Examples of using Protect data in English and their translations into Korean
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
Home→ Tag: protect data.
Protect data on removable media.
Posts Tagged‘protect data'.
Protect data for next-generation applications.
Google security expert teams protect data from external threats.
People also translate
Protect data from external and internal threats.
Assess your security program, manage your risk, simplify your audit profile, and protect data.
Protect data on removable media such as CDs, DVDs, and USB flash drives.
Akamai also works with data security standards that protect data at rest/in storage.
Protect data send by network through encrypt key value which is compare to entered key value.
We take steps to protect the privacy of our customers and protect data stored within the platform.
Protect data in the cloud, from the cloud with cloud access security broker(CASB) technology.
HDD+SD card record(support 2.5”1TB HDD and128GB SD card)shockproof design protect data lost from shock&dust;
Protect data in motion with encrypted vMotion across different vCenter instances and versions.
POLARIS uses zero-knowledge proof and asymmetric cryptography techniques to secure anonymity and protect data.
Protect data: 51 percent of organizations believe they will be able to protect data more efficiently.
Military-grade security technologies, including SELinux, prevent intrusions and protect data when running in public or private OpenStack clouds.
So you can help protect data wherever it lives on your devices- without affecting your user experience.
This is especially useful when it comes to policy implementation on public networks that get a lot of traffic, but that still need to maintain security and protect data.
Detect threats, control access, protect data, and enable fast recovery for a secure hybrid IT environment.
From private, public, and hybrid cloud environments,our solutions enable better visibility into cloud workloads, protect data in the cloud, and ensure consistent policy enforcement.
Processes, and policies that protect data in our systems have successfully completed an SAS 70 Type II audit.
Backed by its unrivaled Global Threat Intelligence, McAfee creates innovative products that empower home users, businesses, the public sector, andservice providers by enabling them to prove compliance with regulations, protect data, prevent disruptions, identify vulnerabilities, and continuously monitor and improve their security.
Encryption protocols protect data when it's at rest or travelling across the network, but it's vulnerable at other times as well.
Flexible role-based administration allows you to efficiently and cost-effectively protect data by administering usage and encryption policies, password restrictions and more from a central console.
Protect data, lower infrastructure costs and simplify disaster recovery(DR) operations and management in remote DR sites with little or no local IT staff.
The DSM not only creates, stores and manages the encryption keys that protect data, it also enables organizations to manage every aspect of their Vormetric data security platform implementation.
Protect data reliably: in this module, you will find out everything you need to know about device installations and topologies, protective circuits, and protective devices.
File and removable media protection is encryption software that helps protect data stored on file shares, removable media, and cloud storage services such as Box, Dropbox, Google Drive, and Microsoft OneDrive.
Automated analysis and 24/7 monitoring proactively protect data from performance and security problems, enabling engineers to resolve issues before they affect the front line.
