List of Encryption and authentication products
- classification:Encryption and authentication
136~150 item / All 277 items
Achieves high collection efficiency through electrostatic methods. Offers a wide range of products from large to small sizes. Also compatible with water-soluble oil mist.
- air conditioning
Use commercially available USB devices as keys for PCs to lock unauthorized operations on Windows Server. It also supports USB connection restrictions for smartphones.
- Encryption and authentication
- others
- Other security
Encrypt files/folders ◆ Simply drag and drop data onto the application icon.
- Encryption and authentication
File/folder-level encryption software. Passwordless operation is also possible when used within a group.
- Encryption and authentication
Equipped with data leakage prevention features when transferring data to USB-connected storage (including smartphones).
- Encryption and authentication
- others
Ideal for My Number measures! Launch of the PC operation log collection software "LB Access Log 2 Pro" equipped with monitoring features and no server required.
Lifeboat Co., Ltd. (President Takahiro Yamazaki, Chiyoda-ku, Tokyo, TEL 03-3265-1250, URL http://www.lifeboat.jp/) will start selling "LB Access Log 2 Pro" (LB Access Log 2 Pro), a software developed by Es Computer that does not require a dedicated server and can collect and monitor PC operation logs, starting from February 15, 2016, through various sales agents, with a standard price of 22,000 yen (excluding tax) and up. In addition to collecting operation logs, it features the ability to take screenshots and notify administrators when specific actions are performed, monitor network traffic to detect unexpected data transmissions, and restrict the use of USB devices, among other diverse functionalities. It is an ideal software for monitoring PCs and collecting operation logs, particularly for enhancing the security of PCs handling My Number information. ● For more details on LB Access Log 2 Pro, please visit http://www.lifeboat.jp/products/alog2p/.
Create a secret area on removable media or HDD.
- Encryption and authentication
- others
Create an encrypted disk with simple operations by following the wizard.
- Encryption and authentication
- Other security
- others
Unauthorized USB memory - Shut out hard disks.
- Encryption and authentication
Encrypt various data on a file-by-file basis, regardless of file format or storage location!
- Encryption and authentication
Domestic engine development! Iris recognition technology, which is a touchless biometric authentication method.
- Personal authentication
- Personal authentication
- Encryption and authentication
We have released the English version of the iris recognition technology website.
We have officially released the English version of the "Iris Authentication Technology" and "Iris Authentication SDK" website (https://iris.pas-ta.io/en/). We have enhanced the technical and product information more than ever before, enabling information dissemination both domestically and internationally, and we will continue to strengthen our service offerings at a global level in the future.
Gradually realizing a "keyless" office.
- locker
- Encryption and authentication
- Personal authentication
A digital array that changes each time to prevent number inference! We propose the Air Gate System.
- Control Panel
- Entrance and exit control system
- Encryption and authentication
Abolishing the mailing of USB memory! Introducing a case that achieves safe and speedy delivery (Crypto Delivery).
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Achieving a speedup in business operations! Introducing a case study that significantly reduced the production time for design (Crypto Delivery).
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Introducing a case study that achieved enhanced security and single sign-on with the internal information infrastructure! (Crypto Delivery)
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Send all documents encrypted with TLS! A case study of achieving secure file transfer (Crypto Delivery).
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software