Exemplos de uso de Security capabilities em Inglês e suas traduções para o Português
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Official/political
Our security capabilities include.
The new default settings,enhance security capabilities.
Extend physical security capabilities to virtual environments.
The Barcelona Report of the Study Group on Europe's Security Capabilities.
Root enhance security capabilities, the software run more secure.
You can register your web application to MobileFirst Server to add security capabilities to the application.
You will gain the most advanced security capabilities while taking away complexity that can slow you down.
The announcement of OpenManage Secure Enterprise Key Manager adds enterprise data security capabilities to OpenManage FlexSelect.
Learn how you can use Oracle Database's security capabilities to meet your compliance obligations and protect your data.
With incredible customer momentum towards AWS,we have been laser-focused on delivering security capabilities optimized for the cloud.
The new technology will not only deliver enhanced security capabilities but also increase the operational efficiency of the screening process.
As a true end-to-end solution, it includes data quality, data integration,business process management, and data security capabilities that enable you to.
NSX Cloud brings networking and security capabilities to endpoints across multiple clouds.
 This is done because some Lexmark devices ship with a hard drive or have other functional differences, which require additional security targets to validate the security capabilities of the device.
InfoQ: How does a service mesh support the security capabilities like authentication and authorization?
Valuable security capabilities proven to protect businesses, government agencies, educational institutions and non-profit organizations include.
Third-party validation assures customers that security capabilities protect the device as claimed by the manufacturer.
This is done because some Lexmark devices ship with a hard drive or have other functional differences,which require additional security targets to validate the security capabilities of the device.
Third-party validation assures customers that security capabilities protect the device as claimed by the manufacturer.
Southern Command(SOUTHCOM), through the Joint Interagency Task Force South, helps detect, monitor, andalert partners about narcotrafficking routes as well as strengthen security capabilities of partner nations.
You can now register web applications with MobileFirst Server to add security capabilities to your application and protect access to your web resources.
We deliver comprehensive security capabilities with our end-to-end advisory, implementation and managed services, combined with our deep expertise in securing the Microsoft ecosystem.
In this particular category,Gartner states that EPP“provides a collection of security capabilities to protect PCs, smartphones and tablets.
Intel builds hardware-enabled security capabilities directly into our silicon to help protect every layer of the compute stack hardware, firmware, operating systems, applications, networks, and the cloud.
We will continue to expand andupdate this information as we add new security capabilities and make security improvements to our products.
BT's continual investment in security capabilities across Latin America means customers who are growing business operations across this vast region can rely on even quicker detection and mitigation of security threats.
EPYCTM delivers a balanced architecture with unmatched compute, memory,I/O and security capabilities designed to accelerate your mission critical applications View Video.
HP ProtectTools Security Manager is a software application that adds an easy-to-use interface into the Microsoft® Windows® control panel allowing for access to the full breadth of HP security capabilities designed to help protect against… more info….
Should ransomware make it to your endpoint,there are several security capabilities you can employ to block it before you're forced to pay to recover your data.
Intel® Trusted Execution Technology for safer computing is a versatile set of hardware extensions to Intel® processors andchipsets that enhance the digital office platform with security capabilities such as measured launch and protected execution.