Glossary entry (derived from question below)
English term or phrase:
memory-based sensors
Russian translation:
резидентные сенсоры
Added to glossary by
Kiwiland Bear
Mar 13, 2012 19:18
12 yrs ago
English term
memory-based sensors
English to Russian
Tech/Engineering
Computers: Systems, Networks
Remember, database attacks come from the network, local users (privileged and otherwise), and even from inside the database, but only McAfee’s Database Activity Monitoring product can catch all three. DAM uses memory-based sensors to catch all three types of threats in a single solution.
http://www.maikmorgenstern.de/wordpress/?tag=operation-auror...
http://www.maikmorgenstern.de/wordpress/?tag=operation-auror...
Proposed translations
(Russian)
3 | резидентные сенсоры |
Kiwiland Bear
![]() |
4 | датчики-регистраторы |
Vladimir Shelukhin
![]() |
3 | локальный/внутренний датчик |
Oleg Friedman
![]() |
Change log
Mar 18, 2012 10:35: Kiwiland Bear Created KOG entry
Proposed translations
1 day 2 hrs
Selected
резидентные сенсоры
Если будет позволено несколько уйти от буквальности.
Внимательно прочитав текст по сссылке, можно заметить что там не столько буквально о физическрй памяти речь. Также и о базах данных, триггерах и пр.
Соответственно и смысл как мне кажется не в том где физически (на диске, в памяти или сети) этот сенсор находится, а в том что он уже внутри системы, за несколькими слоями других защит.
Внимательно прочитав текст по сссылке, можно заметить что там не столько буквально о физическрй памяти речь. Также и о базах данных, триггерах и пр.
Соответственно и смысл как мне кажется не в том где физически (на диске, в памяти или сети) этот сенсор находится, а в том что он уже внутри системы, за несколькими слоями других защит.
4 KudoZ points awarded for this answer.
Comment: "Спасибо!"
15 mins
датчики-регистраторы
Хорошо ложится в контекст.
Note from asker:
Спасибо! |
1 hr
локальный/внутренний датчик
http://www.hotfrog.co.uk/Companies/Sentrigo/Why-Sentrigo-Sen...
Inside-Out protects from all threats
There are 3 primary ways malicious users will try to get to your data:
* Network-based attacks, including those from applications
* Host-based attacks, from users directly logged into the database server, or from virtual machine to virtual machine on the same physical server
* Intra-DB attacks, using sophisticated exploits based on stored procedures, triggers, and views
By monitoring the actual data structures and the execution plan as the database is accessed, Sentrigo’s memory-based sensors catch all three types of threats, with a single, non-intrusive solution. Network-based solutions see only the first type of threat, and often add a host-based agent to send local traffic to the server to catch the second (more on the inefficiencies of this approach, and systems impact, below). But, they entirely miss attacks coming from within the database, and will also miss obfuscated attacks that may look harmless, but once they are decoded at execution are in fact quite dangerous.
The bottom line is that being “inside” is the ONLY way to cover threats from all 3 sources.
--------------------------------------------------
Note added at 3 hrs (2012-03-13 23:05:22 GMT)
--------------------------------------------------
или
датчики, работающие в памяти
Inside-Out protects from all threats
There are 3 primary ways malicious users will try to get to your data:
* Network-based attacks, including those from applications
* Host-based attacks, from users directly logged into the database server, or from virtual machine to virtual machine on the same physical server
* Intra-DB attacks, using sophisticated exploits based on stored procedures, triggers, and views
By monitoring the actual data structures and the execution plan as the database is accessed, Sentrigo’s memory-based sensors catch all three types of threats, with a single, non-intrusive solution. Network-based solutions see only the first type of threat, and often add a host-based agent to send local traffic to the server to catch the second (more on the inefficiencies of this approach, and systems impact, below). But, they entirely miss attacks coming from within the database, and will also miss obfuscated attacks that may look harmless, but once they are decoded at execution are in fact quite dangerous.
The bottom line is that being “inside” is the ONLY way to cover threats from all 3 sources.
--------------------------------------------------
Note added at 3 hrs (2012-03-13 23:05:22 GMT)
--------------------------------------------------
или
датчики, работающие в памяти
Note from asker:
Спасибо! |
Something went wrong...