4 results found
AI智能搜索
Select Product
CloudPond
No results found. Please try different keywords.
Select Product
CloudPond
在搜索结果页开启AI智能搜索
开启
Select Product
No results found. Please try different keywords.
  • Cached Images - CloudPond

    Constraints and Limitations Encrypted images cannot be used to create ECSs or cached at edge sites. Cached images will be automatically deleted if corresponding images in IMS are changed.

  • Security - CloudPond

    Secure data transmission: Data is encrypted before being transmitted between edge sites and the cloud. Secure data use: It is recommended that you identify sensitive data, encrypt it, and use security groups or network access control lists (ACLs) to control access to resources.

  • Constraints - CloudPond

    ECSs cannot be encrypted, backed up, or used for creating full-ECS images, and their billing modes cannot be changed. To run commercial OSs on an ECS, such as Windows and Red Hat, you need to acquire the license. ECS supports the UEFI secure boot of local VMs.

  • Data Protection - CloudPond

    Secure data transmission: Data is encrypted before being transmitted between edge sites and the cloud. Secure data use: It is recommended that you identify sensitive data, encrypt it, and use security groups or network access control lists (ACLs) to control access to resources.

Total results: 4