List of Encryption and authentication products
- classification:Encryption and authentication
121~150 item / All 270 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Easily add one-time password authentication to existing systems! Strengthen the authentication of your company's web services.
- Encryption and authentication
Compliant with OATH's TOTP (Time-based One-time Password Algorithm)!
- Encryption and authentication
"Cloud Authentication Service" that allows you to choose from multiple authentication methods.
- Encryption and authentication
Authentication that balances security and convenience! Towards a world without passwords with easier and stronger authentication!
- Encryption and authentication
Windows login enters the passwordless era! Protected with advanced security.
- Encryption and authentication
- Other security
All-in-one security solution that integrates all features.
- filtering
- Firewall and intrusion prevention
- Encryption and authentication
Use commercially available USB devices as keys for PCs to lock unauthorized operations on Windows Server. It also supports USB connection restrictions for smartphones.
- Encryption and authentication
- others
- Other security
Encrypt files/folders ◆ Simply drag and drop data onto the application icon.
- Encryption and authentication
File/folder-level encryption software. Passwordless operation is also possible when used within a group.
- Encryption and authentication
Equipped with data leakage prevention features when transferring data to USB-connected storage (including smartphones).
- Encryption and authentication
- others
Ideal for My Number measures! Launch of the PC operation log collection software "LB Access Log 2 Pro" equipped with monitoring features and no server required.
Lifeboat Co., Ltd. (President Takahiro Yamazaki, Chiyoda-ku, Tokyo, TEL 03-3265-1250, URL http://www.lifeboat.jp/) will start selling "LB Access Log 2 Pro" (LB Access Log 2 Pro), a software developed by Es Computer that does not require a dedicated server and can collect and monitor PC operation logs, starting from February 15, 2016, through various sales agents, with a standard price of 22,000 yen (excluding tax) and up. In addition to collecting operation logs, it features the ability to take screenshots and notify administrators when specific actions are performed, monitor network traffic to detect unexpected data transmissions, and restrict the use of USB devices, among other diverse functionalities. It is an ideal software for monitoring PCs and collecting operation logs, particularly for enhancing the security of PCs handling My Number information. ● For more details on LB Access Log 2 Pro, please visit http://www.lifeboat.jp/products/alog2p/.
Create a secret area on removable media or HDD.
- Encryption and authentication
- others
Create an encrypted disk with simple operations by following the wizard.
- Encryption and authentication
- Other security
- others
Unauthorized USB memory - Shut out hard disks.
- Encryption and authentication
Whitelist-type malware protection software
- Encryption and authentication
Rambus TLS Toolkit Standard FIPS Edition
- Encryption and authentication
Encrypt various data on a file-by-file basis, regardless of file format or storage location!
- Encryption and authentication
Domestic engine development! Iris recognition technology, which is a touchless biometric authentication method.
- Personal authentication
- Personal authentication
- Encryption and authentication
We have released the English version of the iris recognition technology website.
We have officially released the English version of the "Iris Authentication Technology" and "Iris Authentication SDK" website (https://iris.pas-ta.io/en/). We have enhanced the technical and product information more than ever before, enabling information dissemination both domestically and internationally, and we will continue to strengthen our service offerings at a global level in the future.
Gradually realizing a "keyless" office.
- locker
- Encryption and authentication
- Personal authentication
A digital array that changes each time to prevent number inference! We propose the Air Gate System.
- Control Panel
- Entrance and exit control system
- Encryption and authentication
Abolishing the mailing of USB memory! Introducing a case that achieves safe and speedy delivery (Crypto Delivery).
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Achieving a speedup in business operations! Introducing a case study that significantly reduced the production time for design (Crypto Delivery).
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Introducing a case study that achieved enhanced security and single sign-on with the internal information infrastructure! (Crypto Delivery)
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Send all documents encrypted with TLS! A case study of achieving secure file transfer (Crypto Delivery).
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Achieve minimization of information risk due to misdelivery by utilizing a closed transmission function for the transfer of personal information of insurance subscribers (Crypto Delivery).
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Secure transfer of personal information and automation of file sending and receiving! Achieving significant cost reduction and improving operational efficiency (Crypto Delivery).
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Reduced the implementation hurdle for thin clients to 1/10, achieving deployment for all employees!
- Encryption and authentication
A complete abolition of the transfer of personal information using physical media such as CD-ROMs and USB drives! Significantly reduce the risk of leaks and the burden of media management!
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
[eBook] Collect My Number Safely and Efficiently! What are the Methods for Corporations to Transfer My Number?
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Excellent portability and advanced security achieved with the adoption of the next-generation standard encryption method AES! Suitable for corporate and medical/care settings.
- Personal authentication
- Encryption and authentication
- Other security