영어에서 Security requirements 을 사용하는 예와 한국어로 번역
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
Power generators should look for a structured and tailored approach to meet physical and cyber security requirements.
Our data lake file system is built to meet the most stringent enterprise data security requirements.
It also serves as a container to separate apps that may have different roles, security requirements, or target audiences.
HPE SecureMail(and SecureFile), is without a doubt a great solution that meets the security requirements of many businesses worldwide.
So how do you understand your security requirements well enough to match up a security solution, and then pick the right technology?
Stay ahead of any intruder, and be compliant with regulatory and internal security requirements.
culture, and security requirements of the assembly.
CycurHSM meets all OEM security requirements and has been deployed successfully on millions of cars.
Effective data governance addresses data quality and security requirements no matter where the data resides or is captured or consumed.
App security: You define security requirements of individual apps or app profiles as part of the provisioning process.
Confidently protect strategic information assets and efficiently comply with regulatory and security requirements.
Note: This policy is intended for enterprises which must meet Australian Signals Directorate(ASD) computer security requirements.
We follow all security requirements on access to and use of AirAsia's aircraft, facilities and assets.
financial services must comply with strict regulations, compliance and security requirements.
SD Elements automates software security requirements based on your project's technology, business and compliance drivers.
To work with the second largest airport in the UK, Gatwick partners must meet stringent security requirements.
The Microsoft Office 365 service exceeds OSU's security requirements for storing unrestricted and sensitive data.
the most stringent federal, state and local cyber security requirements.
The Network Infrastructure Engineering(Deployment) group should consider security requirements when selecting network partners and vendors.
It's an easy way to take advantage of the full benefits of Microsoft Azure without sacrificing your security requirements.