List of Encryption and authentication products
- classification:Encryption and authentication
121~180 item / All 270 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Easily add one-time password authentication to existing systems! Strengthen the authentication of your company's web services.
- Encryption and authentication
Compliant with OATH's TOTP (Time-based One-time Password Algorithm)!
- Encryption and authentication
"Cloud Authentication Service" that allows you to choose from multiple authentication methods.
- Encryption and authentication
Authentication that balances security and convenience! Towards a world without passwords with easier and stronger authentication!
- Encryption and authentication
Windows login enters the passwordless era! Protected with advanced security.
- Encryption and authentication
- Other security
All-in-one security solution that integrates all features.
- filtering
- Firewall and intrusion prevention
- Encryption and authentication
Use commercially available USB devices as keys for PCs to lock unauthorized operations on Windows Server. It also supports USB connection restrictions for smartphones.
- Encryption and authentication
- others
- Other security
Encrypt files/folders ◆ Simply drag and drop data onto the application icon.
- Encryption and authentication
File/folder-level encryption software. Passwordless operation is also possible when used within a group.
- Encryption and authentication
Equipped with data leakage prevention features when transferring data to USB-connected storage (including smartphones).
- Encryption and authentication
- others
Ideal for My Number measures! Launch of the PC operation log collection software "LB Access Log 2 Pro" equipped with monitoring features and no server required.
Lifeboat Co., Ltd. (President Takahiro Yamazaki, Chiyoda-ku, Tokyo, TEL 03-3265-1250, URL http://www.lifeboat.jp/) will start selling "LB Access Log 2 Pro" (LB Access Log 2 Pro), a software developed by Es Computer that does not require a dedicated server and can collect and monitor PC operation logs, starting from February 15, 2016, through various sales agents, with a standard price of 22,000 yen (excluding tax) and up. In addition to collecting operation logs, it features the ability to take screenshots and notify administrators when specific actions are performed, monitor network traffic to detect unexpected data transmissions, and restrict the use of USB devices, among other diverse functionalities. It is an ideal software for monitoring PCs and collecting operation logs, particularly for enhancing the security of PCs handling My Number information. ● For more details on LB Access Log 2 Pro, please visit http://www.lifeboat.jp/products/alog2p/.
Create a secret area on removable media or HDD.
- Encryption and authentication
- others
Create an encrypted disk with simple operations by following the wizard.
- Encryption and authentication
- Other security
- others
Unauthorized USB memory - Shut out hard disks.
- Encryption and authentication
Whitelist-type malware protection software
- Encryption and authentication
Rambus TLS Toolkit Standard FIPS Edition
- Encryption and authentication
Encrypt various data on a file-by-file basis, regardless of file format or storage location!
- Encryption and authentication
Domestic engine development! Iris recognition technology, which is a touchless biometric authentication method.
- Personal authentication
- Personal authentication
- Encryption and authentication
We have released the English version of the iris recognition technology website.
We have officially released the English version of the "Iris Authentication Technology" and "Iris Authentication SDK" website (https://iris.pas-ta.io/en/). We have enhanced the technical and product information more than ever before, enabling information dissemination both domestically and internationally, and we will continue to strengthen our service offerings at a global level in the future.
Gradually realizing a "keyless" office.
- locker
- Encryption and authentication
- Personal authentication
A digital array that changes each time to prevent number inference! We propose the Air Gate System.
- Control Panel
- Entrance and exit control system
- Encryption and authentication
Abolishing the mailing of USB memory! Introducing a case that achieves safe and speedy delivery (Crypto Delivery).
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Achieving a speedup in business operations! Introducing a case study that significantly reduced the production time for design (Crypto Delivery).
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Introducing a case study that achieved enhanced security and single sign-on with the internal information infrastructure! (Crypto Delivery)
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Send all documents encrypted with TLS! A case study of achieving secure file transfer (Crypto Delivery).
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Achieve minimization of information risk due to misdelivery by utilizing a closed transmission function for the transfer of personal information of insurance subscribers (Crypto Delivery).
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Secure transfer of personal information and automation of file sending and receiving! Achieving significant cost reduction and improving operational efficiency (Crypto Delivery).
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Reduced the implementation hurdle for thin clients to 1/10, achieving deployment for all employees!
- Encryption and authentication
A complete abolition of the transfer of personal information using physical media such as CD-ROMs and USB drives! Significantly reduce the risk of leaks and the burden of media management!
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
[eBook] Collect My Number Safely and Efficiently! What are the Methods for Corporations to Transfer My Number?
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Excellent portability and advanced security achieved with the adoption of the next-generation standard encryption method AES! Suitable for corporate and medical/care settings.
- Personal authentication
- Encryption and authentication
- Other security
How to achieve it!? Considering solutions to the problematic "password-protected ZIP file" issue in the quest to eliminate PPAP.
- Encryption and authentication
- Other security
Easy authentication even with a mix of PCs and smart devices.
- Encryption and authentication
Secure network access from smart devices
- Encryption and authentication
Network authentication client app "SmartSignOn for eFEREC" has been upgraded. It now supports the latest version of iOS/iPadOS and is compatible with Apple M1 Macs for GIGA School (support for Chrome OS is also in preparation).
NetSpring Co., Ltd. (Headquarters: Minato-ku, Tokyo, President: Susumu Nishibu), which plans, develops, and sells network-related products, will officially start providing the network authentication client app "SmartSignOn for eFEREC" (abbreviated as SSO4eF) exclusively for its endpoint access management device eFEREC from May 11, with a version upgrade for iOS/iPadOS that supports Apple M1 chip-equipped Macs (M1 Macs). The SmartSignOn for eFEREC app for iOS/iPadOS (V0.9.3) is available for free from the App Store. Currently, the SSO4eF app is available on most mobile devices, including the Android version. A Chrome OS version is also planned for GIGA School. For more details, please check the attached file and related links.
An excellent authentication method with no concerns about accuracy or loss: "Iris Authentication."
- Personal authentication
- Entrance and exit control system
- Encryption and authentication
Building security for Raspberry Pi with hardware approach using microSD and USB memory with built-in security features for industrial applications.
- Encryption and authentication
- Embedded Board Computers
- Other embedded systems (software and hardware)
"Let's get a great deal together with the target products!" Advantech is currently offering Acronis at a special price! Check the link below!
- Firewall and intrusion prevention
- Encryption and authentication
- Software (middle, driver, security, etc.)
[10/15 Webinar] The Utilization and Security of IoT that Japanese Companies Struggle With
This webinar will share the challenges faced by companies and engineers in Japan regarding the implementation of industrial IoT, along with examples of countermeasures. We will condense and share how to quickly implement remote management and security measures in a 40-minute session. Participants will have a chance to win gifts such as Amazon gift cards and FireSticks through a lottery, as well as receive an eBook covering IoT case studies from around the world. ★Highlights★ IoT situation in Japan We will share analysis data on IoT adoption trends in Japan based on Advantech's unique research, along with implementation challenges and corresponding case studies. Implementing remote management "Visualization" of IoT systems: With guest speakers, we will discuss the implementation of remote management functions and how to proceed efficiently. Implementing IoT security We will have guest speakers discuss the realization of extensive industrial IoT security features. ▶Guest Speakers◀ Soliton Systems, Market Development Promotion Headquarters Manager: Tomoo Kinoshita Tokyo Electron Device, Cloud IoT Company Deputy General Manager, Embedded Solutions Department: Toshiyuki Taniwaki
Blockchain as a platform for society Concurrent publication: The forefront of Fintech transforming financial services
- Encryption and authentication
- Server monitoring and network management tools
A cloud service called "safeAttach EVS" that enables small and medium-sized users to realize the elimination of PPAP and implement measures against email misdelivery.
- Email/Fax transmission
- Other core systems
- Encryption and authentication
A security platform that meets all requirements such as memory area encryption and reducing the burden on users!
- Encryption and authentication
★Introducing Software All at Once★ Windows Embedded OS, SUSI API, Embedded BIOS, Wise-DeviceOn
- Encryption and authentication
- Server monitoring and network management tools
- Storage Backup
CodeMeter Embedded is a static library that provides licensing and encryption through a dedicated API for embedded operating systems.
- Encryption and authentication
- Software (middle, driver, security, etc.)
Exhibiting at 【ET & IoT 2021】, planning a demonstration of license management for embedded devices.
WIBU-SYSTEMS AG, which sells the software protection and licensing solution CodeMeter, will exhibit at ET & IoT 2021 (November 17-19 at Pacifico Yokohama). Wibu-Systems will showcase CodeMeter's solutions for security in IoT and software monetization at their booth in the Yokohama Pavilion. The exhibition will feature a demonstration of CodeMeter Embedded integrated into a Raspberry Pi, designed for use in embedded devices. Additionally, SDKs (Software Development Kits) will be available for those who request them. While we will be taking infection control measures, we look forward to welcoming everyone. ■ Recommended for (job types) - Software developers - Business development and planning personnel - Companies that develop/sell packaged software ■ Recommended for those with the following challenges - Security for embedded devices - Reverse engineering and copy prevention measures - Monetization of licensing models
Send the password "securely" with "one word secure," memo.
- Encryption and authentication
PCI 5.x SRED certified keypad
- Encryption and authentication
Reliable file compression and restoration software with a secure patent.
- Other information systems
- EAI/ETL/WEB application server
- Encryption and authentication
◇Domestic and international patents for token economies utilizing blockchain technology ◇37 use cases from various fields
- Technical and Reference Books
- Server monitoring and network management tools
- Encryption and authentication
Achieving information sharing and protection/management of confidential information! Adaptable to large-scale networks.
- Encryption and authentication
Prevent information leakage even when taken out! Safe to use outside the company and with contractors.
- Encryption and authentication
I will explain about DataClasys, including methods and types of security measures.
- Encryption and authentication
"P-Pointer" × "DataClasys" collaboration! Personal information detection and encryption solution.
- Encryption and authentication
Numerous case studies published! Encryption regardless of the app! A confidential file protection and management system "DataClasys" that prevents leaks while keeping operations unchanged.
- Encryption and authentication
- Other security
- Other security and surveillance systems
Distributing confidential files encrypted to domestic and international locations!
- Encryption and authentication
The best-selling model in the Elsafe series of electronic safes for guest rooms, boasting the highest number of installations in the world. Equipped with new security standards and a non-cylinder lock...
- Other security
- cabinet
- Encryption and authentication
We can provide consistent proposals from solutions to operation and maintenance!
- Other services
- Software (middle, driver, security, etc.)
- Encryption and authentication
No pre-registration required, one-time fingerprint authentication lockers! It significantly reduces the burden on the management side, such as the hassle of key management and fingerprint registration...
- Personal authentication
- locker
- Encryption and authentication
Invitation to Exhibit at the 10th School and Education Comprehensive Exhibition
We will be exhibiting at the "School Facilities and Services EXPO" held at Tokyo Big Sight from June 19 (Wednesday) to June 21 (Friday). At this exhibition, we will showcase our flagship product, the fingerprint authentication locker "Personal 1 Armor," as well as the IC card key authentication "PC Storage Box," "AV Rack," and "Delivery Box." Please be sure to stop by our booth! Booth number: A11-36
Protect any trivial information from leaks with 'Management BOX for Important Documents'! For those who distrust the cloud and struggle with tedious tasks!
- Document and Data Management
- Encryption and authentication
Guarantees the authenticity of all electronic data. Enables the enhancement of the security of electronic data through timestamps quickly and economically.
- Encryption and authentication
- Document and Data Management
- Internal Control and Operational Management
Free Timestamp Seminar for Intellectual Property Protection - Utilizing the Prior User Rights System as an IP Strategy and Managing Trade Secrets.
In the field of intellectual property protection, there has been a growing need in recent years to promote comprehensive strategies for the protection and utilization of intellectual property, such as "open & closed strategies" and trade secret management. This seminar will focus on how to effectively utilize the "prior user rights system" to enhance the effectiveness of closed strategies and how to use timestamps for trade secret management. Additionally, we will hold individual consultation sessions after the presentation. We encourage you to take this opportunity to participate. ● Date and Time (The content for all sessions is the same) ◆ The session on January 21 (Thursday) has been fully booked due to popular demand. Thank you. ● Participation Limit: ◆ 10 people * If there are many applications, we will accept participants on a first-come, first-served basis, and if full, we will provide separate guidance. * We may refuse participation from customers of competing companies. Thank you for your understanding. ● Seminar Overview 1: Basics of Timestamps ~ What can you do with timestamps? ~ 2: How to Protect Intellectual Property with Timestamps ~ Are the legal basis and overseas litigation okay? ~ 3: How to Actually Protect Intellectual Property (Demo) ~ The operation is simple. Let's try it out! ~