...
首页> 外文期刊>COM-SAC >Considerations in Implementing End-Point Security
【24h】

Considerations in Implementing End-Point Security

机译:实施端点安全性的注意事项

获取原文
获取原文并翻译 | 示例
           

摘要

In today's fast-paced and global organizations are compelled to provide employees, business partners and customers access to company data, business applications and computing resources on a 24 x 7 basis, any where in the world and from a variety of endpoints, such as remote PCs and laptops, laptops and mobile units (cell phones) and third party devices. This access may be made feasible via the Internet and other trusted and untrusted networks. This complex environment provides the opportunity for the introduction of viruses, worms and malware that can inflict a number of unwelcome denials of service (DoS), potential destruction of files and data and, in today's heavily regulatory landscape, violation of privacy and financial losses and fines. There is a need to review your prevailing endpoint access and protection provisions ensuing that they are insular and that they do not rely on a single product or software element. This issue of COM-SAC provides some of the considerations for sound endpoint security.
机译:在当今快节奏和全球化的组织中,企业不得不向员工,业务合作伙伴和客户提供24x 7全天候服务,无论是在世界任何地方,还是从各种端点(例如远程)访问公司数据,业务应用程序和计算资源PC和笔记本电脑,笔记本电脑和移动设备(手机)以及第三方设备。可以通过Internet和其他受信任和不受信任的网络使此访问可行。这个复杂的环境为病毒,蠕虫和恶意软件的引入提供了机会,这些病毒,蠕虫和恶意软件会造成许多不受欢迎的拒绝服务(DoS),潜在的文件和数据破坏,以及在当今严峻的监管环境中,侵犯隐私和财务损失,以及罚款。有必要检查您的主流端点访问和保护条款,以确保它们是孤立的并且不依赖于单个产品或软件元素。本期COM-SAC提供了合理的端点安全性的一些注意事项。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号