Host -based intrusion -prevention system (HIPS ) technology protects endpoints behind the network perimeter .
基于主机的入侵防护系统(HIPS)技术保护网络边界…
In recent years, as organizations have linked with suppliers, customers, and business partners, the network perimeter has dissolved and the notion of external versus internal threats has blurred.
近些年来,随着各企业与供应商、客户和业务合作伙伴的联系日益紧密,网络边界逐渐消失,外部和内部威胁的概念日渐融为一体。
This paper protests that primary work of network security should change from perimeter protection to direct information protection.
本文提出将网络安全工作的重心,由边界安全保护转变到直接针对信息的安全保护。
Internal clouds reside within an organizations network security perimeter and external clouds reside outside the same perimeter.
内部云存在于组织的网络安全边界之内,外部云存在于网络安全边界之外。
Internal clouds reside within an organizations network security perimeter and external clouds reside outside the same perimeter.
内部云存在于组织的网络安全边界之内,外部云存在于网络安全边界之外。
应用推荐