영어에서 Security controls 을 사용하는 예와 한국어로 번역
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
There's a deluge of Internet of Things(IOT) devices rushed to market without proper security controls.
The CSIRT may also provide proactive services, offering assistance to IT and security personnel in order to improve an organization's security controls and processes.
AWS makes available a wide range of materials to help customers understand the AWS environment and security controls.
The improvement is part of ongoing efforts to strengthen the effectiveness of security controls in Windows.
This standard provides controls and implementation guidance for information security controls applicable to the provision and use of cloud services.
This information will enable you to focus your security controls on the areas most likely to be leveraged and reduce the risk of infection.
extensive security controls are in place to ensure account security. .
Security Controls: Required security controls should be included in the request for proposal, and the security team should be involved in reviewing each response.
AWS makes available a wide range of materials to help customers understand the AWS environment and security controls.
Find out how we make sure you can apply appropriate security controls according to the threats you face and your level of risk.
They also complement existing data security controls such as encryption and tokenization without the need to modify settings or configurations.
With a digital workspace, you can protect data and IP by basing security controls on user context, regardless of app, data, device or network.
Tap advanced policy management and automation to quickly extend your security controls to the private cloud.
Learn the top ways enterprises use a CASB to enforce necessary security controls across their data in Office 365 applications.
You can set your browser's security controls so that all or individual cookies are blocked.
In a mobile world, smart devices and mobile apps bypass security controls and get in through the front door.
Organizations, particular those that have suffered the effects of cyber attacks, have strengthened perimeter-based security controls like firewalls and intrusion detection systems.
Axis uses the SANS Top 20 Critical Security Controls as a baseline for its hardening guide.
CI/CD processes are now easier to follow with Akamai integrated application security controls.
The CSA STAR is a publicly accessible registry that documents the security controls provided by various cloud computing offerings.