List of Encryption and authentication products
- classification:Encryption and authentication
211~240 item / All 270 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Over 99% authentication rate! Intuitive operation! No need for troublesome LAN cable wiring with this fingerprint authentication terminal!
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
Proven results in over 50 countries worldwide! Not only for entrance and exit security, but also effective in managing entry and exit as well as attendance and departure! *A comic explaining the produ...
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
"Over 99% authentication rate" High performance despite ultra-compact size! Genuine leather authentication sensor fingerprint authentication terminal.
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
"Over 99% authentication rate" High performance despite its ultra-compact size! A fingerprint authentication device that achieves an authentication speed of "0.1 seconds." It can register up to 10 mil...
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
"Over 99% authentication rate" Stylish design is popular! A fingerprint authentication device suitable for centralized management of floors.
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
Glasses and masks are okay! Security system for door installation with an authentication speed of under 0.7 seconds.
- Encryption and authentication
- Other security and surveillance systems
Achieving authentication speed of under 0.7 seconds! A facial recognition system that can be used in offices, stores, and more.
- Encryption and authentication
- Other security and surveillance systems
Achieve authentication speed of under 0.7 seconds! A facial recognition system that can be utilized in factories, warehouses, and more!
- Encryption and authentication
- Other security and surveillance systems
Achieve authentication speed of under 0.7 seconds! A facial recognition system that can be utilized in schools, tutoring centers, and training schools.
- Encryption and authentication
- Other security and surveillance systems
Achieving authentication speed of under 0.7 seconds! A facial recognition system that can be used in hospitals, nursing homes, and more!
- Encryption and authentication
- Other security and surveillance systems
Achieved significant labor cost reduction leading to a transformation in employee awareness! Case study of Fingered introduction.
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
Ensuring the safety of the entire building and each resident! Case study on the introduction of FingerGuard.
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
Strict access control implemented! Case study of FingerGuard introduction.
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
Introduction of fingerprint authentication for access control at all entrances and exits! Case study of FingerGuard.
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
The expanding fingerprint authentication system! Introducing a feature article on the fingerprint authentication key "FingerGuard."
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
"Face" is the key! Achieving high authentication accuracy by 3D mapping the areas of the eyes and nose with 7,000 points. No need to touch the sensor, completely non-contact and hygienic!
- Encryption and authentication
Improving the working environment! Proposals for work style reform in the dispatch industry.
- Encryption and authentication
Everything is connected to the internet, and logistics and finance, along with many other things, are dramatically changing.
- Encryption and authentication
- Other security
Centralized management of data on an advanced IoT platform with scalability.
- Encryption and authentication
High security level and also user-friendly!
- Encryption and authentication
It's okay to wear a helmet or mask! Recommended for the construction industry as well.
- Encryption and authentication
Detection of vulnerabilities in control systems and ensuring safety and robustness
- Technical and Reference Books
- Firewall and intrusion prevention
- Encryption and authentication
With REX Escrow Service, personal information is managed in a decentralized manner. Secure file sharing.
- Encryption and authentication
- Document and Data Management
- Storage Backup
Data is fragmented and divided by secret dispersal technology to protect information. Electronic data is stored securely.
- Encryption and authentication
- Document and Data Management
- Storage Backup
Important information is backed up in the cloud. We alleviate concerns about using the cloud through secret sharing.
- Encryption and authentication
- Document and Data Management
- Storage Backup
[Presenting Materials!] Detailed explanation of necessary information leakage countermeasures and basic security measures for manufacturing sites!
- Encryption and authentication
A must-read for those concerned about the leakage of technical information! How can file encryption prevent information leaks such as CAD and drawings? Measures in China are also included.
- Other security and surveillance systems
- Other security
- Encryption and authentication
No worries about key management, loss, theft, or duplication. Fingerprint authentication mailbox.
- Personal authentication
- Encryption and authentication
Visualize dispersed information! A software solution for data leak prevention that enables automatic detection and protection of confidential data.
- filtering
- Encryption and authentication
- Other security
No special operations are required for encryption! The file size does not increase and does not become heavy even when encrypted. Achieve stress-free without any hassle.
- Encryption and authentication