DE Zur besseren Trennung der Themenfelder spricht man beim Kauf von fertigen Security Services (SaaS) von „Security aus der Cloud“ und bei Schutzmaßnahmen für virtuelle IT-Services in der Public Cloud von „Security in der Cloud“.
"security unternehmen" í þýska, Þjóðverji, þýskur er hægt að þýða í eftirfarandi Enska orð/setningar:
DE Zur besseren Trennung der Themenfelder spricht man beim Kauf von fertigen Security Services (SaaS) von „Security aus der Cloud“ und bei Schutzmaßnahmen für virtuelle IT-Services in der Public Cloud von „Security in der Cloud“.
EN For better separation of the topics, the purchase of finished Security Services (SaaS) is referred to as “Security from the Cloud” and protective measures for virtual IT services in the public cloud are referred to as “Security in the Cloud”.
DE Detaillierte Informationen zur AWS-Sicherheit finden Sie unter https://aws.amazon.com/security/ und http://aws.amazon.com/security/sharing-the-security-responsibility/
EN Detailed information about AWS security is available at https://aws.amazon.com/security/ and http://aws.amazon.com/security/sharing-the-security-responsibility/
þýska, Þjóðverji, þýskur | Enska |
---|---|
aws | aws |
https | https |
amazon | amazon |
http | http |
informationen | information |
unter | at |
und | and |
zur | the |
sicherheit | security |
DE Dieser Blog wurde von Cristofer Sochacki, Senior Security Engineer, und Brian Milbier, Director of Threat Management, Security Engineering und Security Architecture, verfasst.
EN In our next post, we will walk through how to use an open-source tool to emulate attack techniques in your environment.
þýska, Þjóðverji, þýskur | Enska |
---|---|
dieser | to |
DE Zur besseren Trennung der Themenfelder spricht man beim Kauf von fertigen Security Services (SaaS) von „Security aus der Cloud“ und bei Schutzmaßnahmen für virtuelle IT-Services in der Public Cloud von „Security in der Cloud“.
EN For better separation of the topics, the purchase of finished Security Services (SaaS) is referred to as “Security from the Cloud” and protective measures for virtual IT services in the public cloud are referred to as “Security in the Cloud”.
DE Security Token Services bilden zusammen mit Relying Parties eine Security-Token-Service-Architektur, bei der Benutzer, die versuchen, auf eine Website (Relying Party) zuzugreifen, zur Authentifizierung an den Security Token Service weitergeleitet werden.
EN Security Token Services together with relying parties comprise a Security Token Service architecture, in which users that attempt to access a website (relying party), are relayed to the Security Token Service for authentication.
þýska, Þjóðverji, þýskur | Enska |
---|---|
security | security |
token | token |
benutzer | users |
versuchen | attempt |
website | website |
party | party |
authentifizierung | authentication |
architektur | architecture |
zuzugreifen | to access |
services | services |
service | service |
zusammen | with |
eine | a |
den | the |
DE Detaillierte Informationen zur AWS-Sicherheit finden Sie unter https://aws.amazon.com/security/ und http://aws.amazon.com/security/sharing-the-security-responsibility/
EN Detailed information about AWS security is available at https://aws.amazon.com/security/ and http://aws.amazon.com/security/sharing-the-security-responsibility/
þýska, Þjóðverji, þýskur | Enska |
---|---|
aws | aws |
https | https |
amazon | amazon |
http | http |
informationen | information |
unter | at |
und | and |
zur | the |
sicherheit | security |
DE Dieser Blog wurde von Cristofer Sochacki, Senior Security Engineer, und Brian Milbier, Director of Threat Management, Security Engineering und Security Architecture, verfasst.
EN In our next post, we will walk through how to use an open-source tool to emulate attack techniques in your environment.
þýska, Þjóðverji, þýskur | Enska |
---|---|
dieser | to |
DE Für zahlende Abonnenten der Software pflegt Keeper Security eine Binärdatei Ihrer Keeper-Datensätze im Keeper Security Cloud Security Vault™
EN The binary is created when you backup your records and is stored in the event that you need to recover your information due to local system crash, damage, loss or hack attempt that results in the self-destruction of your records
þýska, Þjóðverji, þýskur | Enska |
---|---|
datensätze | records |
software | system |
der | of |
für | and |
DE Keeper Security speichert eine verschlüsselte Binärdatei Ihrer KeeperChat-Nachrichten (einschließlich aller Dateianlagen bis zu 100 MB) im Cloud Security Vault™ von Keeper Security
EN Keeper Security will maintain an encrypted binary file of your KeeperChat messages (including any file attachments up to 100 MB) on Keeper Security's Cloud Security Vault™
DE Dazu gehören zum Beispiel unsere jährlichen Android-Forschungsstudien zu Hunderten von Security-Apps, der AVC Undroid App-Analysator, unsere kostenlose Security-Beratung sowie Übersichten und Meinungen zum Security-Markt.
EN These include for example our yearly Android research studies of hundreds of security apps, AVC Undroid app analyser, our free security advice and security market overviews and opinions.
þýska, Þjóðverji, þýskur | Enska |
---|---|
jährlichen | yearly |
avc | avc |
kostenlose | free |
meinungen | opinions |
android | android |
security | security |
beratung | advice |
markt | market |
app | app |
apps | apps |
unsere | our |
beispiel | example |
hunderten | hundreds of |
und | and |
DE Dazu gehören zum Beispiel unsere jährlichen Android-Forschungsstudien zu Hunderten von Security-Apps, AVC-Android App-Analysator, unsere kostenlose Security-Beratung und Security-Markt Übersichten und Meinungen.
EN These include for example our yearly Android research studies of hundreds of security apps, AVC Undroid app analyser, our free security advice and security market overviews and opinions.
þýska, Þjóðverji, þýskur | Enska |
---|---|
jährlichen | yearly |
kostenlose | free |
meinungen | opinions |
android | android |
security | security |
avc | avc |
beratung | advice |
markt | market |
app | app |
apps | apps |
unsere | our |
beispiel | example |
hunderten | hundreds of |
von | of |
und | and |
DE NewEdge ist die weltgrößte und leistungsstärkste Private Security Cloud. Darüber laufen in Echtzeit die Inline-Security Services der Netskope Security Cloud.
EN NewEdge is the world’s largest, highest-performing security private cloud and powers the real-time, inline security services of the Netskope Security Cloud.
DE Die wichtigste Erkennungsaktivität für Unternehmen ist die Implementierung eines SIEM-Systems (Security Information and Event Management) oder eines SOAR-Systems (Security Orchestration, Automation and Response) zur kontinuierlichen Überwachung
EN The most important Detect activity for enterprises is to implement a Security Information and Event Management (SIEM) system or a Security Orchestration, Automation and Response (SOAR) system for continuous monitoring
þýska, Þjóðverji, þýskur | Enska |
---|---|
implementierung | implement |
information | information |
event | event |
orchestration | orchestration |
automation | automation |
kontinuierlichen | continuous |
siem | siem |
security | security |
management | management |
oder | or |
systems | system |
wichtigste | important |
ist | is |
für | for |
zur | the |
DE Infrastructure Security ➥ Für Netzwerksicherheit und Infrastruktursicherheit in Unternehmen ✓ IT Perimeter Security ✓ Bechtles Leistungen jetzt einsehen
EN Infrastructure Security ➥ For network security and corporate infrastructure security ✓ IT Perimeter Security ✓ View Bechtle's services now
DE Panda Security wird das erste IT-Security-Unternehmen mit einem vollständig cloud-basierten Angebot.
EN Panda Security became the first security company with a
þýska, Þjóðverji, þýskur | Enska |
---|---|
panda | panda |
security | security |
unternehmen | company |
mit | with |
wird | the |
erste | the first |
DE Panda Security wird das erste IT-Security-Unternehmen mit einem vollständig cloud-basierten Angebot.
EN Panda Security became the first security company with a
þýska, Þjóðverji, þýskur | Enska |
---|---|
panda | panda |
security | security |
unternehmen | company |
mit | with |
wird | the |
erste | the first |
DE Ist Ihr Unternehmen bereit, auf einen Sicherheitsvorfall zu reagieren? Experten von Bolt, Nord Security und NRD Cyber Security geben Einblicke und mehr.
EN Is your organization ready to handle a security incident? Experts from Bolt, Nord Security, and NRD Cyber Security share their insights and more.
þýska, Þjóðverji, þýskur | Enska |
---|---|
unternehmen | organization |
bereit | ready |
experten | experts |
security | security |
einblicke | insights |
nord | nord |
cyber | cyber |
und | and |
ist | is |
ihr | your |
einen | a |
zu | to |
mehr | more |
DE Crashtest Security ist ein in München ansässiges Cyber-Security Unternehmen, das hochmoderne Schwachstellen-Scanner-Software für Web-Anwendungen entwickelt
EN Crashtest Security is a Munich-based cyber security company developing state of the art vulnerability scanning software for web applications
þýska, Þjóðverji, þýskur | Enska |
---|---|
security | security |
münchen | munich |
unternehmen | company |
entwickelt | based |
cyber | cyber |
schwachstellen | vulnerability |
scanner | scanning |
software | software |
anwendungen | applications |
für | for |
web-anwendungen | web |
ist | is |
ein | a |
das | the |
DE Die wichtigste Erkennungsaktivität für Unternehmen ist die Implementierung eines SIEM-Systems (Security Information and Event Management) oder eines SOAR-Systems (Security Orchestration, Automation and Response) zur kontinuierlichen Überwachung
EN The most important Detect activity for enterprises is to implement a Security Information and Event Management (SIEM) system or a Security Orchestration, Automation and Response (SOAR) system for continuous monitoring
þýska, Þjóðverji, þýskur | Enska |
---|---|
implementierung | implement |
information | information |
event | event |
orchestration | orchestration |
automation | automation |
kontinuierlichen | continuous |
siem | siem |
security | security |
management | management |
oder | or |
systems | system |
wichtigste | important |
ist | is |
für | for |
zur | the |
DE Mobile Security | Mobile Security für Unternehmen, Entwickler, Management
EN Mobile Security | Mobile Security for organisations, developers, management
þýska, Þjóðverji, þýskur | Enska |
---|---|
mobile | mobile |
für | for |
entwickler | developers |
security | security |
management | management |
DE Durch die Integration von Security-Funktionen in komplexe Infrastrukturen über die Fortinet Security Fabric verfügen Unternehmen über eine effiziente, unterbrechungsfreie Möglichkeit, sicherzustellen, dass die OT-Umgebung geschützt und konform ist.
EN By designing security into complex infrastructure via the Fortinet Security Fabric, organizations have an efficient, non-disruptive way to ensure that the OT environment is protected and compliant.
þýska, Þjóðverji, þýskur | Enska |
---|---|
komplexe | complex |
infrastrukturen | infrastructure |
fortinet | fortinet |
fabric | fabric |
unternehmen | organizations |
effiziente | efficient |
konform | compliant |
umgebung | environment |
geschützt | protected |
security | security |
sicherzustellen | to ensure |
ist | is |
und | and |
die | the |
dass | that |
DE Weitere Informationen zu Exponeas Security-Architektur Weitere Informationen zu Exponeas Security-Features
EN More on Exponea’s Security Architecture More on Exponea’s Security Features
þýska, Þjóðverji, þýskur | Enska |
---|---|
weitere | more |
security | security |
architektur | architecture |
features | features |
DE Vor seiner Zeit bei Twilio war Steve Chief Information Security Officer für Ionic Security und diente unter zwei Präsidenten als militärischer Kommunikationsassistent
EN Prior to joining Twilio, Steve was the chief information security officer for Ionic Security and has served under two Presidents as a military communications aide
þýska, Þjóðverji, þýskur | Enska |
---|---|
twilio | twilio |
steve | steve |
chief | chief |
information | information |
security | security |
ionic | ionic |
diente | served |
war | was |
für | for |
und | and |
als | as |
DE Die Kindersicherung ist eine Funktion in F-Secure Internet Security und Mobile Security für Android, mit der Sie die Sicherheit Ihrer Kinder im Internet gewährleisten können
EN Parental Control is a feature within F-Secure Internet Security and Mobile Security for Android that helps you keep your children safe on the Internet
þýska, Þjóðverji, þýskur | Enska |
---|---|
funktion | feature |
internet | internet |
mobile | mobile |
android | android |
kinder | children |
ist | is |
für | for |
und | and |
eine | a |
in | on |
der | the |
sicherheit | security |
DE In der Regel führt das zu einem Security Patch, meist verbunden mit einem Security Announcement und unter Umständen der Erteilung / Beantragung einer CVE ID.
EN This usually leads to a security patch, usually combined with a security announcement and possibly the issuance / application of a CVE ID.
þýska, Þjóðverji, þýskur | Enska |
---|---|
security | security |
patch | patch |
und | and |
führt | leads |
zu | to |
in der regel | usually |
mit | combined |
einer | a |
DE Unterstützung für die Authentifizierung auf Basis des WS-Security (Web Services Security)-Standards
EN Support for authentication based on the WS-Security (Web Services Security) standard
þýska, Þjóðverji, þýskur | Enska |
---|---|
authentifizierung | authentication |
web | web |
security | security |
standards | standard |
services | services |
unterstützung | support |
für | for |
basis | based |
des | the |
DE Lernen Sie Computer Security And Networks mit Online Computer Security And Networks-Kursen
EN Learn Computer Security And Networks with online Computer Security And Networks courses
þýska, Þjóðverji, þýskur | Enska |
---|---|
computer | computer |
security | security |
online | online |
kursen | courses |
networks | networks |
mit | with |
lernen | and |
DE Cloud Security Alliance – Wir haben unsere CAIQ-Selbstbewertung gemäß Cloud Controls Matrix für die CSA Security, Trust, & Assurance Registry abgeschlossen.
EN Cloud Security Alliance - We have completed our Cloud Control Matrix CAIQ Self Assessment for the CSA Security, Trust, & Assurance Registry.
þýska, Þjóðverji, þýskur | Enska |
---|---|
alliance | alliance |
abgeschlossen | completed |
matrix | matrix |
registry | registry |
cloud | cloud |
wir | we |
security | security |
trust | trust |
unsere | our |
haben | have |
DE Im Fokus der Untersuchung stehen die wichtigsten Herausforderungen, denen sich IT-Security-Verantwortliche (CISOs, Chief Information Security Officers) im Verlauf der vergangenen zwölf Monate gegenübersahen.
EN in the Leaders quadrant of the 2020 Magic Quadrant for Enterprise Information Archiving* for the ninth consecutive year.
þýska, Þjóðverji, þýskur | Enska |
---|---|
information | information |
im | in the |
vergangenen | in |
DE Datacenter Security neu erleben ? nur mit Bechtle. Doch worum geht es bei Datacenter Security eigentlich?
EN A new way to experience data centre security ? With Bechtle But what is data centre security all about?
þýska, Þjóðverji, þýskur | Enska |
---|---|
security | security |
bechtle | bechtle |
mit | with |
worum | what |
neu | a |
erleben | experience |
DE Workplace Security ▷ Security Lösungen von Bechtle
EN Workplace Security ▷ Security solutions from Bechtle
DE Was ist Cloud Security und Security as a Service?
EN What is cloud security and Security-as-a-Service?
þýska, Þjóðverji, þýskur | Enska |
---|---|
cloud | cloud |
security | security |
service | service |
a | a |
und | and |
ist | is |
DE Auch diese Kategorien durchsuchen: Pentest Tools, Startseite, IT-Security Netzwerk Geräte, IT-Security Tools
EN Browse these categories as well: Pentest Tools, Home page, IT-Security Network Tools, IT-Security Tools
þýska, Þjóðverji, þýskur | Enska |
---|---|
kategorien | categories |
durchsuchen | browse |
tools | tools |
startseite | home page |
netzwerk | network |
diese | these |
auch | as |
DE MX Guarddog verwendet die höchsten Stufen Transport Layer Security (TLS) basierter Verschlüsselung, einschließlich Perfect Forward Security (PFS), um sicherzustellen, dass Ihre sicheren E-Mails sicher bleiben.
EN MX Guarddog uses the highest levels of Transport Layer Security (TLS) based encryption, including Perfect Forward Security (PFS) to ensure your secure email remains secure.
þýska, Þjóðverji, þýskur | Enska |
---|---|
mx | mx |
guarddog | guarddog |
verwendet | uses |
höchsten | highest |
stufen | levels |
transport | transport |
layer | layer |
basierter | based |
einschließlich | including |
perfect | perfect |
forward | forward |
pfs | pfs |
security | security |
tls | tls |
verschlüsselung | encryption |
sicherzustellen | to ensure |
ihre | your |
mails | |
die | the |
bleiben | remains |
DE Information Security Management Systeme (ISMS) sind das Fundament jeder funktionierenden IT-Security
EN Information Security Management Systems (ISMS) form the basis for any functioning IT security system
þýska, Þjóðverji, þýskur | Enska |
---|---|
information | information |
fundament | basis |
security | security |
management | management |
systeme | systems |
das | the |
DE Panda Security wird zu WatchGuard Endpoint Security
EN Panda Security Becomes WatchGuard Endpoint Security
þýska, Þjóðverji, þýskur | Enska |
---|---|
panda | panda |
security | security |
wird | becomes |
endpoint | endpoint |
DE WatchGuard Endpoint Security stellt die Panda Security-Technologie dar, wie Sie sie kennen und lieben. Darin enthalten sind viele integrierte Produktoptionen mit Verschlüsselung, Remote-Überwachung und -Verwaltung, Patching und vielem mehr.
EN WatchGuard Endpoint Security features the Panda Security technology you know and love, including a full stack of integrated product options with encryption, patching, remote monitoring and management, and more.
þýska, Þjóðverji, þýskur | Enska |
---|---|
endpoint | endpoint |
panda | panda |
integrierte | integrated |
technologie | technology |
remote | remote |
security | security |
verschlüsselung | encryption |
verwaltung | management |
und | and |
mit | with |
vielem | more |
dar | the |
lieben | a |
DE Proofpoint Cloud App Security Broker (Proofpoint CASB) unterstützt Sie bei der Cloud Security von Anwendungen wie Microsoft Office 365, Google G Suite oder Box
EN Proofpoint Cloud App Security Broker (Proofpoint CASB) helps you secure applications such as Microsoft Office 365, Google G Suite, Box, and more
þýska, Þjóðverji, þýskur | Enska |
---|---|
proofpoint | proofpoint |
cloud | cloud |
broker | broker |
unterstützt | helps |
g | g |
box | box |
app | app |
security | security |
anwendungen | applications |
microsoft | microsoft |
office | office |
suite | suite |
sie | you |
wie | as |
DE Microsoft Security Essentials bietet Echtzeitschutz für Ihren Heim-PC, der vor Viren, Spyware und anderer bösartiger Software schützt. Microsoft Security Essentials ist ein kostenloser Download von
EN Free and powerful security tool
þýska, Þjóðverji, þýskur | Enska |
---|---|
software | tool |
kostenloser | free |
security | security |
und | and |
DE Veranstaltungen und Termine von Keeper Security | Keeper Security
EN Keeper Security Events and Schedule | Keeper Security
þýska, Þjóðverji, þýskur | Enska |
---|---|
keeper | keeper |
security | security |
veranstaltungen | events |
und | and |
DE Craig Lurey ist der CTO und Mitbegründer von Keeper Security Inc. Craig leitet die Software- und Technologieinfrastrukturentwicklung von Keeper Security.
EN Craig Lurey is the CTO and Co-Founder of Keeper Security, Inc. Craig leads Keeper Security’s software development and technology infrastructure.
þýska, Þjóðverji, þýskur | Enska |
---|---|
craig | craig |
cto | cto |
keeper | keeper |
security | security |
inc | inc |
leitet | leads |
software | software |
ist | is |
und | and |
DE Die Erstellung und Aktualisierung des Security Versicherungsplans (SIP) sowie die Überwachung seiner Anwendung liegen in der Verantwortung des Security- oder
EN The production and updates of the Security Insurance Plan (SIP) as well as the monitoring of its application are the responsibility of the security or
þýska, Þjóðverji, þýskur | Enska |
---|---|
erstellung | production |
aktualisierung | updates |
sip | sip |
anwendung | application |
verantwortung | responsibility |
oder | or |
security | security |
liegen | are |
und | and |
DE Emsisoft Business Security / Emsisoft Enterprise Security (PDF) - auf Englisch
EN Emsisoft Business Security / Emsisoft Enterprise Security (PDF) - English
þýska, Þjóðverji, þýskur | Enska |
---|---|
emsisoft | emsisoft |
security | security |
business | business |
enterprise | enterprise |
englisch | english |
DE CrowdStrike akquiriert Preempt Security, um Kunden erweiterte Zero Trust Security-Fähigkeiten zu bieten
EN CrowdStrike Foundation Announces NextGen Scholarship Recipients for Academic Year 2019 – 2020
þýska, Þjóðverji, þýskur | Enska |
---|---|
crowdstrike | crowdstrike |
um | for |
DE App Store für Security-Anwendungen: CrowdStrike öffnet seine Security Cloud für Drittanbieter
EN CrowdStrike Named to Forbes 2017 Cloud 100
þýska, Þjóðverji, þýskur | Enska |
---|---|
crowdstrike | crowdstrike |
cloud | cloud |
für | to |
DE Optional nehmen wir für Ihre Webseite zusätzliche Maßnahmen wie HTTP Strict Transport Security oder Content Security Policies vor. Sprechen Sie uns einfach an.
EN Optionally we can take additional measures for your website, such as HTTP Strict Transport Security or Content Security Policies. Just get in touch!
þýska, Þjóðverji, þýskur | Enska |
---|---|
optional | optionally |
webseite | website |
zusätzliche | additional |
http | http |
strict | strict |
security | security |
content | content |
policies | policies |
transport | transport |
einfach | just |
oder | or |
ihre | your |
für | for |
maßnahmen | measures |
vor | in |
sie | take |
wir | we |
DE Die Fachzeitschrift SECURITY insight wendet sich an die Leiter der Corporate Security und an die Geschäftsführer mittelständischer Betriebe branchenübergreifend, sowie Behörden und Verbände.
EN The magazine SECURITY INSIGHT is intended for corporate security executives and managing directors of medium-sized companies across all industries, as well as public agencies and associations.
þýska, Þjóðverji, þýskur | Enska |
---|---|
security | security |
insight | insight |
verbände | associations |
branchen | industries |
corporate | corporate |
geschäftsführer | managing |
betriebe | companies |
behörden | agencies |
und | and |
an | across |
DE Das OXID Security Team informiert Euch über Sicherheitslücken, die in OXID eShop bekannt geworden sind. Wir veröffentlichen außerdem Security Advisories.
EN OXID Security Team informs you about security vulnerabilities that have become known in OXID eShop. We also publish security advisories.
þýska, Þjóðverji, þýskur | Enska |
---|---|
security | security |
team | team |
informiert | informs |
sicherheitslücken | vulnerabilities |
eshop | eshop |
bekannt | known |
veröffentlichen | publish |
oxid | oxid |
in | in |
euch | you |
wir | we |
geworden | have |
sind | become |
die | that |
DE 3. Datensicherheit durch Security by Design und Security-Lifecycle-Management fördern
EN 3. Promoting data security through security by design and security lifecycle management
þýska, Þjóðverji, þýskur | Enska |
---|---|
datensicherheit | data security |
design | design |
fördern | promoting |
und | and |
lifecycle | lifecycle |
security | security |
by | by |
management | management |
DE Dies umfasst sowohl Security by Design in der Entwicklungsphase als auch Security-Lifecycle-Management über den gesamten Produkt- und Datenlebenszyklus hinweg.
EN This includes both security by design in the development phase and security lifecycle management throughout the entire product and data lifecycle.
þýska, Þjóðverji, þýskur | Enska |
---|---|
datenlebenszyklus | data lifecycle |
lifecycle | lifecycle |
security | security |
by | by |
design | design |
management | management |
produkt | product |
in | in |
gesamten | entire |
hinweg | and |
umfasst | includes |
dies | this |
den | the |
Sýnir 50 af 50 þýðingum