{"id":5221,"date":"2018-05-28T08:00:32","date_gmt":"2018-05-28T03:30:32","guid":{"rendered":"https:\/\/www.apk.co.ir\/news-center\/?p=5221"},"modified":"2018-05-28T08:00:32","modified_gmt":"2018-05-28T03:30:32","slug":"cisco-broadens-tetration-security-delivery-with-cloud-virtual-buying-options","status":"publish","type":"manual_kb","link":"https:\/\/www.apk.co.ir\/kb\/cisco-broadens-tetration-security-delivery-with-cloud-virtual-buying-options\/","title":{"rendered":"\u062a\u0648\u0633\u0639\u0647\u200c\u06cc \u0633\u0631\u0648\u06cc\u0633 \u0627\u0645\u0646\u06cc\u062a\u06cc Tetration \u0633\u06cc\u0633\u06a9\u0648 \u0628\u0627 \u0642\u0627\u0628\u0644\u06cc\u062a\u200c\u0647\u0627\u06cc Cloud"},"content":{"rendered":"

\u062f\u0648 \u062a\u06a9\u0646\u0648\u0644\u0648\u0698\u06cc <\/strong>Tetration-V<\/strong> \u0648 <\/strong>Tetration-SaaS<\/strong><\/a> \u06a9\u0647 \u062a\u0648\u0633\u0637 \u06a9\u0645\u067e\u0627\u0646\u06cc \u0633\u06cc\u0633\u06a9\u0648 \u0627\u0631\u0627\u0626\u0647 \u0634\u062f\u0647 \u0627\u0646\u062f\u060c \u0628\u0631\u0627\u06cc \u06a9\u0633\u0628\u200c\u0648\u200c\u06a9\u0627\u0631\u200c\u0647\u0627\u06cc\u06cc \u06a9\u0647<\/strong> \u062a\u0645\u0627\u06cc\u0644 <\/strong>\u0628\u0647<\/strong> \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632<\/strong> \u06cc\u06a9 \u067e\u0644\u062a\u0641\u0631\u0645 \u0622\u0646\u0627\u0644\u06cc\u0632 \u0627\u0645\u0646\u06cc\u062a\u06cc \u062f\u0627\u0631\u0646\u062f \u06cc\u06a9 \u0633\u0631\u0648\u06cc\u0633 \u06cc\u0627 \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631 <\/strong>Cloud<\/strong> \u06a9\u0647 \u0631\u0648\u06cc \u062a\u062c\u0647\u06cc\u0632\u0627\u062a \u0645\u062c\u0627\u0632\u06cc \u0627\u062c\u0631\u0627 \u0645\u06cc\u200c\u06af\u0631\u062f\u062f\u060c \u0641\u0631\u0627\u0647\u0645 \u0645\u06cc\u200c\u0646\u0645\u0627\u06cc\u062f.<\/strong><\/p>\n

\u0633\u06cc\u0633\u06a9\u0648 \u0642\u0627\u0628\u0644\u06cc\u062a\u200c\u0647\u0627\u06cc \u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc \u0645\u062c\u0627\u0632\u06cc \u0648 Cloud \u062c\u062f\u06cc\u062f\u06cc \u0631\u0627 \u0628\u0631\u0627\u06cc \u0645\u0634\u062a\u0631\u06cc\u0627\u0646\u06cc \u06a9\u0647 \u0642\u0635\u062f \u062e\u0631\u06cc\u062f \u0633\u06cc\u0633\u062a\u0645 \u0627\u0645\u0646\u06cc\u062a\u06cc Tetration Analytics<\/a> \u0631\u0627 \u062f\u0627\u0631\u0646\u062f\u060c \u0627\u0636\u0627\u0641\u0647 \u0646\u0645\u0648\u062f\u0647 \u0627\u0633\u062a.<\/p>\n

\u0633\u06cc\u0633\u062a\u0645 Tetration \u0633\u06cc\u0633\u06a9\u0648 \u0627\u0637\u0644\u0627\u0639\u0627\u062a\u06cc \u0631\u0627 \u0627\u0632 \u0633\u0646\u0633\u0648\u0631\u200c\u0647\u0627\u06cc \u0633\u062e\u062a\u200c\u0627\u0641\u0632\u0627\u0631\u06cc \u0648 \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631\u06cc \u062c\u0645\u0639\u200c\u0622\u0648\u0631\u06cc \u0646\u0645\u0648\u062f\u0647 \u0648 \u0627\u06cc\u0646 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0631\u0627 \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062a\u062c\u0632\u06cc\u0647 \u0648 \u062a\u062d\u0644\u06cc\u0644 Big-Data \u0648 \u06cc\u0627\u062f\u06af\u06cc\u0631\u06cc \u0645\u0627\u0634\u06cc\u0646\u06cc \u062a\u062d\u0644\u06cc\u0644 \u0645\u06cc\u200c\u0646\u0645\u0627\u06cc\u062f \u062a\u0627 \u0645\u062f\u06cc\u0631\u0627\u0646 IT \u062f\u0631\u06a9 \u0639\u0645\u06cc\u0642\u200c\u062a\u0631\u06cc \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u062f\u06cc\u062a\u0627\u0633\u0646\u062a\u0631 \u062e\u0648\u062f \u0628\u0647 \u062f\u0633\u062a \u0622\u0648\u0631\u0646\u062f.<\/p>\n

Tetration \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0645\u0627\u0646\u06cc\u062a\u0648\u0631\u06cc\u0646\u06af \u0627\u0645\u0646\u06cc\u062a\u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u06cc \u0631\u0627 \u0628\u0647\u0628\u0648\u062f \u0628\u062e\u0634\u06cc\u062f\u0647\u060c \u0642\u0627\u0628\u0644\u06cc\u062a \u0627\u0637\u0645\u06cc\u0646\u0627\u0646 (Reliability) \u0639\u0645\u0644\u06cc\u0627\u062a\u06cc \u0631\u0627 \u062a\u0633\u0647\u06cc\u0644 \u0646\u0645\u0648\u062f\u0647 \u0648 \u0628\u0647 \u0645\u0634\u062a\u0631\u06cc\u0627\u0646 \u0627\u0628\u0632\u0627\u0631 \u0648\u0627\u062d\u062f\u06cc \u0628\u0631\u0627\u06cc \u062c\u0645\u0639\u200c\u0622\u0648\u0631\u06cc Telemetry \u0627\u0645\u0646\u06cc\u062a\u06cc \u062f\u0627\u0626\u0645\u060c \u062f\u0631 \u062a\u0645\u0627\u0645 \u062f\u06cc\u062a\u0627\u0633\u0646\u062a\u0631 \u0628\u062f\u0647\u062f \u0648 \u062d\u062c\u0645 \u0639\u0638\u06cc\u0645\u06cc \u0627\u0632 \u062f\u0627\u062f\u0647\u200c\u0647\u0627 \u0631\u0627 \u0628\u0647 \u0635\u0648\u0631\u062a Real Time \u062a\u062d\u0644\u06cc\u0644 \u0646\u0645\u0627\u06cc\u062f.<\/p>\n

\u062f\u0631 \u0627\u06cc\u0646 \u0631\u0627\u0633\u062a\u0627\u060c Cisco \u062f\u0631 \u0647\u0641\u062a\u0647\u200c\u0647\u0627\u06cc \u0627\u062e\u06cc\u0631 \u062f\u0648 \u06af\u0632\u06cc\u0646\u0647\u200c\u06cc \u062c\u062f\u06cc\u062f \u0627\u0636\u0627\u0641\u0647 \u0646\u0645\u0648\u062f\u0647 \u0627\u0633\u062a:<\/p>\n