List of Encryption and authentication products
- classification:Encryption and authentication
46~90 item / All 264 items
We protect information assets with authentication via IC cards and encryption technology!
- Encryption and authentication
To set an appropriate password! An explanation of weak passwords and attack methods.
- Encryption and authentication
- Other security
Explaining examples of dangerous passwords and methods to prevent unauthorized access by third parties!
- Encryption and authentication
- Other security
The reality of password management in companies! A column explaining the measures that should be taken.
- Other security
- Integrated operation management
- Encryption and authentication
A detailed explanation of the importance and key points of password management in a column!
- Other security
- Integrated operation management
- Encryption and authentication
Explaining safe password management methods! Also introducing recommended password management tools.
- Other security
- Integrated operation management
- Encryption and authentication
Introduction to the necessity of access control, its basic functions, and types of control methods!
- Encryption and authentication
- Other security
An overview and explanation of single sign-on features! We are comparing major tools.
- Encryption and authentication
- Personal authentication
- Other security
A column explaining the advantages and disadvantages of implementation, as well as the methods of single sign-on!
- Encryption and authentication
- Personal authentication
The benefits of single sign-on using SAML authentication! Explanation of the differences with OAuth as well.
- Encryption and authentication
- Personal authentication
Introducing the cloud-based and on-premises types! Also explaining the main features and how to choose.
- Encryption and authentication
- Personal authentication
- Other security
Explaining methods and usage examples! We will also introduce the system for achieving single sign-on.
- Encryption and authentication
- Personal authentication
Explaining the six authentication methods and mechanisms of single sign-on, as well as the four benefits of its implementation!
- Encryption and authentication
- Personal authentication
Explaining the differences between IdP and SP, the flow of the authentication process, and the benefits of IdP!
- Encryption and authentication
- Other security
Introducing the features, advantages, disadvantages, and key points to consider when choosing IDaaS!
- Integrated operation management
- Encryption and authentication
A lineup of various products including Babel Obfuscator Enterprise!
- Software (middle, driver, security, etc.)
- Encryption and authentication
- Other security
Google Workspace, Azure, and IdP integration is also possible.
- Encryption and authentication

Announcing "AXIOLE v1.20" with enhanced features for the "Shibboleth IdP option."
NetSpring Inc. (Headquarters: Minato-ku, Tokyo, President: Susumu Seibu) will begin offering a new version "AXIOLE v1.20" of its LDAP-based authentication appliance server "AXIOLE," primarily aimed at academic and research institutions, which includes the option feature "AXIOLE IdP Option" compliant with the latest Shibboleth IdP V4. This version upgrade inherits various plugins, including the multi-factor authentication feature already implemented in AXIOLE IdP for Shibboleth IdP V4. The new version will be available for download starting December 24. Users who have previously purchased the IdP Option license will need to upgrade to V1.19 first, and then to V1.20, in order to update to an IdP system compliant with IdP V4. For more details, please check the attached file and related links.
Instantly auto-generate complex passwords with symbols! Achieve a significant increase in security with zero burden.
- Encryption and authentication
An authentication appliance that can be put into operation immediately after installation.
- Encryption and authentication
Secure communication for IoT devices! Safely store certificates and keys on a USB dongle.
- Encryption and authentication
High-quality standard-compliant smart card token "LOCK STAR-uToken"
- Personal authentication
- Encryption and authentication
- Other security
This is a product that uses a USB security key to prevent information leakage and unauthorized use from computers with easy operation and short implementation time.
- Personal authentication
- Software (middle, driver, security, etc.)
- Encryption and authentication
The USB dongle "LOCK STAR-PK," which prevents unauthorized copying and use of software, protects the assets of software development manufacturers.
- Development support tools (ICE, emulators, debuggers, etc.)
- Software (middle, driver, security, etc.)
- Encryption and authentication
Virtual function-equipped SSL-VPN remote access solution
- Firewall and intrusion prevention
- Encryption and authentication
- Personal authentication

Ideal for BYOD, no dedicated app required, prevents information leakage from smart devices.
Logical Tech Co., Ltd. will start selling its information leakage prevention system "LOCK STAR-SGateM" (Lock Star SGateM), which uses a screen transfer method and is compatible with any terminal and OS, from March 4, 2013. "LOCK STAR-SGateM" is a screen transfer-based security solution built on a Linux server. This solution operates on browsers that support HTML5, eliminating the need for dedicated applications. Additionally, by utilizing free OS, it allows companies to save on the substantial costs associated with licensing fees. Furthermore, by integrating with the currently available integrated security system LOCK STAR-SGate series, it can accommodate various usage scenarios tailored to corporate needs. Groupware such as Notes, which was previously only usable on PCs, can now be used directly on smartphones and tablets (iPhone, iPad, Android devices) without leaving any data on the device, making it easy and cost-effective, thus providing an optimal environment for BYOD (Bring Your Own Device) utilization.
The long-awaited new model "Novel" has been born in the VingCard series of card locks, which have been implemented in over 8 million rooms worldwide!
- Entrance and exit control system
- Encryption and authentication
- Other security

Introducing the latest model of the VingCard series, "Novel"!
It goes without saying that the VingCard non-contact card lock "Novel" combines the latest security technology with usability and will become the representative model of next-generation card locks for accommodation facilities. Novel captivates guests and hoteliers as a modern, beautiful, and powerful electronic card lock. Mobile access, online integration, and Apple Wallet can also be added quickly when needed. Additionally, Novel is fully committed to environmental protection through the use of sustainable raw materials, lightweight product design, minimized packaging volume, and battery-free options.
Compact design that can be placed anywhere! Enables operation at low cost.
- Encryption and authentication
- Personal authentication
For everyone using multiple SaaS, why not manage your "SaaS" in a centralized way?
- Integrated operation management
- Other information systems
- Encryption and authentication
Protect your system more safely! The best solution for two-factor authentication.
- Encryption and authentication
- Personal authentication
Promoting hybrid code that can be utilized in a DX society, we will securely handle user information with complete security and propose a more convenient society.
- Encryption and authentication
- Document and Data Management
We provide a platform related to personal authentication. How about using it for time rental operations of unmanned stores such as shared offices and fitness clubs?
- Encryption and authentication
VIC292 securely connects low-power devices such as sensors to the network using TLS.
- Dedicated IC
- Encryption and authentication
Who was the last person to open that safe? A trump card against impersonation and the risk of losing the key.
- Encryption and authentication
- Personal authentication
Search for and manage files containing personal information such as My Number and credit card numbers from PCs, file servers, and network drives!
- Encryption and authentication
- Data Erasing
Simple and secure next-generation internal control tool.
- Encryption and authentication
Integrated management of documents, images, drawings, and videos! Ideal for record management compliant with the Electronic Bookkeeping Preservation Law and the Invoice System.
- Encryption and authentication
Centralized management of necessary related information such as drawing management, technical information management, document management, revision history management, and parts deployment information...
- Encryption and authentication
Generate a one-time disposable password! It enables stronger authentication than a fixed password.
- Encryption and authentication
Explaining the advantages and disadvantages of major authentication methods! Introducing 'Raku-nin,' which adopts a multi-authentication method.
- Personal authentication
- Encryption and authentication
- Other security
Strengthening security measures such as multi-factor authentication! Posting alerts from CISA.
- Encryption and authentication
- Other security
Smart lock with 3D facial recognition
- Personal authentication
- Encryption and authentication
- Other security
Enhance your security level! Introducing ways to prevent information leaks on the blog.
- Encryption and authentication
It's possible to save costs! Introducing the benefits of passwordless authentication in a blog.
- Encryption and authentication
Introducing edge devices with diverse features and excellent scalability in our blog!
- Personal authentication
- Encryption and authentication
Effective for enhancing security! By combining 'multi-factor authentication,' it is also possible to increase safety further.
- Encryption and authentication