List of Encryption and authentication products
- classification:Encryption and authentication
76~90 item / All 270 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Virtual function-equipped SSL-VPN remote access solution
- Firewall and intrusion prevention
- Encryption and authentication
- Personal authentication
Ideal for BYOD, no dedicated app required, prevents information leakage from smart devices.
Logical Tech Co., Ltd. will start selling its information leakage prevention system "LOCK STAR-SGateM" (Lock Star SGateM), which uses a screen transfer method and is compatible with any terminal and OS, from March 4, 2013. "LOCK STAR-SGateM" is a screen transfer-based security solution built on a Linux server. This solution operates on browsers that support HTML5, eliminating the need for dedicated applications. Additionally, by utilizing free OS, it allows companies to save on the substantial costs associated with licensing fees. Furthermore, by integrating with the currently available integrated security system LOCK STAR-SGate series, it can accommodate various usage scenarios tailored to corporate needs. Groupware such as Notes, which was previously only usable on PCs, can now be used directly on smartphones and tablets (iPhone, iPad, Android devices) without leaving any data on the device, making it easy and cost-effective, thus providing an optimal environment for BYOD (Bring Your Own Device) utilization.
The long-awaited new model "Novel" has been born in the VingCard series of card locks, which have been implemented in over 8 million rooms worldwide!
- Entrance and exit control system
- Encryption and authentication
- Other security
Introducing the latest model of the VingCard series, "Novel"!
It goes without saying that the VingCard non-contact card lock "Novel" combines the latest security technology with usability and will become the representative model of next-generation card locks for accommodation facilities. Novel captivates guests and hoteliers as a modern, beautiful, and powerful electronic card lock. Mobile access, online integration, and Apple Wallet can also be added quickly when needed. Additionally, Novel is fully committed to environmental protection through the use of sustainable raw materials, lightweight product design, minimized packaging volume, and battery-free options.
Compact design that can be placed anywhere! Enables operation at low cost.
- Encryption and authentication
- Personal authentication
For everyone using multiple SaaS, why not manage your "SaaS" in a centralized way?
- Integrated operation management
- Other information systems
- Encryption and authentication
Protect your system more safely! The best solution for two-factor authentication.
- Encryption and authentication
- Personal authentication
We provide a platform related to personal authentication. How about using it for time rental operations of unmanned stores such as shared offices and fitness clubs?
- Encryption and authentication
VIC292 securely connects low-power devices such as sensors to the network using TLS.
- Dedicated IC
- Encryption and authentication
Who was the last person to open that safe? A trump card against impersonation and the risk of losing the key.
- Encryption and authentication
- Personal authentication
Search for and manage files containing personal information such as My Number and credit card numbers from PCs, file servers, and network drives!
- Encryption and authentication
- Data Erasing
Simple and secure next-generation internal control tool.
- Encryption and authentication
Integrated management of documents, images, drawings, and videos! Ideal for record management compliant with the Electronic Bookkeeping Preservation Law and the Invoice System.
- Encryption and authentication
Centralized management of necessary related information such as drawing management, technical information management, document management, revision history management, and parts deployment information...
- Encryption and authentication
Generate a one-time disposable password! It enables stronger authentication than a fixed password.
- Encryption and authentication
Explaining the advantages and disadvantages of major authentication methods! Introducing 'Raku-nin,' which adopts a multi-authentication method.
- Personal authentication
- Encryption and authentication
- Other security