英語 での Security functions の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
The Juniper Networks Firewall/ IPSec VPN security devices are purpose-built to perform essential security functions.
PP security functionality The PP requests a TOE to implement(1) security functions specific to the services of Personal Number Cards, and(2) security functions commonly required for IC cards.
TOE security functions To defend assets to be protected in relation to the use of the above-mentioned basic functions, the TOE has the following security functions:- Hard disk accumulation data overwrite deletion function- Administrator authentication function. .
TOE security functions To defend assets to be protected in relation to the use of the above-mentioned basic functions, this TOE has the following security functions.- Hard disk accumulation data overwrite deletion function- Hard disk accumulation data encryption function. .
FSEG offers mechanisms that automatically distribute the required network configurations and security functions(security VNF(*1)), in accordance with the security policies established by network administrators.
Server performance, length of trial period, renewal price, data backup, choice of server locations, built-in security functions, and so on are some other important factors.
Furthermore, Tangerine provides security functions that companies need for any major beacon deployment, such as eco mode as well as measures to prevent beacon spoofing and unauthorized beacon use.
To address the market for IoT applications, all embedded solutions can be integrated with all types of wireless data acquisition solutions, WISE-PaaS software for manageability, security functions, and sensor-to-cloud connectivity solutions.
The technology has the potential to add considerable value to a wide variety of applications such as transaction printing and work requiring security functions, including check, ticket and direct mail production.
Tag Tamper functions refer to superior security functions, such as the protection of information written in chips and the detection of falsification caused by illegitimate attacks. They are effective for judging authentic and fake products.
On the SkyWay system, security functions such as user verification can also be implemented, but when I do it, it seems that stress is likely to accumulate, so I have not implemented it.
Records of access to personal information management systems are kept and managed for at least 6 months, and security functions are employed to prevent forgery, alteration, theft or loss of access records.
VASCO also secures access to data and applications in the cloud, and provides tools for application developers to easily integrate security functions into their web-based and mobile applications.
The TOE offers security functions to counter the threats to image data written into the HDD and the Flash Memory, which are non-volatile mass storage devices inside the MFD.
AAA, called Triple A, is an architectural framework for configuring a set of three independent, consistent, and modular security functions.
The device, which is designed to protect corporate systems from the entry of viruses, worms and other network- and application-level dangers, is the latest product to integrate several security functions into a single appliance.
The report also stated that the HongMeng software is compatible with all Android applications and has“increased security functions to protect personal data”.
This TOE is intended to provide security functions, when realizing requirements as stated above, such as authentication of users, access control, cryptographic communication, and securing of application independency.
According to the report, Huawei's in-house software is said to be compatible with all Android applications and has"increased security functions to protect personal data".
The TOE provides a function to permit the management operation of the disk array subsystem only for the account of the authorized administrator and a function to record events of the management operation in logs as the security functions.