What is the translation of " HARDWARE-BASED ENCRYPTION " in Spanish?

cifrado basado en hardware
encriptación basada en hardware

Examples of using Hardware-based encryption in English and their translations into Spanish

{-}
  • Colloquial category close
  • Official category close
Use hardware-based encryption to keep data secure.
Utilice cifrado basado en hardware para proteger los datos.
Secures files with powerful hardware-based encryption.
Protege los archivos con una potente solución de cifrado basada en hardware.
Hardware-based encryption- Fully self-contained protection.
Encriptación basada en hardware- Protección totalmente independiente 2.
Encryption iphone andipad offer hardware-based encryption.
Cifrado El iphone yel ipad ofrecen cifrado por hardware.
Hardware-based encryption- Fully self-contained protection 2.
Cifrado basado en el hardware- Protección totalmente integrada 2.
Help protect important data with automatic full-system backup,SafetyDrill+ bare metal recovery software and powerful hardware-based encryption.
Ayuda a proteger los datos importantes con la copia de seguridad automática completa,software de restauración completa SafetyDrill+ y potente cifrado basado en hardware.
Configure use of hardware-based encryption for fixed data drives.
Configurar el uso de cifrado basado en hardware para unidades de datos fijas.
In hardware-based encryption and decryption units, the cryptographic calculations are performed in a protected environment inside the hardware.
En las unidades de cifrado y descifrado basadas en hardware, los cálculos criptográficos se realizan en un entorno protegido dentro del hardware.
In March, Kingston introduces the first fully secure,100% privacy USB drive with 128-bit hardware-based encryption and later in the year, 256-bit hardware encryption..
En marzo Kingston presenta el primerdispositivo USB totalmente seguro, con 100% de privacidad con encriptación basada en hardware de 128 bits, y posteriormente en el año, con cifrado de hardware de 256 bits.
End-to-end data protection using 256-bit AES Hardware-based encryption and support for TCG Opal 2.0 security management solutions allows the usage of independent software vendors such as Symantec, McAfee, WinMagic and others.
La protección de datos de extremo a extremo, usando encriptación AES de 256 bits basada en hardware, y el soporte para soluciones de administración de seguridad TCG Opal 2.0. permiten el uso de proveedores de software independiente tales como Symantec, McAfee, WinMagic y otros.
In March, Kingston introduces the first fully secure,100% privacy USB drive with 128-bit hardware-based encryption and, later in the year, 256-bit hardware encryption..
En marzo, Kingston presenta la primera unidad USB totalmente segura,un 100% de garantía de privacidad y una tecnología de cifrado de 128 bits basada en hardware, y más tarde en ese año,de 256 bits.
The use of hardware-based encryption and a proprietary algorithm can thwart especially perfidious cyberattacks involving activities such as infiltrating and spying on computer networks by means of masquerading, manipulating and eavesdropping on classified data and planting malware.
El uso del cifrado basado en hardware y un algoritmo propio pueden frustrar los ataques cibernéticos especialmente pérfidos, que involucran actividades tales como la infiltración y el espionaje en redes de computadoras mediante el enmascaramiento, la manipulación y el espionaje de datos clasificados y la instalación de malware.
UV500 provides end-to-end data protection using the advanced 256-bit AES Hardware-based encryption and support for Trusted Computing Group(TCG) Opal 2.0 as required by security platforms.
La UV500 proporciona protección de datos de extremo a extremo, usando la avanzada encriptación AES de 256 bits basada en hardware, y soporte por parte del Trusted Computing Group(TCG) Opal 2.0. como lo requieran las plataformas de seguridad.
Configure use of hardware-based encryption for operating system drives.
Configurar el uso de cifrado basado en hardware para unidades de sistema operativo.
Designed for secure data connections and to give added value significantly higher than its predecessor,with an efficiency 5 times higher than encryption and hardware-based integrated habilitable through an image of Cisco IOS optional.
Diseñados para conexiones de datos seguras y para dar valor añadido significativamente mayor que su predecesor,con un rendimiento 5 veces superior y encriptación basada en hardware integrada habilitable a través de una imagen de Cisco IOS opcional.
Results: 15, Time: 0.0403

How to use "hardware-based encryption" in a sentence

First, hardware based encryption requires onboarding special hardware.
There are SSDs that support hardware based encryption too.
Which of the following is a hardware based encryption device?
They offer hardware based encryption to prevent unauthorized tampering with the data.
Does it also support the hardware based encryption of the LTO4 format?
FIPS Certified Hardware based encryption design validated to FIPS 140-2 (certification number 1471).
There are 15 Chapters to deeply display the global Hardware Based Encryption Market.
Softlock Secure Data Storage Solution provides a hardware based encryption methods for data security.
This is a hardware based encryption protocol and will provide the best test results.
Softlcok Secure Data Exchange Solution provides a hardware based encryption methods for data security.

Word-for-word translation

Top dictionary queries

English - Spanish