Examples of using Hardware-based in English and their translations into Russian
{-}
-
Official
-
Colloquial
Hardware-based 256-bit AES encryption in XTS mode.
Server redundancy for hardware-based Intercom Servers.
Hardware-based encryption- Fully self-contained protection.
Of Android phones running Nougat or higher use hardware-based lock screen verification.
Hardware-based capability registers, implementing a one-way privilege separation model.
In September, Kingston announced new DataTraveler Elite USB drives, with hardware-based security encryption.
Proven hardware-based encryption using Advanced Encryption Standard(AES) 256.
In any case,it is sometimes impossible to avoid the need for true(i.e., hardware-based) random number generators.
With hardware-based VPN engines, it supports and manages a large number of VPN configurations.
In a follow-up study, Ponemon compared the total cost of ownership of software versus hardware-based full disk encryption solutions.
Hardware-based keyloggers are more difficult to install and detect, as they require physical access to the computer system.
This edition of the Best Practice piece covers the differences between hardware-based and software-based encryption used to secure a USB drive.
In hardware-based encryption and decryption units, the cryptographic calculations are performed in a protected environment inside the hardware.
Sandvine is unique in its ability to have both its traditional, proprietary hardware-based PTS and its PTS Virtual Series support the same requirements in the network.
Hardware-based data encryption and authentication for IPSec, PPTP, and L2TP in Client/Server mode enable fast and safe handling of VPN traffic.
This will be pursued in particular through the development of software- and hardware-based solutions to guarantee the secure exchange of ETOs on the Internet.
Video path technology and hardware-based video watermarking technology fully meet the requirements of the latest MovieLabs for ultra-high-quality content transmission.
In March, Kingston introduces the first fully secure,100% privacy USB drive with 128-bit hardware-based encryption and, later in the year, 256-bit hardware encryption.
Hardware-based password authentication that limits the number of consecutive wrong password attempts by locking the devices when the maximum number of wrong attempts is reached.
Kingston's ultra-secure encrypted USB Flash drives,DataTraveler 4000G2 and DataTraveler Vault Privacy 3.0, feature 256-bit AES hardware-based encryption utilising XTS block cipher mode.
In addition, hardware video acceleration such as hardware-based iDCT computation, ProcAmp(video stream independent color correction), and VC-1 decoding are not implemented in hardware.
Enterprise network environments that have a large number of network segments anda wide range of performance requirements might need a variety of hardware-based routers to perform different roles throughout the network.
Offering hardware-based assets on the receipt of credits, executing of authorization of cards, payment settlement with the issuing bank, acceptance of money on the trade account of seller ect.
According to the Bitgo co-founder, andCEO Mike Belshe, the team is very excited to announce a partnership with Ledger to combine the benefits of Bitgo's multisignature enterprise wallet with Ledger's hardware-based key storage.
A key management service may employ softwareor hardware-based key stores in order to create, assign and manage the relevant authentication and encryption keys across the enterprise.
While lower-end NAS generally rely on embedded Linux distributions and Linux logical volume management(LVM) for RAID control, higher-end SMB NAS andmost enterprise NAS will feature discrete hardware-based RAID controllers.
A faster, fully hardware-based multiplier makes instructions such as MUL and IMUL several times faster(and more predictable) than in the 80486; the execution time is reduced from 13-42 clock cycles down to 10-11 for 32-bit operands.
UV500 provides end-to-end data protection using the advanced 256-bit AES Hardware-based encryption and support for Trusted Computing Group(TCG) Opal 2.0 as required by security platforms.
Features/specs on reverse>>> Affordable, business-grade security> Supports SafeConsole1 management> FIPS 140-2 Level 3 certified and TAA compliant> Customizable to meet specific internal corporate IT requirements>SuperSpeed(USB 3.0) technology Kingston's DataTraveler 4000 G2 offers affordable business-grade security with 256-bit AES hardware-based encryption in XTS mode, to safeguard 100 percent of confidential data.
If you are using a software or hardware-based cryptographic service provider(CSP) to protect the AD RMS cluster key, you should import this key container before joining the server to an AD RMS cluster.