Examples of using Encrypted access in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
Encrypted access, data, and backups.
SSH gives you secure and encrypted access to your server.
Encrypted access and unblock websites.
Data security due to encrypted access with user name and password.
Encrypted access to administrative functions.
Authorisation levels and a configuration option for consistently encrypted access.
Easy and encrypted access to your work and storage area.
The trucks of the future will provide forwarders with encrypted access to vehicle data at all times.
Simpler and encrypted access to your processing and storage area.
You can alsoset multiple security options such as encrypted access, IP filtering, and IP blocking.
Encrypted access(VPN) to programs, data and printers in the VPN network from home or on the move.
The TVS-EC1080 provides numerous security options, such as encrypted access, IP blocking, and so on.
Encrypted access on the move or from your home office to programs, data and printers in the VPN network.
For this, a fast Internet connection and encrypted access to the company's internal network are required.
From the technical perspective, there are two steps in the authentication process for encrypted access to the WLAN.
Remote Access Service provides encrypted access to programs, data and printers in the VPN network from home or on the move.
Further information term4clientTM Inter-departmental and transnational, as well as encrypted access to company technology on KERN's German servers.
Firstly, the secure, encrypted access from personal devices to the company's network, supported by strong authentication and a suitably adapted ICT security strategy.
The IS-453S provides numerous security options, such as encrypted access, IP blocking, and other protective features.
The encrypted access protects system connections and communications, the IP blocking helps prevent suspicious users, and the external drive encryption reduces the risk of data stealing in case of thief of hard drives.
TheTS-470U-SP provides numerous security options, such as encrypted access, IP blocking, and other protective features.
The TS-EC1679U-SAS-RP provides numerous security options, such as encrypted access, IP blocking, and so on. Besides, IT administrators can control the access rights of each user to different folders, preventing unauthorized access to important files.
The TS-228A is loaded with comprehensive security features such as 2-step authentication, encrypted access, IP filtering/blocking and anti-virus.
This means Tiger Usenetcustomers can now enjoy secure, encrypted access to usenet with an improved level of privacy and anonymity.
The software VPN(virtual private network)client from LANCOM provides mobile coworkers with high-security encrypted access to the company network- nationwide and abroad.
Through a secured registration procedure, the user receives encrypted access to the KROMI network and to his individual consumption figures.
The LANCOM Advanced VPNClient provides field staff with high-security encrypted access to the company network-nationwide and abroad.
Data is encrypted and access to it is secured.
Data transfer is encrypted and access to data is protected.
Encrypted external access(VPN) to the network for your employees.