iPROS Manufacturing
  • Search for products by classification category

    • Electronic Components and Modules
      Electronic Components and Modules
      55891items
    • Machinery Parts
      Machinery Parts
      70743items
    • Manufacturing and processing machinery
      Manufacturing and processing machinery
      95514items
    • Scientific and Physics Equipment
      Scientific and Physics Equipment
      33013items
    • Materials
      Materials
      34849items
    • Measurement and Analysis
      Measurement and Analysis
      52708items
    • Image Processing
      Image Processing
      14548items
    • Control and Electrical Equipment
      Control and Electrical Equipment
      50370items
    • Tools, consumables, and supplies
      Tools, consumables, and supplies
      62938items
    • Design and production support
      Design and production support
      11701items
    • IT/Network
      IT/Network
      40950items
    • Office
      Office
      13068items
    • Business support services
      Business support services
      39946items
    • Seminars and Skill Development
      Seminars and Skill Development
      5816items
    • Pharmaceutical and food related
      Pharmaceutical and food related
      23070items
    • others
      59305items
  • Search for companies by industry

    • Manufacturing and processing contract
      7356
    • others
      5052
    • Industrial Machinery
      4435
    • Machine elements and parts
      3289
    • Other manufacturing
      2871
    • IT/Telecommunications
      2516
    • Trading company/Wholesale
      2454
    • Industrial Electrical Equipment
      2318
    • Building materials, supplies and fixtures
      1821
    • software
      1652
    • Electronic Components and Semiconductors
      1574
    • Resin/Plastic
      1494
    • Service Industry
      1401
    • Testing, Analysis and Measurement
      1132
    • Ferrous/Non-ferrous metals
      980
    • environment
      702
    • Chemical
      631
    • Automobiles and Transportation Equipment
      560
    • Printing Industry
      506
    • Information and Communications
      431
    • Consumer Electronics
      422
    • Energy
      321
    • Rubber products
      311
    • Food Machinery
      305
    • Optical Instruments
      284
    • robot
      269
    • fiber
      250
    • Paper and pulp
      232
    • Electricity, Gas and Water Industry
      173
    • Pharmaceuticals and Biotechnology
      165
    • Warehousing and transport related industries
      145
    • Glass and clay products
      142
    • Food and Beverage
      134
    • CAD/CAM
      121
    • Educational and Research Institutions
      108
    • retail
      106
    • Medical Devices
      99
    • Ceramics
      95
    • wood
      87
    • Transportation
      83
    • Medical and Welfare
      61
    • Petroleum and coal products
      60
    • Shipbuilding and heavy machinery
      53
    • Aviation & Aerospace
      47
    • Fisheries, Agriculture and Forestry
      39
    • self-employed
      23
    • Public interest/special/independent administrative agency
      19
    • equipment
      19
    • Mining
      17
    • Materials
      15
    • Research and development equipment and devices
      14
    • Finance, securities and insurance
      13
    • Government
      13
    • Individual
      10
    • Restaurants and accommodations
      8
    • Police, Fire Department, Self-Defense Forces
      7
    • cosmetics
      7
    • Laboratory Equipment and Consumables
      3
    • Contracted research
      3
    • Raw materials for reagents and chemicals
      2
  • Special Features
  • Ranking

    • Overall Products Ranking
    • Overall Company Ranking
Search for Products
  • Search for products by classification category

  • Electronic Components and Modules
  • Machinery Parts
  • Manufacturing and processing machinery
  • Scientific and Physics Equipment
  • Materials
  • Measurement and Analysis
  • Image Processing
  • Control and Electrical Equipment
  • Tools, consumables, and supplies
  • Design and production support
  • IT/Network
  • Office
  • Business support services
  • Seminars and Skill Development
  • Pharmaceutical and food related
  • others
Search for Companies
  • Search for companies by industry

  • Manufacturing and processing contract
  • others
  • Industrial Machinery
  • Machine elements and parts
  • Other manufacturing
  • IT/Telecommunications
  • Trading company/Wholesale
  • Industrial Electrical Equipment
  • Building materials, supplies and fixtures
  • software
  • Electronic Components and Semiconductors
  • Resin/Plastic
  • Service Industry
  • Testing, Analysis and Measurement
  • Ferrous/Non-ferrous metals
  • environment
  • Chemical
  • Automobiles and Transportation Equipment
  • Printing Industry
  • Information and Communications
  • Consumer Electronics
  • Energy
  • Rubber products
  • Food Machinery
  • Optical Instruments
  • robot
  • fiber
  • Paper and pulp
  • Electricity, Gas and Water Industry
  • Pharmaceuticals and Biotechnology
  • Warehousing and transport related industries
  • Glass and clay products
  • Food and Beverage
  • CAD/CAM
  • Educational and Research Institutions
  • retail
  • Medical Devices
  • Ceramics
  • wood
  • Transportation
  • Medical and Welfare
  • Petroleum and coal products
  • Shipbuilding and heavy machinery
  • Aviation & Aerospace
  • Fisheries, Agriculture and Forestry
  • self-employed
  • Public interest/special/independent administrative agency
  • equipment
  • Mining
  • Materials
  • Research and development equipment and devices
  • Finance, securities and insurance
  • Government
  • Individual
  • Restaurants and accommodations
  • Police, Fire Department, Self-Defense Forces
  • cosmetics
  • Laboratory Equipment and Consumables
  • Contracted research
  • Raw materials for reagents and chemicals
Special Features
Ranking
  • Overall Products Ranking
  • Overall Company Ranking
  • privacy policy
  • terms of service
  • About Us
  • Careers
  • Advertising
  1. Home
  2. IT/Telecommunications
  3. 飛天ジャパン
  4. Product/Service List
IT/Telecommunications
  • Added to bookmarks

    Bookmarks list

    Bookmark has been removed

    Bookmarks list

    You can't add any more bookmarks

    By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

    Free membership registration

飛天ジャパン

EstablishmentMarch 7, 2006
capital1600Ten thousand
addressTokyo/Chuo-ku/9-3 Koamicho, Nihonbashi, Canal Tower 4F/7F
phone03-3668-6668
  • Official site
last updated:Jun 09, 2022
飛天ジャパンlogo
  • Contact this company

    Contact Us Online
  • Company information
  • Products/Services(49)
  • catalog(19)
  • news(0)

飛天ジャパン List of Products and Services

  • category

1~45 item / All 49 items

Displayed results

class="retina-image"

OTP token "c610" *Free trial version available for loan.

A dedicated device for OTP token authentication as an alternative to smartphone apps.

The OTP token "c610" is an authenticator that generates a multi-factor authentication (MFA) one-time password (6-digit number). Registration is completed simply by having the user scan the displayed QR code with this product. Therefore, it can be operated without placing a burden on the administrator. It can be used as an alternative to the mobile authenticator app for employees who are not provided with a company mobile phone. 【Features】 ■ Easy to implement ■ Easy to operate ■ Peace of mind even without a smartphone ■ Compliant with OATH standards ★ Please apply for a free trial version through the "Contact Us" section ★ * For more details, please refer to the PDF document or feel free to contact us.

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Driverless USB dongle "ROCKEY2" *Free trial version available for loan.

A USB dongle that achieves overwhelming cost performance!

The "ROCKEY2" is a driverless USB dongle with a simple design that offers excellent cost performance. Being driverless, it can be easily used by simply connecting it to a PC. You can choose between two protection methods: using the API or the included tools, making it easy to protect both existing and newly developed software. 【Features】 ■ Equipped with a generous memory capacity of 2,560 bytes ■ Existing software without source code can also be protected using the ROCKEY2 envelope tool ■ Various software protections are possible by utilizing the ROCKEY2 API ■ Achieves outstanding cost-effectiveness with excellent cost performance ★ Please apply for a free trial version through "Contact Us" ★ *For more details, please download the PDF or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

USB dongle "ROCKEY4ND" *Free trial version available for loan.

Industry-leading anti-piracy dongle!

"ROCKEY4ND" is a high-performance, high-functionality driverless dongle that incorporates anti-tampering body and onboard encryption engine. By utilizing the API, powerful protection can be implemented, and existing applications can also be protected using the ROCKEY4ND envelope tool. 【Features】 ■ Driverless, so it can be used simply by connecting it to a PC ■ In addition to the A1 standard package, an E5 compact package has been added ★ Please apply for a free trial version through "Contact Us" ★ * For more details, please download the PDF or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

FIDO security key *Free trial available for loan

Authentication that balances security and convenience! Towards a world without passwords with easier and stronger authentication!

When it comes to web authentication, passwords are the standard, but they come with the disadvantages of information leakage risks and the hassle of management. Recently, attention has turned to the authentication standard 'FIDO' that achieves both security and convenience without using passwords. FIDO is expected to become the de facto standard for online authentication. Please feel free to contact us for more details. 【Features of FIDO Security Key】 ■ High Security There is no risk of information leakage as confidential information is not shared with the server, making it safe. ■ Easy Operation Authentication is completed with simple actions, eliminating the need to rely on memory. ■ Peace of Mind with International Security Standards It is expected to become the de facto standard for online authentication. ★ Please apply for a free trial version through the "Contact Us" section. ★ *For more details, please refer to the related links or feel free to contact us.*

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Fingerprint authentication device 'BioPass FIDO2' *Free trial version available for loan.

Password-free fingerprint authentication device! Next-generation authentication that balances security and convenience.

"BioPass FIDO2" is a password-free fingerprint authentication device. It is the next-generation authentication FIDO that balances security and convenience. Since it does not share sensitive information with the server, there is no risk of information leakage, making it safe. This device alone enables two-factor authentication and securely stores biometric information. 【Features】 ■ Passwordless ■ Achieves two-factor authentication with this device alone ■ Securely stores biometric information ■ Usable across multiple services ■ Authentication is completed with a simple operation, without needing to rely on memory ★ Please apply for a free trial version through "Contact Us"★ *For more details, please refer to the PDF document or feel free to contact us.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Authentication device "OTP Token" *Free trial version available for loan.

Generate a one-time disposable password! It enables stronger authentication than a fixed password.

The "One-Time Password (OTP) Token" is an authentication device that enables stronger authentication than fixed passwords. It generates a one-time disposable password to identify users, allowing for access restrictions to important applications and confidential information. Compliant with the OATH standard, it can be integrated with other OATH-compliant products from different manufacturers, providing a high-quality solution. 【Features】 ■ Provides compatibility with third-party software due to OATH standard compliance ■ Does not require connection to a PC, so end users do not need to install drivers or applications ■ Pressing the button on the token displays a one-time disposable password, eliminating the need to remember it ■ Capable of integration with various applications ■ Portable design for easy carrying ★ To request a free trial version, please apply through "Contact Us" ★ *For more details, please refer to the PDF document or feel free to contact us.*

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

One-Time Password Token "C200" *Free trial version available for loan.

Compliant with OATH's TOTP (Time-based One-time Password Algorithm)!

The "C200" is a one-time password token that generates a one-time password at regular intervals, enabling two-factor authentication during login. The display of battery remaining allows for risk hedging against battery depletion in advance, such as by facilitating replacements or stock management. 【Our OTP Features】 ■ High security ■ High convenience ■ Low cost ■ Usable for a wide range of applications ■ Customizable design ★ Please apply for a free trial version through the "Contact Us" section ★ *For more details, please download the PDF or feel free to contact us.*

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Authentication device "ePass USB Token" *Free trial version available for loan.

Prevent fraud with enhanced authentication! It is possible to integrate with various authentication solutions compliant with PKI.

The "ePass USB Token" is a two-factor authentication device that securely stores user information and prevents unauthorized access through impersonation. Equipped with advanced encryption algorithms, it securely stores important personal authentication information (electronic certificates, private keys, user IDs/passwords). It robustly protects against threats such as data leakage and tampering due to impersonation. It can be integrated with various authentication solutions compliant with PKI. 【Features】 ■ Prevents unauthorized access with enhanced authentication ■ Supports multi-access ■ Two-factor authentication ■ Easy integration ■ A wide range of product lineup tailored to usage needs ★ Please apply for a free trial version through "Contact Us" ★ *For more details, please refer to the PDF document or feel free to contact us.*

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cloud authentication service "Raku-Nin" *Free trial version available for loan.

"Cloud Authentication Service" that allows you to choose from multiple authentication methods.

"Raku-Nin" is a cloud authentication service that enables two-factor authentication and two-step verification by being integrated into systems. You can choose from multiple authentication methods to add. It can be developed and implemented in a short period of time, and it is priced significantly lower than other cloud services. 【Features】 ■ Excellent usability ■ Simplification through cloud services ■ Compatible with various systems ■ Peace of mind with international security standards ■ Utilizes domestic servers ★ Please apply for a free trial version through "Contact Us" ★ *For more details, please download the PDF or feel free to contact us.*

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

PC terminal login control "SecureCore" *Free trial version available for loan.

Protecting logon to PC terminals with enhanced security! Reducing operational burden when using USB keys.

"SecureCore" is software that controls logon to Windows PCs using a USB key (ePass token) as a physical "key." With the administrator software, it is easy to add and register USB tokens. Policy settings can also be freely modified. You can consolidate and store various website IDs and passwords within the USB token, allowing for automatic authentication simply by accessing websites with Internet Explorer. 【Features】 ■ Logging function included ■ Two-factor authentication combined with ID and password ■ One-time password issuance available ■ Can store electronic certificates ■ Policy settings can be freely changed ★ To request a free trial version, please apply through "Contact Us" ★ * For more details, please refer to the PDF materials or feel free to contact us.

  • Encryption and authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Tokens/Security keys available for Azure AD authentication

Many domestic customers are using it! Introducing 'basic features', 'implementation benefits', and 'authentication methods'.

This blog introduces "Tokens/Security Keys Available with Azure AD Authentication." Microsoft's Azure AD (Active Directory) is used as the authentication infrastructure for various cloud services, including "Microsoft 365." Users can utilize authentication methods that use traditional usernames and passwords, as well as authentication methods that use "FIDO2" security keys and OTP tokens compliant with OATH. Additionally, it is possible to supplement or replace the basic password with additional authentication methods, thereby enhancing security. [Contents] ■ The extensive network of Azure spanning countries and regions ■ Azure AD supporting sign-ins to services like Microsoft 365 ■ Basic features of Azure AD ■ Benefits of implementing Azure AD ■ Authentication methods of Azure AD *For more details, you can view the blog through the related links. *For more information, please refer to the PDF materials or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

FIDO keys/OTP tokens for Azure AD multi-factor authentication.

Support for Azure AD multi-factor authentication with hardware tokens! Choose products that suit your needs. *Free trial available.

The challenges faced by Azure AD users contacting our company include: "We want to distribute hardware tokens for MFA to employees who do not have company-issued smartphones," and "Since remote work has become widespread across the company, we want to implement Azure AD multi-factor authentication to enhance security." The "FIDO Security Key" enables passwordless authentication using PIN/biometric authentication through FIDO2. Additionally, the "One-Time Password (OTP) Token" allows you to choose between 30-second and 60-second types, and it displays the battery level, reducing the risk of running out of battery. 【Features of the FIDO Security Key】 ■ Achieves passwordless authentication using PIN/biometric authentication through FIDO2 ■ Designed to replace traditional authentication with strong hardware-based authentication using public key cryptography to protect against various cyber attacks ■ A rich lineup of options ★ Please apply for a free trial version through "Contact Us" ★ *For more details, please refer to the PDF document or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Enhancing security with Azure AD device authentication.

Enjoy the convenience of the cloud! Introducing security enhancement through device authentication in our blog.

This blog features a convenient service for managing authentication information in bulk. Microsoft's Azure Active Directory (AD) is used as the authentication foundation for various cloud services, including Microsoft 365. In addition to authentication methods using ID and password, device authentication can be added with FIDO security keys and OTP tokens compliant with OATH, enabling enhanced security through multi-factor authentication (MFA). [Content] ■ Maintaining the security level of cloud service authentication ■ Achieving MFA by adding FIDO security keys ■ Utilizing tokens for Azure AD authentication ■ Field sales representatives logging in on shared devices *For more details, you can view the related links. *For more information, please refer to the PDF materials or feel free to contact us.

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

FIDO security key for Salesforce multi-factor authentication.

Achieve strong two-factor authentication with simple operations! You can choose a product that suits your needs. *Free trial version available.

Salesforce has made multi-factor authentication (MFA) mandatory to address threats related to customer data protection, such as unauthorized access. The "FIDO Security Key" provides robust two-factor authentication with a simple operation: after entering your ID/password (U2F) or PIN (FIDO2), just touch the security key. You can choose from a range of products, including cost-effective options, those with fingerprint sensors, and USB-Type C compatible products that suit your needs. 【Features of the FIDO Security Key】 ■ FIDO2/U2F standard compliant ■ Wide variety of lineup ■ Easy operation ★ To request a free trial version, please apply through "Contact Us" ★ * For more details, please refer to the PDF document or feel free to contact us.

  • Other security
  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Implementation of mandatory MFA (Multi-Factor Authentication) for Salesforce.

Authentication enhancement by combining two or more elements! Protecting business and data from security threats.

This blog introduces the "Mandatory Implementation of MFA (Multi-Factor Authentication) for Salesforce." The customer relationship management (CRM) solution "Salesforce" made the use of multi-factor authentication (MFA) mandatory in February 2022. As the threat of unauthorized access continues to rise, the aim is to protect important information of client companies by enhancing security through the combination of two or more factors, rather than relying solely on ID and password. Since two-factor authentication via SMS or email alone cannot meet the requirements of mandatory multi-factor authentication, three authentication methods are recommended. [Contents] ■ Reasons why Salesforce requires MFA (Multi-Factor Authentication) ■ Responding to rapidly changing threats ■ What MFA (Multi-Factor Authentication) methods does Salesforce recommend? *For more details, you can view the blog through the related links. *For more information, please refer to the PDF document or feel free to contact us.

  • Personal authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What is a physical security key that achieves robust security and convenience?

Used like a physical key! No need to enter passwords or passcodes.

In this blog, we introduce "Physical Security Keys that Achieve Strong Security and Convenience." As online services become widely adopted, relying solely on passwords for authentication increases the risk of information leaks. Additionally, two-factor authentication using SMS (short message service) on smartphones can be cumbersome and time-consuming. Therefore, the use of security keys has gained attention as a measure to enhance corporate security. Since they are used like a physical key, authentication can be performed smoothly. [Content Overview] ■ FIDO-compliant security keys are becoming mainstream ■ "Possession" serves as identity verification ■ Effective in preventing phishing scams ■ The necessity of multi-factor authentication is progressing, expanding its usage *For more details, you can view the related links. *For more information, please refer to the PDF materials or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Caution when using VPN during remote access such as telework.

Strengthening security measures such as multi-factor authentication! Posting alerts from CISA.

This blog introduces precautions regarding the use of VPNs during remote access. A VPN establishes a virtual private line over the internet, ensuring a secure route for exchanging important information, thereby protecting confidential data from security threats such as "eavesdropping" and "tampering." To prevent the spread of viruses, companies implementing telework, such as remote work from home, are rapidly increasing. As phishing attacks targeting remote workers are also on the rise, there is a growing demand for enhanced security measures, such as multi-factor authentication, when using VPNs during remote access. [Contents] ■ Alerts from the Cybersecurity and Infrastructure Security Agency (CISA) ■ Applying security patches to devices used for remote access ■ Reasons for implementing multi-factor authentication in VPN connections *For more details, please refer to the related links. *For more information, please consult the PDF materials or feel free to contact us.

  • Encryption and authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Strengthening security with two-factor authentication.

Explaining the advantages and disadvantages of major authentication methods! Introducing 'Raku-nin,' which adopts a multi-authentication method.

Two Factor Authentication (2FA) is a system that uses two elements to authenticate a user. For a long time, authentication using an ID and password has been common, but this is an authentication method based on a single element, "ID + password." In recent years, there have been continuous incidents of account information leaks, and it has been pointed out that authentication based on a single element poses security issues. Two Factor Authentication requires two out of the three elements of authentication to be present for the authentication to be successful, significantly enhancing the strength of the authentication. In this blog, we introduce examples of Two Factor Authentication. Please take a moment to read it. [Contents] ■ What is Two Factor Authentication? ■ Advantages and disadvantages of major authentication methods ■ Why is password authentication problematic? ■ Combining different authentication methods *Detailed content of the blog can be viewed through related links. *For more information, please refer to the PDF materials or feel free to contact us.

  • Personal authentication
  • Encryption and authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Implementing multi-factor authentication at low cost with authentication tokens.

User operations are simple! Use a one-time password authentication token.

This blog introduces "MFA (Multi-Factor Authentication)" that can be implemented at a low cost. Multi-factor authentication, which requires two or more authentication factors, has become essential for web services provided by major companies. MFA using one-time password authentication tokens can be implemented at a low cost, and while user operations are simple, it enhances security, leading to an increase in its adoption. [Contents] ■ Multi-factor authentication (MFA) for services of major IT companies ■ Easy-to-use one-time password (OTP) tokens ■ Providing robust security even in online banking * For more details, you can view the related links. * For more information, please refer to the PDF materials or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Online authentication FIDO security key *Free trial available

To prevent the sharing of confidential information with the server, the risk of password leakage is zero! Peace of mind with international security standards.

The FIDO security key is a next-generation authentication technology that balances security and convenience without using passwords. Since it does not transmit authentication information over the network or store it on servers, there is no risk of password leakage. In today's world, where online services are widely adopted, it is being used by many individuals and companies as a next-generation authentication technology that replaces password authentication. The FIDO Alliance, the organization that develops the standards, includes leading companies in the IT industry such as Google, Microsoft, and Yahoo, and the number of member companies is increasing year by year. 【Features of the FIDO Security Key】 ■ High Security There is no risk of information leakage as confidential information is not shared with the server. ■ Easy Operation Authentication is completed with simple actions, eliminating the need to rely on memory. ■ Peace of Mind with International Security Standards It is expected to become the de facto standard for online authentication. ★ Please apply for a free trial version through "Contact Us" ★ *For more details, please refer to the related links or feel free to contact us.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Achieving Two-Factor Authentication 'SecureCore For BioPass'

Windows login enters the passwordless era! Protected with advanced security.

"SecureCore For BioPass" is a solution that enables passwordless two-factor authentication by utilizing a fingerprint authentication device. By inserting the fingerprint authentication device "BioPass" as a physical "key" into the PC, you can log on. If the BioPass is removed during use, the PC will be locked, preventing unauthorized use. Since it is a fingerprint authentication device compliant with FIDO (international standard), you can use multiple FIDO services with this one security device. 【Features】 ■ Equipped with logging functionality ■ Can issue one-time passwords ■ User-friendly GUI interface for IT administrators ■ Policy setting tools allow for pre-configuration of restrictions ■ Usable with the three factors of " possession" + "biometrics" + "knowledge (password)" *For more details, please refer to the PDF document or feel free to contact us.

  • Encryption and authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Two-Factor Authentication System 'SecureVisit' *Free Trial Available

Two-factor authentication system using USB keys and one-time password tokens!

"SecureVisit" is a web authentication enhancement solution that achieves higher security than traditional authentication methods through a robust two-factor authentication system utilizing USB keys or one-time password tokens. It can be easily implemented without the need to modify existing web servers. It is suitable for customers managing corporate web services with just an ID and password. 【Features】 ■ Advanced devices that enable two-factor authentication ■ Easy implementation, construction, and operation ■ Low implementation and operational costs ■ Flexible support for large corporations to small and medium-sized enterprises ★ Please apply for a free trial version from "Contact Us" ★ *For more details, please download the PDF or feel free to contact us.*

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

OTP authentication system "FOAS" *Free trial version available for loan.

Easily add one-time password authentication to existing systems! Strengthen the authentication of your company's web services.

"FOAS" is a robust OTP authentication system required in the cloud era. It enhances the security level of authentication using one-time password tokens. It strengthens authentication across various information devices such as PCs, tablet PCs, and smartphones. It enables the implementation of high security at a low cost. 【Features】 ■ Easily add strong authentication ■ Compatible with various systems for interoperability ■ Usable regardless of the format of information devices ■ Low implementation cost ■ Easy to switch from other authentication servers compliant with the international standard OATH ■ Custom integration using APIs is possible ★ Please apply for a free trial version from "Contact Us" ★ *For more details, please refer to the PDF materials or feel free to contact us.*

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

File Encryption "SecureCore DSE" *Free trial version available for loan

Prevent information leaks caused by human error! This is a product that achieves cost performance.

"SecureCore DSE" is software that creates a secure internal environment by installing it on all company computers. Files of target applications generated within this product are instantly encrypted. It prevents any gaps and protects against the leakage of confidential information during work. It packages various security features into an all-in-one solution, significantly reducing not only the cost of the product itself but also the total costs associated with information leakage prevention. 【Features】 ■ Prevents internal crimes ■ Controls external media and communication devices ■ Even if an email is mistakenly sent, the file remains encrypted ■ Simplified initial setup and a non-complicated system reduce the burden on administrators ■ Provides a response that does not interfere with customer operations, balancing productivity and security ★ Please apply for a free trial version through "Contact Us" ★ *For more details, please refer to the PDF materials or feel free to contact us.*

  • Encryption and authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Data encryption tool 'SecureCore SFE'

A data encryption solution that does not require a management server!

"SecureCore SFE" is a client PC-based encryption application that easily implements advanced encryption and automatic password assignment for data on file servers and NAS. If advanced encryption and password authentication are applied to data in the event of a confidential data leak, reporting to the Personal Information Protection Commission becomes unnecessary, significantly reducing "threats and risks of cybercrime," "strengthened penalties under the Personal Information Protection Act," and "indirect risks related to information leakage." 【Features】 ■ Functional Aspects - Adopts advanced encryption (AES government recommended) - Encrypts data from various applications ■ Operational Aspects - Simply place this program in the shared folder of the file server or NAS to start operation ■ Management Aspects - No need for a management server or individual client installation work - No performance issues *For more details, please download the PDF or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IoT platform "IoT Cube"/Pay BOX

No major modifications to existing equipment are required for the introduction! Centralized management of sales remotely.

The IoT platform "IoT Cube"/Pay BOX brings offline devices online and allows coin-operated machines to accept both cash and cashless payments. Through internet connectivity, it is possible to remotely obtain sales, operational status, and marketing information. It also enables management of change, inventory management of prizes, changes in fees, and monitoring of machine troubles. 【Features】 ■ Centralized management of cash and cashless payment sales remotely ■ Reduction of human resources ■ Decrease in vending machine losses = Increase in sales ■ Easy and inexpensive implementation in a short period *For more details, please refer to the PDF document or feel free to contact us.

  • Sales Management

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Temperature check capable / Optimal AI facial recognition terminal for system integration

A wide range of highly scalable AI facial recognition terminals available!

We provide AI facial recognition terminals that allow for safe and unmanned management of entrance, store entry, and room access. In addition to temperature measurement, it can also determine whether a mask is being worn. Furthermore, it can be integrated with existing systems such as electric locks and attendance management. 【Product Lineup】 ■Elite [TI] ■ProFace X [TI] ■SpeedFace-V5L [TI] *For more details, please download the PDF or feel free to contact us.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI facial recognition module suitable for embedded development.

This is a face recognition module suitable for embedded development in various devices. By integrating it into machine tools and factory equipment, it is also possible to restrict the operations of workers.

The "AI Face Recognition Module" is a product well-suited for embedded development in on-premises systems, client PCs, and various devices' fixtures, enclosures, and panels. It is capable of estimating age, gender, and emotions, making it usable for marketing purposes when integrated into various devices. We offer a rich lineup, including the "FA51M/FA51MC," which can also perform palm recognition and mask detection, so please feel free to contact us. 【Features】 ■ Face Recognition ■ Age Estimation ■ Gender Estimation ■ Emotion Estimation ■ Biometric Verification ■ USB Connection *For more details, please refer to the related links or feel free to contact us.

  • Personal authentication
  • Other embedded systems (software and hardware)
  • Other electronic parts

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

QR code payment terminal

Equipped with high-quality and robust security! It can be used in various situations such as restaurants and delivery destinations.

We offer a range of high-quality, robust security-equipped QR code payment terminals. Starting with the "ePayPOS QE41," which intentionally limits its features to keep costs down, and including the "SCITUS F40," which is equipped with Android 7.0 and a high-speed thermal printer, we have a rich lineup. These terminals can be utilized in a wide variety of settings, such as retail stores and outdoor events. 【Features】 <ePayPOS QE41> ■ Double display ■ Cordless ■ Dedicated scanning window *For more details, please refer to the PDF materials or feel free to contact us.

  • 2D Code Reader

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What devices are suitable for multi-factor authentication (MFA)?

Prevent unauthorized login by impersonation! Introducing appropriate MFA devices in our blog.

This blog features devices suitable for multi-factor authentication. As the risks of unauthorized access through password-only authentication are being pointed out, many internet-related services are beginning to implement multi-factor authentication as part of their security enhancements. We have seen an increase in inquiries about using hardware as MFA devices, including cases where everyday smartphones are utilized, as well as various types such as physical security keys and hardware tokens that display one-time passwords. [Content Featured] ■ Utilizing smartphones as familiar MFA devices ■ "Physical security keys" that are inserted like a key for authentication ■ MFA devices that display one-time passwords ■ FIDO security keys for MFA in Azure AD and Salesforce *For more details about the blog, you can view it through the related links. *For more information, please refer to the PDF materials or feel free to contact us.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What are the benefits of passwordless authentication?

It's possible to save costs! Introducing the benefits of passwordless authentication in a blog.

This blog discusses the benefits of adopting passwordless authentication. Authentication using ID/password is exposed to the risk of "unauthorized access" if the password is leaked to a third party. To protect important information and assets of individuals and companies from malicious unauthorized access, passwordless authentication, which does not use passwords, is gaining attention. [Content] ■ Risk reduction through multi-factor authentication (MFA) such as "biometric authentication" ■ Utilizing the passwordless authentication standard "FIDO" that balances security and convenience ■ Liberation from the stress of password management * For more details, you can view the related links. * For more information, please refer to the PDF document or feel free to contact us.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

On-premises? Cloud? What is the suitable authentication solution?

Ensuring safety! Introducing security solutions in our blog.

This blog features suitable authentication solutions. The IT environments of companies are diversifying, ranging from traditional on-premises systems to cloud-based systems, and it is necessary to consider the implementation of authentication security that fits their own systems. In response to these changes in the environment, more companies are adopting authentication solutions that incorporate multi-factor authentication, such as the use of one-time password tokens and security keys. [Content] ■ Addressing the risks of entrusting data to cloud services ■ The increase of hybrid on-premises and cloud systems necessitates a response to diversification ■ "Zero Trust Security," which perceives internal and external network environments as borderless *Detailed content of the blog can be viewed through related links. *For more information, please refer to the PDF materials or feel free to contact us.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Advantages and disadvantages of one-time password authentication.

Effective for enhancing security! By combining 'multi-factor authentication,' it is also possible to increase safety further.

This blog discusses the advantages and disadvantages of one-time password authentication. One-time passwords are gaining renewed attention as a system to enhance login authentication security. Unlike traditional ID/password authentication methods, one-time passwords utilize a disposable password that can be used only once, significantly improving the level of security. [Content] - Strengthening authentication with user-friendly one-time passwords - New attack methods targeting one-time passwords - Utilizing multi-factor authentication in the cloud service authentication infrastructure "Azure AD" *For more details, you can view the related links. *For more information, please refer to the PDF document or feel free to contact us.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cashless with IoT devices

Optimization of management resources is also possible! Introducing cashless solutions with IoT devices in our blog.

This blog discusses how to enable cashless transactions using IoT devices. In Japan, there are many coin-operated machines that require coins to provide services. However, by utilizing these IoT devices and evolving them into online machines, solutions that enable cashless payments are gaining attention. Transforming coin-operated machines to support cashless payments and online capabilities can lead to various management improvement effects. [Content] - The risk of missing business opportunities with offline machines alone - Affordable retrofitting of cashless functions using IoT devices - Diverse payment methods, comprehensive support, easy implementation... *For more details, please refer to the related links. *For further information, please check the PDF materials or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

To prevent unauthorized use of licenses

You can keep track of the expiration date! An effective way to prevent license violations is introduced in the blog.

This blog discusses ways to prevent the misuse of licenses. Software license violations pose a significant risk to companies and organizations. If you are unaware of the dangers and are using software illegally in your operations, you may face not only fines but also a loss of social credibility. To avoid this, it is essential to thoroughly implement "license management," understand the contract periods of software, and utilize "protection tools" such as dongles to prevent unauthorized use. [Contents] ■ The risk of having to pay multiples of the usage fee if a license violation occurs ■ Assembling necessary software and managing licenses properly ■ The benefits of managing software licenses ■ Utilizing cost-effective protection tools *For more details, you can view the related links. *For more information, please refer to the PDF materials or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Authentication in Zero Trust

Achieving a robust security network! Introducing Zero Trust in our blog.

This blog discusses the zero trust approach to user authentication. With the advancement of mobile devices such as laptops and tablets, there is an increasing trend of telecommuting in business scenes away from the office. While there are benefits from this digital transformation, the security risks targeting information, which is a critical asset for companies, are also on the rise. The first barrier to reducing the risk of information leakage from both external and internal sources is the zero trust approach to user authentication. [Content] ■ Zero Trust = Trust no one ■ Zero Trust authentication through Multi-Factor Authentication (MFA) ■ Preventing information leakage due to internal misconduct ■ Low-cost, efficient management is key to improving productivity * For more details, you can view the blog through the related links. * For more information, please refer to the PDF materials or feel free to contact us.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Prevent information leakage with file encryption software.

Enhance your security level! Introducing ways to prevent information leaks on the blog.

This blog discusses measures against information leakage using file encryption software. File encryption is the process of converting certain data into another form through special processing. To view encrypted data, it is necessary to decrypt the file using a "key," such as a password. By using file encryption software, even if data falls into the hands of a third party, its contents cannot be read. [Content] ■ Loss of customer trust if information leakage occurs ■ Software that automatically performs encryption is gaining attention ■ Choose based on the overall cost-performance ratio of information leakage countermeasures * For more details, you can view the related links. * For more information, please refer to the PDF materials or feel free to contact us.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IoT platform Pay BOX can be easily and affordably implemented!

We solve the challenges of coin-operated machines, leading to improved labor productivity and efficiency in operations!

The IoT platform "IoT Cube"/Pay BOX enables remote centralized management of cash and sales, monitoring of machine operation conditions, and inventory management of prizes. By being able to grasp the situation remotely, it is expected to reduce labor costs and improve sales. It can be implemented easily and at a low cost in a short period, making it accessible for many small and medium-sized businesses. 【Features】 ■ Centralized management of cash and cashless payment sales remotely ■ Reduction of human resources ■ Decrease in vending machine losses = Increase in sales ■ Easy and inexpensive implementation in a short period *For more details, please refer to the PDF document or feel free to contact us.

  • Sales Management

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Accelerating the integration of facial recognition with existing systems.

It is possible to avoid troubles! Introducing the facial recognition system in the blog.

This blog discusses methods to simultaneously enhance security and implement infection control measures. There is an increasing effort to strengthen security by integrating facial recognition with existing systems. Due to its high accuracy in preventing impersonation and its hygienic nature, there are more cases of implementing facial recognition in system integration in response to the spread of viruses. [Content] ■ Strengthening security through impersonation prevention ■ Enabling contactless, walk-through authentication ■ Entire apartment building equipped with facial recognition * For more details, you can view the related links. * For more information, please refer to the PDF materials or feel free to contact us.

  • Personal authentication
  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Face recognition edge device suitable for system integration.

Introducing edge devices with diverse features and excellent scalability in our blog!

This blog features information about system integration with facial recognition edge devices. Facial recognition edge devices are on-site terminals that verify identity using facial recognition. Thanks to the Internet of Things (IoT), they can now integrate with systems that provide various functions via the internet. Their applications are expanding in facilities such as companies, schools, hospitals, and apartment complexes for purposes like access control, attendance management, and enhancing security. [Content Featured] - Edge devices that excel in speed, cost, flexibility, and scalability - Examples of system integration with facial recognition edge devices *For more details, you can view the related links. *For more information, please refer to the PDF materials or feel free to contact us.

  • Personal authentication
  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI temperature measurement terminals are gaining attention for virus prevention! Detecting lack of masks and abnormal body temperatures.

Demonstrating high authentication accuracy! Introducing an AI facial recognition terminal that can also measure temperature in a blog.

This blog features AI facial recognition terminals that can also measure body temperature. Our company sells the AI recognition terminals "SpeedFace-V5L/ProFace X," which enable contactless facial and palm recognition, to businesses such as offices and factories, as well as schools and clinics. Without touching the terminal, it alerts users through screen displays and alarm sounds when it detects individuals without masks or with abnormal body temperatures, making it a noteworthy measure for effective virus infection prevention. [Content] - AI-based body temperature measurement, providing advanced and reliable access control support - AI recognition through walk-through, detecting abnormalities and issuing warnings *For more details, you can view the related links. *For more information, please refer to the PDF materials or feel free to contact us.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A facial recognition system suitable for managing office entry and exit.

Introducing a facial recognition system on the blog that also enhances security!

This blog features a facial recognition system that is well-suited for office access management. The facial recognition system is an authentication method that identifies individuals by matching facial information captured by a camera with a database. It is a secure authentication method that makes impersonation and other fraudulent activities difficult, and it does not require the setting of passwords. It is non-contact and highly convenient, resulting in less psychological burden for users. [Content Included] ■ What is a facial recognition system? ■ AI image recognition technology and its accuracy ■ Well-suited for office access management ■ Benefits of implementation *For more details, you can view the related links. *For more information, please refer to the PDF materials or feel free to contact us.

  • Entrance and exit control system
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What is a FIDO passkey that encourages passwordless authentication?

Authentication credentials are available! Introducing security keys in our blog.

This blog provides detailed information about "FIDO Passkeys." This product is a new security technology that replaces passwords. The "FIDO Alliance" and the "World Wide Web Consortium" are working together to develop it, and the three major U.S. IT companies—Google, Microsoft, and Apple—have announced plans to support it as a standard for passwordless sign-in. [Content] ■ Solving the challenges of reconfiguration with multi-device support ■ Supported by Google, Microsoft, and Apple ■ Synchronizing cryptographic keys belonging to FIDO Passkeys across devices * You can view the detailed content of the blog through the related links. * For more information, please refer to the PDF document or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IoT platform "IoT Cube"/Pay BOX

Real-time tracking of cash and cashless sales is possible! You can also monitor machine troubles, allowing for timely maintenance and efficient operations.

The IoT platform "IoT Cube"/Pay BOX enables remote management of change and inventory for offline coin-operated machines. Therefore, it does not miss out on lost sales opportunities due to change shortages or out-of-stock prizes, which are challenges of offline coin machines. It is suitable for users of offline coin-operated devices such as coin laundries, arcade game machines, and massage machines. 【Features of Pay Box】 ■ Instantly identify and respond to machine troubles ■ Make bulk changes to pricing or products ■ Never miss change or prize shortages ■ Monitor sales remotely *For more details, please refer to the PDF document or feel free to contact us.

  • Sales Management

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Case Study Interview on Cloud Authentication Service - Applied Geology Co., Ltd.

The reason for choosing "Raku-nin" from Hiten Japan is its ease of operation! Case study of the certification service *Free trial version available for loan.

Applied Geology Co., Ltd. is a geological survey company / construction consulting company. Hiten Japan's "Raku-Nin" is used for authentication when private developers and house manufacturers, who are customers of the company, access the survey data related to ground and geology provided by the company. "It is a management system that can be understood without looking at the manual most of the time if you understand the system, and the user log management is well organized, which gives us peace of mind," is the feedback we have received. ★ Please apply for a free trial version from "Contact Us" ★ For detailed case information, please refer to the related links below. 【Case Overview】 ■ Implementation Site: Applied Geology Co., Ltd. ■ Implemented Product: Cloud Authentication Service "Raku-Nin" ■ Effects - After implementation, customers were able to switch without discomfort. - The replacement also enabled the use of software tokens. * For more details, please refer to the PDF materials or feel free to contact us.

  • Personal authentication
  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
Prev 12 Next
  • 省エネと品質・生産性向上へ 不良品率低減 作業環境改善 人手不足解消 廃棄物削減 鋳造現場に 加熱技術 排水処理に 水処理技術 検査工程に 自働化技術 カタログ&取組み紹介資料進呈
  • ASEANエリア タイ マレーシア シンガポール ベトナム フィリピン 電子部品保管に適した倉庫 保税・非保税の両方に対応した倉庫スペック 日本同様の高精度な在庫管理とピース単位の入出庫対応 拠点間を繋げるASEANのネットワーク
    • Contact this company

      Contact Us Online

    Products

    • Search for Products

    Company

    • Search for Companies

    Special Features

    • Special Features

    Ranking

    • Overall Products Ranking
    • Overall Company Ranking

    support

    • site map
    IPROS
    • privacy policy Regarding external transmission of information
    • terms of service
    • About Us
    • Careers
    • Advertising
    COPYRIGHT © 2001-2025 IPROS CORPORATION ALL RIGHTS RESERVED.
    Please note that the English text on this page is automatically translated and may contain inaccuracies.