영어에서 Malicious activity 을 사용하는 예와 한국어로 번역
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
This registrar locking may still leave your domain name vulnerable to the type of malicious activity seen this week.
Next-Generation Intrusion Prevention System(NGIPS), and Meraki MX& can detect malicious activity associated with this threat.
Suspected TEMP. Veles incidents include malicious activity originating from 87.245.143.140, which is registered to CNIIHM.
Next-Generation Intrusion Prevention System(NGIPS), and Meraki MX& can detect malicious activity associated with this threat.
Parallels RAS contributes to securing corporate assets from data leakage and malicious activity with highly granular permission policies, combined with SSL and FIPS 140-2 encryption as well as multi-factor and smart card authentication.
We automatically scan and may manually filter messages to check for spam, viruses, phishing attacks and other malicious activity or illegal or prohibited content.
Deploying Parallels RAS reduces the risk of data loss and malicious activity by preventing access to applications and data based on location, device and configurable Client Policies.
Most importantly, you will master rigorous defensive programming techniques, so you can use any language to create software that protects itself from malicious activity and defects.
All of this is designed to give your site visitors the best user experience possible and keep your site's data secure from malicious activity.
These connected devices use new protocols, present new ways to hide malicious activity and generate more noise that must be accurately filtered to identify true threats.
Malicious Activity means any manipulations of Binary's systems
McAfee Behavioral Analytics alerts you to risky employee and device behavior and other malicious activity, often invisible to other security solutions, that can put your data and systems at risk.
CloudSOC protects sensitive customer information and documents stored in your Dropbox account from data loss due to accidental or malicious activity – both by employees and external hackers.
The goal is to detect attack signals in the sea of DNS data, and validate known attack types while simultaneously detecting new, unknown and unnamed malicious activity.
McAfee Behavioral Analytics supports broad use cases, helping you detect behavior and malicious activity that can put your data and systems at risk.
accesses a site within a 24 hour period, we will also filter out bad-bot and malicious activity from the count.
file hashes, network signatures, and YARA rules provided and add the IPs to their watchlist to determine whether malicious activity has been observed within their organization.
threat intelligence at NTT Security, noted that most medical devices in use today would be secure,“only in a closed, trusted environment without any potentially malicious activity.".
Security- Foursquare uses cookies, local storage and similar technologies to support or enable security features we have deployed, and to help us detect malicious activity and violations of our Terms of Service.
For example, should a malicious email bypass security and an employee inadvertently clicks the included link, Enterprise Threat Protector recognizes that the target domain is associated with known or suspected malicious activity and actively blocks the request.