영어에서 Enterprise threat 을 사용하는 예와 한국어로 번역
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
Akamai Enterprise Threat Protector is such a service.
The column chart on the left shows the longer-term enterprise threat trends going back up to 30 days.
Enterprise Threat Protector can handle the work that multiple people on my team used to perform.
That describes the value we get from Enterprise Threat Protector and the experts within Akamai.
Enterprise Threat Protector is a cost-effective security solution that can be installed and setup in minutes.
A library of technical information regarding how to configure Enterprise Threat Protector and its features.
Learn more about Enterprise Threat Protector by reading the product brief.
Because people expect to work from anywhere, a solution like Enterprise Threat Protector is essential.
A high-level overview of Enterprise Threat Protector features and benefits. Download Now.
Some examples of malware and command and control(CnC) communications detected by Akamai Enterprise Threat Protector.
Enterprise Threat Protector is quick and easy to setup and install, and can be successfully deployed in less than 10 minutes.
Financial Vertical: A leading financial services firm chooses Enterprise Threat Protector as an additional layer of security framework.
Enterprise Threat Protector delivers proactive protection against malware at one of the most commonly used attack vectors: the DNS layer.
Leading financial services firm chooses Enterprise Threat Protector for an additional layer of security framework. Read the Case Study.
Cranfield University adds a simple yet effective DNS security layer to its network with Akamai Enterprise Threat Protector.
In February 2018, Akamai introduced Topcon to Enterprise Threat Protector(ETP), one of their threat protection products.
Or Katz is a principal lead security researcher at Akamai and is the head of research for Akamai's Enterprise Threat Protector technology.
Side Note: Customers with Akamai's Enterprise Threat Protector(ETP) are shielded from this URL, as it already exists in our system.
The threat map shows the geographic location of where a user request is being made from and the intended geographic destination location if the request had not been blocked by Enterprise Threat Protector.
Using Akamai Enterprise Threat Protector, Daniel's security team now has an intuitive dashboard that allows them to identify potential security problems.
Europe-based manufacturing company improves their security posture by utilizing Enterprise Threat Protector to check all external recursive DNS traffic and requested domains.
Akamai's roadmap for Enterprise Threat Protector is of keen interest to Daniel's group, and they believe they have selected the right partner for the future.
Customer Stories: A European customer improves their security posture by utilizing Enterprise Threat Protector to check all external recursive DNS traffic and requested domains.
Enterprise Threat Protector proactively identifies, blocks, and mitigates targeted threats such as malware, ransomware, phishing, DNS data exfiltration, and advanced zero-day attacks.
Customer Stories: Learn how a prominent online retailer utilizes Enterprise Threat Protector to block command and control requests related to instances of Locky ransomware and more.
Enterprise Threat Protector uses multiple layers of protection- DNS, URL, and inline payload analysis- to deliver optimal security and reduced complexity, without impacting performance.
Customer Stories: A family-friendly entertainment venue utilizes Enterprise Threat Protector to secure free wi-fi from phishing and malware threats and create a new Acceptable Use Policy.
The quick start guide provides guidance on how to configure and monitor DNS activity to identify and block threats, such as malware, phishing, DNS data exfiltration, and command and control communication using Enterprise Threat Protector.
Implementing Enterprise Threat Protector allowed Kaizen Platform to fully grasp the reality of the security threats and breaches on their network, which had not been possible with previous analysis reports.
Family-friendly entertainment venue utilizes Enterprise Threat Protector to secure free wi-fi from phishing and malware threats and create a new Acceptable Use Policy. Read the Case Study.