영어에서 Malicious attacks 을 사용하는 예와 한국어로 번역
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
Full encryption for cloud storage and network transfer, supports AES-256 encryption and self-encrypting drives(SED) to protect from malicious attacks and prevent data leak.
You will also not have to worry about other online dangers as the security software comes with a very useful feature that blocks all malicious attacks.
cloud services with intelligent software that overcomes unreliable networks, congestion, inefficient protocols and malicious attacks.
You need storage solutions that accelerate applications and databases, protect critical data against failures and malicious attacks, and can flexibly handle future requirements while lowering your overall costs. Integration.
The protected mode option is designed to keep you safe from intruders and malicious attacks but even the developers at Mozilla acknowledge that it may cause constant crashes and errors such as this one.
They are rapidly evolving malicious attacks on smart devices,
GCU has developed a suite of programmes which provide the opportunity to be at the forefront of defending cyberspace from sophisticated malicious attacks and future threats.
Natural disasters, malicious attacks, and even simple configuration problems like software conflicts can cripple services and applications until administrators resolve the problems and restore any backed up data.
Alibaba Cloud's built-in security features protect Worktile against intrusions, malicious attacks and ensure the safety of customers data storage which is safeguarded by identity
This may have been sufficient for operating successfully in the past, but the landscape is now changed, with an expanding mobile attack surface and growing occurrences of infected IoT devices launching malicious attacks.
Windows Server 2016 also helps to prevent malicious attacks against your system with a strengthened security suite that also detects any suspicious activity as a preventative measure.
distributed network of nodes, the system and the data are highly resistant to technical failures and malicious attacks.
The infrastructure handles more than 1 million packet inspections per second and analyses more than 2,000 rules while disabling malicious attacks in real time, without disrupting the user's operations.
The security offered by jNQ™ has become essential after the Wannacry and Petya cyber-attacks, which took advantage of the vulnerability of the older SMB dialects. Using SMB 3.1.1 is essential to prevent such malicious attacks by means of message signing, encryption, Active Directory
By using the Akamai Connector, Salesforce customers gain a streamlined way to connect their storefronts to Akamai's cloud security and web performance solutions, protecting sites, mobile infrastructures and API-driven requests from malicious attacks to help ensure experiences are both optimized and secured.
Malicious attack on PST file.
The virus, cyber threats, and malicious attack are the common causes.
There are various actions you can take to prevent the services in your video systems being used to carry out a malicious attack on your network.
If an access point detects a malicious attack, an incident will be generated by the access point and reports will be
Hardware-based security is needed to help protect FIDO from malicious attack.