Create consensus lists of issues and guidance for cloud security assurance.
对云安全保障的问题和指导,创建一致的清单。
What I do see, though, is so many people trying to define a new cloud security frame-work.
但是真正的问题在于有很多人想要制定一种全新的云安全框架。
A cloud security policy focuses on managing users, protecting data, and securing virtual machines.
云安全策略主要关注用户管理、数据保护和虚拟机保护。
In addition, as business data continue to migrate to the cloud, cloud security has entered a new stage.
此外,随着企业业务数据不断往云上迁移,云安全也进入了一个全新的阶段。
The other fundamental concern in the cloud is around security. What can HP offer on the cloud security front?
另外一个关于云的基本问题就是安全,在云安全方面,惠普能够提供什么?
It is important to me that the Cloud Security Alliance's recommendations are being driven by leading practitioners.
对我来说,云安全联盟的建议由领先的从业者来驱动很重要。
Trend Micro has launched its virtualization and cloud security solutions, Deep security 8.0 and SecureCloud 2.0.
趋势科技已推出了虚拟化及云安全解决方案:服务器深度安全防护8.0和安全云2.0。
In fact, cloud security is a topic that many vendors have addressed and present as a feature of their cloud offerings.
实际上,云安全是很多供应商在致力于解决的一个问题,并将其作为云产品的一项特性。
Begin by taking a quick look at the current state of hacking to gain some insight into the mobile cloud security threat.
我们先快速看一下目前黑客行为的情况,深入了解移动云安全威胁。
Launch awareness campaigns and educational programs on the appropriate USES of cloud computing and cloud security solutions.
发起恰当利用云计算和云安全解决方案的宣传活动和教育计划。
Hangzhou signed Network Technology Co., Ltd. CEO Li Xuyang to electronic signature and cloud security, the title of speech.
杭州文签网络科技有限公司CEO李旭阳以《电子签名与云安全》为题发言。
Additionally, Cross Site Scripting attacks against Web-based cloud control interfaces have severe repercussions for the overall cloud security.
另外,针对基于Web的云控制界面的跨站脚本攻击会对整个云安全产生严重的影响。
"Police departments across the U. S. are starting to drown in smart phone thefts, "says Tom Kemp, CEO of Centrify, a software and cloud security provider.
软件与云安全服务提供商Centrify公司的CEO汤姆•坎姆指出:“全美各地的警察局几乎都被智能手机被盗的案子给淹没了。”
However, IDC believes that there is a still a gap between the security many end-user organisations need and the vendors' ability to provide cloud security.
然而,IDC认为,供应商提供云安全能力与多数终端用户企业对安全性的需求之间还存在着差距。
When discussing mobile cloud security threats, the primary concern is threats to smartphones and tablet platforms. These threats can be divided into three categories.
当讨论移动云安全威胁的时候,主要关注的是对智能手机和平板电脑平台的威胁。
Finally, proposes a cloud security scheme based on the construction of digital campus, in order to solve security problems when carrying digital campus on a cloud.
基于数字化校园的建设,提出一种云计算安全的解决方案。以解决当数字化校园搭载在云上时所面临的安全问题。
Cloud service security can be threatened by poor credentials, protocol exposure, and implementation flaws in remote management.
远程管理中的劣质凭证、协议暴露和实现缺陷都可能会威胁云服务安全性。
The log should show what type security problem a cloud service type had and when and how the problem was fixed.
日志应该显示一个云服务类型拥有何种类型的安全问题,以及该问题是在何时和如何修复的。
However, as you will see in later parts of this series, cloud computing also raises questions of ownership, security, and cost.
然而,正如您在本系列后面的部分看到的,云计算也带来了所有权、安全与成本方面的问题。
Many of these cloud services have good security, but prying hackers are relentless, so consumers should be careful about what they store in the cloud.
许多云服务的安全性都很高,但暗中窥探的黑客是毫不留情的,因此消费者应该小心保管他们存储在云中的数据。
You will also examine the significant security and governance issues that affect cloud computing.
我们还将研究能够影响云计算的安全与管理方面的重要问题。
The issues of cloud computing are clear-with privacy and security being two of the most important.
云计算的问题显而易见—其中最重要的两个问题是保密性和安全性。
Some argue that clouds are more secure than many private networks, while others consider that cloud computing may open more security holes.
有些人认为云比许多私有网络要安全,另一些人则认为云计算可能敞开了更多的安全漏洞。
Of course, there must be global cooperation if the cloud computing process is to attain optimal security and general operational standards.
当然,如果云计算要想达到最佳的安全性和一般运营标准,就必须有全球协作。
Most of the discussion about cloud computing has focused on tools, providers, economics, and security.
对云计算的讨论大多数集中在工具、提供商、经济和安全上。
This article presented some of the issues that are pertinent for planning how to provide security for the mobile cloud.
本文介绍了关于如何进行规划以便为移动云提供安全保障的一些问题。
A carefully crafted security policy Outlines what cloud computing service consumers and providers should do; it can save providers many hours of management time if they develop a security policy.
精心制定的安全策略应该描述云计算服务的使用者和提供者应该做什么;它可以让提供者减少很多管理时间。
The concern about security risk of cloud computing will greatly decrease once it is fully implemented and understood.
一旦云计算得以全面实施,并且为公众所理解,关于其安全风险的顾虑会大大减少。
In part 3, the final part of this series, you will examine the issues of governance and security that come with cloud computing.
在第3部分,即本系列的最后一部分,您将了解云计算中的治理和安全问题。
In part 3, the final part of this series, you will examine the issues of governance and security that come with cloud computing.
在第3部分,即本系列的最后一部分,您将了解云计算中的治理和安全问题。
应用推荐