List of Encryption and authentication products
- classification:Encryption and authentication
181~195 item / All 277 items
Achieves high collection efficiency through electrostatic methods. Offers a wide range of products from large to small sizes. Also compatible with water-soluble oil mist.
- air conditioning
Numerous case studies published! Encryption regardless of the app! A confidential file protection and management system "DataClasys" that prevents leaks while keeping operations unchanged.
- Encryption and authentication
- Other security
- Other security and surveillance systems
Distributing confidential files encrypted to domestic and international locations!
- Encryption and authentication
The best-selling model in the Elsafe series of electronic safes for guest rooms, boasting the highest number of installations in the world. Equipped with new security standards and a non-cylinder lock...
- Other security
- cabinet
- Encryption and authentication
We can provide consistent proposals from solutions to operation and maintenance!
- Other services
- Software (middle, driver, security, etc.)
- Encryption and authentication
No pre-registration required, one-time fingerprint authentication lockers! It significantly reduces the burden on the management side, such as the hassle of key management and fingerprint registration...
- Personal authentication
- locker
- Encryption and authentication
Invitation to Exhibit at the 10th School and Education Comprehensive Exhibition
We will be exhibiting at the "School Facilities and Services EXPO" held at Tokyo Big Sight from June 19 (Wednesday) to June 21 (Friday). At this exhibition, we will showcase our flagship product, the fingerprint authentication locker "Personal 1 Armor," as well as the IC card key authentication "PC Storage Box," "AV Rack," and "Delivery Box." Please be sure to stop by our booth! Booth number: A11-36
Protect any trivial information from leaks with 'Management BOX for Important Documents'! For those who distrust the cloud and struggle with tedious tasks!
- Document and Data Management
- Encryption and authentication
Guarantees the authenticity of all electronic data. Enables the enhancement of the security of electronic data through timestamps quickly and economically.
- Encryption and authentication
- Document and Data Management
- Internal Control and Operational Management
Free Timestamp Seminar for Intellectual Property Protection - Utilizing the Prior User Rights System as an IP Strategy and Managing Trade Secrets.
In the field of intellectual property protection, there has been a growing need in recent years to promote comprehensive strategies for the protection and utilization of intellectual property, such as "open & closed strategies" and trade secret management. This seminar will focus on how to effectively utilize the "prior user rights system" to enhance the effectiveness of closed strategies and how to use timestamps for trade secret management. Additionally, we will hold individual consultation sessions after the presentation. We encourage you to take this opportunity to participate. ● Date and Time (The content for all sessions is the same) ◆ The session on January 21 (Thursday) has been fully booked due to popular demand. Thank you. ● Participation Limit: ◆ 10 people * If there are many applications, we will accept participants on a first-come, first-served basis, and if full, we will provide separate guidance. * We may refuse participation from customers of competing companies. Thank you for your understanding. ● Seminar Overview 1: Basics of Timestamps ~ What can you do with timestamps? ~ 2: How to Protect Intellectual Property with Timestamps ~ Are the legal basis and overseas litigation okay? ~ 3: How to Actually Protect Intellectual Property (Demo) ~ The operation is simple. Let's try it out! ~
It is equipped with newly developed image compression technology and high security features.
- Encryption and authentication
Approximately 110,000 licenses with a wealth of implementation experience! Achieve email misdelivery prevention and encryption for "Microsoft Outlook" for just about 83 yen per month!
- Email/Fax transmission
- Encryption and authentication
- Corporate information portal/groupware
IoT secure authentication technology to prevent "spoofing" in device-to-device communication.
- Encryption and authentication
- Software (middle, driver, security, etc.)
- Embedded Board Computers
Shutting out suspicious individuals and outsiders! Strict restrictions on visitor access will be enforced.
- Entrance and exit control system
- Encryption and authentication
- Other security
Introducing LTE-X technology! LTE technology can now be provided across various infrastructures!
- Encryption and authentication
- Other network tools
- Server monitoring and network management tools
File Encryption System CS101
- Development support tools (ICE, emulators, debuggers, etc.)
- Data Erasing
- Encryption and authentication