英語 での To securely access の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Set a password that can be used to securely access the admin console recommended.
Having a dedicated IP for your site allows installing your ownSSL certificate to enable site users to securely access via HTTPS.
This allows you to securely access and stream content from anywhere in the world.
Every day millions of people in more than 100 countries use our products andservices to securely access physical and digital places.
Partners need to be able to securely access meetings from any location at any time.
If you frequently use public or untrusted computers,the Portable option is an ideal way to securely access your LastPass Vault.
The ability to securely access and monitor your network and maintain performance is critical.
Allow our technical support experts to securely access your PC over the Internet.
Compatible with Windows, Mac, Linux, iOS and Android platforms, the solution includes configurable synchronization options that let users control where data is replicated, and integration with Microsoft Office andemail applications that allow users to securely access and share files.
Allow end users to securely access and manage their data stored on Google Drive or Dropbox.
The Youtube Kids application wasdeveloped specifically for children who will use it to securely access their favorite cartoons and documentaries, music videos.
The solution enables Etisalat's management to securely access its head office and facilities with a single tap of a mobile phone on a contactless reader. The new app reflects Etisalat's commitment to innovation and to bringing convenience to modern, smart cities.
Reduced administration and maintenance through an easy-to-useweb-based administration console enabling IT administrators to securely access the application anywhere, anytime.
You face ID can also be used to securely access a private screen containing locked APPs and personal data.
If you are in a country where expressing your opinion is strictly monitored, you can connect to a VPN and select a server of a country with less orno internet restrictions to securely access the websites and express your thoughts freely.
The 1 solution for leading enterprises to securely access and support any device or system, anywhere in the world.
Colt's IP portfolio offers a premium andcomprehensive set of managed network services to securely access all kind of customer sites, clouds and the Internet.
We enable users around the world to securely access hundreds of applications and cloud services from any of their devices.
Acronis Files Advanced: FAQ| Knowledge Base Acronis Files Advanced enables enterprise employees using any device- desktop, laptop,tablet or smartphone- to securely access, sync and share corporate content while IT maintains control over security and compliance.
HDE Secure Browser enables you to securely access cloud services federated with HDE One, using your HDE One account.
Acronis Files Advanced: FAQ| Knowledge Base Acronis Files Advanced enables enterprise employees using any device- desktop, laptop,tablet or smartphone- to securely access, sync and share corporate content while IT maintains control over security and compliance.
Acronis Files Advanced enables educational institutions to securely access, sync and share content while maintaining control over security and compliance.
Secure guest access means allowing visitors(vendors, partners, consultants-visitors of any kind)a way to securely access the internet and/or local network resources services over the wireless or wired network.
It enables government agencies to provide their mobile users to securely access, sync and share corporate content while maintaining control over security and compliance.
Acronis Files Advancedenables financial organizations to provide their users to securely access, sync and share content while maintaining control over security and compliance.
Employees, customers, vendors,and service providers at each company will be able to securely access that company's private blockchain via strong cryptographically authenticated transactions.
You can use the policies to allow users from different AWS accounts to securely access your API or to permit the API to be invoked only from specified source IP address ranges or CIDR blocks.