管理时间

    youdao

  • The concern about security risk of cloud computing will greatly decrease once it is fully implemented and understood.

    一旦计算得以全面实施并且为公众所理解,关于安全风险顾虑大大减少

    youdao

  • In part 3, the final part of this series, you will examine the issues of governance and security that come with cloud computing.

    第3部分,即系列最后一部分了解计算中的治理安全问题

    youdao

  • In part 3, the final part of this series, you will examine the issues of governance and security that come with cloud computing.

    第3部分,即系列最后一部分了解计算中的治理安全问题

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定