We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Authentication Solutions.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Authentication Solutions Product List and Ranking from 9 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Oct 15, 2025~Nov 11, 2025
This ranking is based on the number of page views on our site.

Authentication Solutions Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Oct 15, 2025~Nov 11, 2025
This ranking is based on the number of page views on our site.

  1. GeoVision Tokyo//IT/Telecommunications
  2. Capy Tokyo//IT/Telecommunications
  3. Spelldata Tokyo//Information and Communications
  4. 飛天ジャパン Tokyo//IT/Telecommunications
  5. 5 AnchorZ Tokyo//IT/Telecommunications

Authentication Solutions Product ranking

Last Updated: Aggregation Period:Oct 15, 2025~Nov 11, 2025
This ranking is based on the number of page views on our site.

  1. [Case Study] Facial Recognition Solution GeoVision
  2. Capy biometric authentication solution Capy
  3. FR facial recognition solution 'GV-AI FR' GeoVision
  4. Countermeasures against spoofing emails, specifications for email encryption: What is DKIM? Spelldata
  5. 4 Background authentication solution "DZ Security" AnchorZ

Authentication Solutions Product List

1~13 item / All 13 items

Displayed results

[Case Study] Facial Recognition Solution

Real-time facial recognition with just the camera! A facial recognition solution that can also perform face detection verification.

We would like to introduce a case study of our "Facial Recognition Solution." The customer's challenge was that they had to put down their belongings and input a key or PIN code. However, by implementing our product, they were able to verify their identity simply by facing the device, allowing for easy and smooth entry and exit. 【Case Study】 ■ Challenge - Had to put down belongings and input a key or PIN code ■ Implementation Effect - Identity verification by simply facing the device - Easy and smooth entry and exit *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems
  • Surveillance Cameras
  • Surveillance Camera System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

FR facial recognition solution 'GV-AI FR'

The video from the network camera is sent to the server, where face detection and authentication are performed.

"GV-AI FR" is facial recognition software that meets new needs. It sends images from network cameras to a server, where face detection and authentication are performed. 【Features】 ■ Face detection/authentication, age and gender judgment ■ Aggregation of face recognition results ■ Notifications via LINE Notify and external devices (I/O) ■ Welcome screen display ■ Search for authentication results *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems
  • Surveillance Cameras
  • Surveillance Camera System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Background authentication solution "DZ Security"

No need for login or logout! Use the cloud safely and securely with "magical" authentication!

Our company has developed a background authentication solution called 'DZ Security' that requires no IT knowledge and can be used safely by anyone. This advanced solution performs continuous multi-factor authentication in the background of the services being used through multiple "biometric authentications" and associated "supplementary authentications (behavioral)" linked to them. 【Features】 ■ "Ease of use" ■ No IT knowledge required at all ■ If it's the person, that's enough ■ Solutions for GDPR-related issues ■ Solutions for contractual issues ■ Solutions for implementation barriers *For more details, please download the PDF or feel free to contact us.

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Face recognition solution with temperature measurement function

Centralized management of multiple gates! It is also possible to configure a large-scale system that manages between locations.

We propose a "Face Recognition Solution with Temperature Measurement Function" using a face recognition terminal equipped with a temperature measurement feature. The terminal can be installed in areas without walls using a dedicated mounting pole. It also issues a voice alarm to warn individuals with elevated temperatures and prohibits their passage. 【Terminal Features】 ■ Easy to install ■ Enhanced verification performance ■ Mask detection ■ Various verification methods ■ Long-distance face recognition ■ Temperature measurement *For more details, please download the PDF or feel free to contact us.

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Capy biometric authentication solution

A cloud service that realizes biometric authentication using FIDO.

Our company provides a cloud service that safely implements biometric authentication using an international standard technology for online authentication called FIDO. Implementation can be easily integrated into your currently operating services by simply installing JavaScript or incorporating APIs. Additionally, by using the API, you can link SecurePass with your currently operating websites and smartphone applications, enabling easy biometric authentication. 【Features】 ■ Easy implementation of biometric authentication by simply installing JavaScript ■ Compatible with biometric-enabled Android devices and iOS Touch ID/Face ID ■ Utilizing a cloud environment allows for reduced implementation costs and running expenses ■ No need to install biometric authentication devices as authentication is performed via smartphones ■ Can be used as an SDK, allowing integration from existing smartphone applications *For more details, please download the PDF or contact us.

  • Company:Capy
  • Price:Other
  • Other security and surveillance systems
  • Personal authentication
  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Facial recognition solution 'WelcomID Alcohol Checker'

Achieve routine in digital operations! Easy and effortless, continuing every day.

We would like to introduce our facial recognition solution, "WelcomID Alcohol Checker." We offer the facial recognition interface terminal "WelcomID" and the alcohol detector "Tanita ALBLOFC-1200." It is possible to export data in a standard Excel format, and with an option for cloud data management, you can manage multiple locations collectively. 【Features】 ■ Digitalize management processes with facial recognition ■ No need to launch a PC or app during inspection ■ Space-saving with no PC required ■ Easy data storage with linked information ■ PC integration for data management *For more details, please refer to the PDF document or feel free to contact us.

  • Other measurement, recording and measuring instruments

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

frontegg SSO/CIAM/authentication solution

Frontegg provides industry-leading customer ID management solutions (SSO/CIAM).

Frontegg is a company that provides a user management platform for B2B SaaS businesses. Founded in 2019, it helps companies quickly integrate user authentication and access management features. Key features include secure authentication and authorization, multi-factor authentication (MFA), passwordless authentication, single sign-on (SSO), user management, and role-based access control (RBAC). This allows users to seamlessly access multiple services, while developers can simplify user creation, management, and access permissions. Additionally, real-time notifications and system integration are streamlined through webhooks and event management. Frontegg eliminates the need for companies to build user management in-house, allowing their development resources to focus on core products. It is utilized by companies such as Datadog, Siemens, and Samsung, and is highly regarded as a solution that combines scalability and security. INNOOV serves as Frontegg's official domestic distributor, providing consulting and implementation support.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

"Numerous implementation results from hospitals to large commercial facilities" AI facial recognition solution.

Advanced facial recognition evolved through AI learning! It detects only the target individuals.

Our company offers the facial recognition system 'LYKAON-i', which achieves a level of authentication accuracy closer to human vision by incorporating an AI learning-based facial recognition engine. There is no need to carry authentication cards or memorize PIN codes, allowing for stress-free use. This also minimizes the need for personnel deployment for security, leading to cost reductions. Additionally, concerns about human errors such as distractions, misunderstandings, and forgetfulness are alleviated, enabling a greater focus on work. 【Features】 ■ Authentication similar to "human vision" through deep learning ■ Authentication at diagonal angles ■ Real-time notifications ■ Intuitive operation ■ Storage of video for a certain period ■ Information security *For more details, please download the PDF or feel free to contact us.

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

On-premises? Cloud? What is the suitable authentication solution?

Ensuring safety! Introducing security solutions in our blog.

This blog features suitable authentication solutions. The IT environments of companies are diversifying, ranging from traditional on-premises systems to cloud-based systems, and it is necessary to consider the implementation of authentication security that fits their own systems. In response to these changes in the environment, more companies are adopting authentication solutions that incorporate multi-factor authentication, such as the use of one-time password tokens and security keys. [Content] ■ Addressing the risks of entrusting data to cloud services ■ The increase of hybrid on-premises and cloud systems necessitates a response to diversification ■ "Zero Trust Security," which perceives internal and external network environments as borderless *Detailed content of the blog can be viewed through related links. *For more information, please refer to the PDF materials or feel free to contact us.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Countermeasures against spoofing emails, specifications for email encryption: What is DKIM?

Guarantee of the sender's authenticity and the integrity of the message content using public key cryptography!

On our company website, we introduce measures against spoofing emails and the specifications for email encryption. "DKIM" (DomainKeys Identified Mail) utilizes public key cryptography, where the public key is recorded in DNS, and the MTA signs the email using a private key. This allows the receiving MTA to verify the authenticity of the sender and the integrity of the email content. By setting up the record, the receiving mail server can determine whether the email was sent by a legitimate sender upon receiving it. Please refer to the related links for more information. [Contents] ■ Example of operation ■ If only the DKIM settings are configured, the processing is left to the receiving mail server ■ If the sender wants to control the processing, DMARC settings are necessary ■ Is S/MIME not sufficient? *Detailed information can be viewed through the related links. For more details, please feel free to contact us.

  • Other server related
  • Other security
  • Server monitoring and network management tools

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Email audit tool to protect businesses from intellectual property theft due to cyber attacks.

The rapid increase in cyber attacks from abroad! The targets are the intellectual properties of small and medium-sized enterprises, such as technology, designs, and patents. If we don't protect ourselves, could our company be in danger?

Do you think that cyber attacks only target large companies? In reality, cybercriminals often first infect small and medium-sized enterprises with viruses, and then embed those viruses in emails sent to large companies. The small and medium-sized enterprises that are used as stepping stones have all their intellectual property and client information stolen. Subsequently, similar products are mass-produced in places like China, leading to price competition that makes it impossible for them to generate profits. Furthermore, they may be held responsible for infecting large companies with viruses and could face liability for damages (as it falls under the tort of Article 709 of the Civil Code). The actual flow of an attack typically involves sending emails that impersonate employees of the target company or masquerade as clients to employees of that company. Once someone opens the email, they become infected, and the infection spreads from there. In other words, eliminating the initial "spoofed emails impersonating internal or external individuals" is key to protecting both your company and your clients. So, what should be done to eliminate spoofed emails? ★ We are currently offering explanatory materials. Please check them out via "PDF Download.

  • Virus software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration