1~2 item / All 2 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~2 item / All 2 items
With the start of the My Number system and other developments, security measures for devices that store highly confidential data have become increasingly important. '@SECURE/fv' is software that uses finger vein authentication, which identifies users based on the shape of their finger veins, to log onto devices. If you want to implement biometric authentication but have concerns such as "I can't use fingerprint authentication because my fingerprints are faint" or "Isn't facial recognition easily faked?", please consider using finger vein authentication. 【Benefits of Implementation】 - No need to worry about faint fingerprints or difficulties in reading due to dryness, as with fingerprint authentication. - No need to worry about forgetting or losing like with IC cards or security tokens. - Easy registration from a single device without the need for a server. - Supports two-factor authentication that identifies and verifies using both password authentication and biometric authentication. - Compatible with logging into Mac. *For more details, please contact us or download the PDF.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe "NTFS Analyzer" is a file server access rights inventory support tool that visualizes access rights from various perspectives. It allows for automatic retrieval of access rights at the domain and file server level, viewing access rights at the folder level, and searching by username, folder name, or granted access rights. 【Capabilities】 ■ Viewing access rights by group ■ Viewing access rights granted to users ■ CSV output of viewing results ■ Snapshot (Access rights at the time of data retrieval can be viewed at any time) and more *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration