Перевод: со всех языков на все языки

со всех языков на все языки

real-time network security analysis

См. также в других словарях:

  • Real-time business intelligence — is the process of delivering information about business operations without any latency. In this context, real time means delivering information in a range from milliseconds to a few seconds after the business event. While traditional business… …   Wikipedia

  • Real-time (disambiguation) — Real time, real time, or realtime may refer to:* Real time systems, which respond to events or signals as fast as possible, or as they happen. These include: ** Real time computing, the study of computer systems which are subject to a real time… …   Wikipedia

  • Network intelligence — (NI) is a technology that builds on the concepts and capabilities of Deep Packet Inspection (DPI), Packet Capture and Business Intelligence (BI). It examines, in real time, IP data packets that cross communications networks by identifying the… …   Wikipedia

  • TriGeo Network Security — Infobox Company company name = TriGeo Network Security company company type = Private company slogan = You can t protect what you can t see™ foundation = 2001 location city = Post Falls, Idaho location country = USA locations = 1 key people =… …   Wikipedia

  • Security level management — (SLM) comprises a quality assurance system for electronic information security. The aim of SLM is to display the IT security status transparently across a company at any time, and to make IT security a measurable quantity. Transparency and… …   Wikipedia

  • Network Instruments — develops software and hardware solutions for analyzing and managing network and application performance, such as network analyzers. They were founded in 1994, and are headquartered in Minneapolis, Minnesota. The mainstay product of Network… …   Wikipedia

  • Network centrics — is the emerging discipline of applying and enhancing networking and computing concepts and implementation technologies in a variety of social, business, content distribution, and communication domains involving interactions amongst the domain… …   Wikipedia

  • Security Level Management — (SLM) ist ein Qualitätssicherungssystem für die elektronische Informationssicherheit. SLM hat zum Ziel, den IT Sicherheitsstatus jederzeit unternehmensweit transparent darzustellen und IT Sicherheit zu einer messbaren Größe zu machen. Transparenz …   Deutsch Wikipedia

  • Network tap — A network tap is a hardware device which provides a way to access the data flowing across a computer network. In many cases, it is desirable for a third party to monitor the traffic between two points in the network. If the network between points …   Wikipedia

  • Security through obscurity — In cryptography and computer security, security through obscurity (sometimes security by obscurity) is a controversial principle in security engineering, which attempts to use secrecy (of design, implementation, etc.) to provide security. A… …   Wikipedia

  • Network-centric warfare — Warfare Military history Eras Prehistoric Ancient Medieval Gunpowder Industrial …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»