Carmaker Holds the Keys to Network SecurityHuawei
This supplier profile is not yet verified.
Verification is a free, simple process in which a supplier representative confirms the accuracy of their profile and identifies profile improvements.
|[Data Management - Cyber Security]|
Unified security policy customization is enabled through the TSM system centrally manages FAW-VW’s terminals.
|[Data Management - Data Security]|
Refining user rights management policies has ensured that users have the access rights to resources only required in their service of operation.
|[Data Management - Data Analysis]|
Cloud solutions enable aggregation of 'big data' to enable more robust analysis and lower costs.