We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Two-factor authentication software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Two-factor authentication software - List of Manufacturers, Suppliers, Companies and Products

Two-factor authentication software Product List

1~3 item / All 3 items

Displayed results

[Remote Function] Two-Factor Authentication Software 'Yubi Plus'

Lightweight usability, high-level security, and convenient management features! With Yubi Plus, you can have an office anywhere.

"Yubi Plus" is a two-factor authentication software that comes with remote functionality as standard. It enables secure and safe telework without the need to take documents or data outside. All you need is a USB security key to confidently conduct business from home or while on the go. Remote connection is not possible without having all three components: a USB security key, a digital certificate, and two-factor authentication via Yubi Plus. By implementing the Yubi Plus authentication server, you can achieve two-factor authentication login and remote access for Windows PCs using a USB security key. 【Features】 ■ Excellent performance and usability ■ Strong security through multi-factor authentication ■ Prevention of unauthorized access ■ Prevention of data leakage through copy prohibition ■ Management functions *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Multi-Factor Authentication Platform "IceWall"

A certification platform that has been widely adopted across various industries and scales for many years as a certification foundation!

Since its release in 1997, it has been implemented in numerous systems, including mission-critical applications, within Japan, and has sold over 40 million user licenses to date, boasting a top-class market share as a web single sign-on product. In the rapidly changing IT environment driven by the promotion of digital workplaces, it enables a wide variety of multi-factor authentication that matches the purpose and environment, allowing for flexible protection based on the risks associated with users, devices, and applications. 【Features】 - Achieves enhanced authentication combined with various methods, including biometric authentication, and supports passwordless authentication compliant with FIDO2. - Realizes authentication integration with the cloud compatible with SAML and OpenID Connect methods. - Reliable domestic support with prompt and detailed responses. *For more details, please download the PDF or feel free to contact us.

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[FaceMe Case Study] Implementation of two-factor authentication using facial recognition in public institutions.

Introducing examples of implementing two-factor authentication using facial recognition in government agencies and local municipalities to enhance login security for computers and systems.

**CyberLink Solutions** ■ A Japanese solution provider (FaceMe partner) has integrated the FaceMe SDK into two-factor authentication login software for government agencies. When public servants access work computers containing confidential information or unlock screens, they can now log in using two-factor authentication that utilizes facial recognition, in addition to account passwords and ID card identification via sensors. ■ Some work computers that allow access through shared accounts and passwords originally lack means to track who the actual user is. However, with the introduction of facial recognition, login records for each user are stored in the backend management system, enabling identity verification and further strengthening the management system for confidential information. *For more details, please refer to the PDF document or feel free to contact us.*

  • Other security and surveillance systems
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration