Examples of using
访问管理
in Chinese and their translations into English
{-}
Political
Ecclesiastic
Programming
为了提高安全性并监控用户对公有云资源,如计算和API的访问,管理员可以使用联合身份和访问管理。
To increase security and monitor user access to public cloud resources such as compute and APIs,admins can use federated identity and access management.
Furthermore, learning institutions can usemobile apps to enable students easily access administrative functions such as registration, financial aid and student billing.
或者所有者可以使用S3策略和身份及访问管理用户和群组,允许有限的用户集访问。
Alternatively, owners can use S3 policies and Identity and Access Management users and groups to allow access to a limited set of users.
该报告称,“特权访问管理(PAM)是最关键的安全控制之一,特别是在当今日益复杂的IT环境中。
According to the report,“privileged access management is one of the most critical security controls, particularly in today's increasingly complex IT environment.
This tech will purportedly allow thecard holders to easily verify their identity and access administrative services.
理论上,可靠的身份和访问管理(IAM)系统是克服这一挑战的第一步也是最重要的一步。
In theory, a reliable Identity and Access Management(IAM) system is the first and most important step towards overcoming this challenge.
任何企业安全系统的配置都必须始于身份和访问管理(IAM),IAM控制用户对云资源的权限。
The configuration of any enterprisesecurity system must begin with identity and access management(IAM), which controls user permission to cloud resources.
这些服务是企业移动套件,它提供了身份和访问管理,以及基于云的设备,应用和更新管理的一部分。
These services are part of the Enterprise Mobility Suite,which provides identity and access management, and cloud-based device, application, and update management..
多年来,AWS已经添加了身份和访问管理、配置规则和其他策略控制,这些控制已成为云端的常见做法。
Over the years, AWS has added identity and access management, configuration rules and other policy controls that have become common practice in the cloud.
政府网络当局严格的数据保护政策是推动身份和访问管理解决方案市场增长的另一个主要因素。
Stringent policies by government cyber authorities to protect data are anothermajor factor driving the growth of identity and access management solution market.
身份和访问管理软件和统一威胁管理硬件将在所有这些类别中获得最大的份额。
Identity and access management software and unified threat management hardware will typically receive the greatest share of revenues in each of these categories.
Our broad megapixel cameras, access management solutions and open software can work with your current infrastructure to meet these requirements.
DACC是世界上第一个基于内容的区块链,它在基础结构级别上具有身份和访问管理(IAM)。
DACC is the world'sfirst content-based blockchain that features identity and access management(IAM) at the infrastructure level.
由于无服务器应用程序的设计,企业无法使用与之相同的加密或身份访问管理实践来保护它。
Because of a serverless application's design,enterprises can't secure it with the same encryption or identity access management practices they are used to.
Centrify's most recent survey, Privileged Access Management in the Modern Threatscape, found that 74% of all breaches involved access to a privileged account.
除了绝对的访问控制(即使数据丢失或被盗),其他功能也可以改善并促进访问管理。
Besides the absolute access control(even if data gets lost or stolen),additional features can improve and facilitate access management.
F5's comprehensive security solutions combine DNS security and DDoS protection,network firewall, access management, and application security with intelligent traffic management..
Azure Active Directory introduces security and access governance controls that enable you to centrally manage users'access across SaaS applications.
要了解有关使用策略限制用户对特定AWS资源的权限的信息,请参阅访问管理和示例策略。
To learn about using policies to restrict users' permissions to specific AWS resources,go to Access Management and Example Policies.
此外,严格控制谁拥有防火墙的带外管理访问权限,以及每个管理员允许从哪里访问管理功能。
Also, strictly enforce control over who has out-of-band management access to the firewall,and from where each administrator is allowed to access management functions.
对于SaaS,协议应侧重于软件和应用程序的访问管理。
And for SaaS, it should focus on the management of access to software and applications.
EoT will have a profound effect on an organization's infrastructure, including its network connectivity, VPN,identity access management, security infrastructure and management functions,” says Gold.
Microsoft Azure Active Directory is a comprehensive identity and access management cloud solution that combines core directory services,application access management, and advanced identity protection.
The segment is expected to adopt smart building solutions to attain energy and cost savings, higher productivity,enhanced identity and access management, and optimized surveillance.
Introduction A network management system contains: several(potentially many) nodes, each with a processing entity,termed an agent, which has access to management instrumentation;
A management system contains: several(potentially many) nodes, each with a processing entity,termed an agent, which has access to management instrumentation;
中文
Bahasa indonesia
日本語
عربى
Български
বাংলা
Český
Dansk
Deutsch
Ελληνικά
Español
Suomi
Français
עִברִית
हिंदी
Hrvatski
Magyar
Italiano
Қазақ
한국어
മലയാളം
मराठी
Bahasa malay
Nederlands
Norsk
Polski
Português
Română
Русский
Slovenský
Slovenski
Српски
Svenska
தமிழ்
తెలుగు
ไทย
Tagalog
Turkce
Українська
اردو
Tiếng việt