List of Encryption and authentication products
- classification:Encryption and authentication
181~225 item / All 264 items
Introducing LTE-X technology! LTE technology can now be provided across various infrastructures!
- Encryption and authentication
- Other network tools
- Server monitoring and network management tools
File Encryption System CS101
- Development support tools (ICE, emulators, debuggers, etc.)
- Data Erasing
- Encryption and authentication
Is it enough to rely on just a "password" to protect confidential information? Easily implement 'two-factor authentication'! Check securely while on the go.
- Software (middle, driver, security, etc.)
- Encryption and authentication
Build and operate a website that supports one-time password authentication.
- Software (middle, driver, security, etc.)
- Encryption and authentication
High-security network utilizing mobile phone technology
- Encryption and authentication
We have published application examples of ATECC608A and features such as Secure Boot!
- Encryption and authentication
Bulk management of USB devices! Additionally, it contributes to enhanced security through file encryption.
- Encryption and authentication
- Personal authentication
- Other security
This software achieves file information leakage prevention through "encryption" and "access control"!
- Encryption and authentication
- Personal authentication
- Other security
We will achieve file information leakage prevention through "encryption," "authentication," and "access control"!
- Encryption and authentication
- Personal authentication
- Other security
Achieve both speed and peace of mind! We provide an environment where you can focus on site production.
- server
- Encryption and authentication
Mobile lockers that can be accessed with a mobile phone or IC card.
- locker
- Encryption and authentication
- Personal authentication
Handwritten signature authentication technology that verifies identity with handwritten signatures and characters! Supports various signatures, including kanji and cursive characters!
- Encryption and authentication
- Personal authentication
- others
No network knowledge required! Easily and securely achieve a remote access environment.
- Other security
- Other information systems
- Encryption and authentication
Achieve secure network access from wired and wireless LAN to VPN!
- Encryption and authentication
- Firewall and intrusion prevention
- Personal authentication
It is possible to provide Wi-Fi services while eliminating unauthorized access!
- Encryption and authentication
- Firewall and intrusion prevention
- Personal authentication
Proven in over 50 countries worldwide. With fingerprint authentication, there's no need to worry about losing keys or cards! Security for entrances and exits, management of entry and exit, and rental ...
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
AI-based network anomaly analysis solution
- Other security
- Encryption and authentication
- Firewall and intrusion prevention
Introducing common examples of challenges with security systems using card keys and PINs, along with solutions through fingerprint authentication systems!
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
Introducing the advantages of the highly secure security system "fingerprint authentication" compared to card keys and PINs, along with our product delivery achievements!
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
Proven in over 50 countries worldwide! Fingerprint authentication devices balance security and convenience! They are effective not only for entrance and exit security but also for managing entry and e...
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
Is your company's information management okay? We will explain common situations in companies and countermeasures using a fingerprint authentication system in a manga!
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
If used as a door lock, centralized management of the floor is also possible!
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
"Over 99% authentication rate" ultra-fast fingerprint recognition algorithm! A fingerprint authentication device that can take photos.
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
Over 99% authentication rate! Intuitive operation! No need for troublesome LAN cable wiring with this fingerprint authentication terminal!
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
Proven results in over 50 countries worldwide! Not only for entrance and exit security, but also effective in managing entry and exit as well as attendance and departure! *A comic explaining the produ...
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
"Over 99% authentication rate" High performance despite ultra-compact size! Genuine leather authentication sensor fingerprint authentication terminal.
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
"Over 99% authentication rate" High performance despite its ultra-compact size! A fingerprint authentication device that achieves an authentication speed of "0.1 seconds." It can register up to 10 mil...
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
"Over 99% authentication rate" Stylish design is popular! A fingerprint authentication device suitable for centralized management of floors.
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
Glasses and masks are okay! Security system for door installation with an authentication speed of under 0.7 seconds.
- Encryption and authentication
- Other security and surveillance systems
Achieving authentication speed of under 0.7 seconds! A facial recognition system that can be used in offices, stores, and more.
- Encryption and authentication
- Other security and surveillance systems
Achieve authentication speed of under 0.7 seconds! A facial recognition system that can be utilized in factories, warehouses, and more!
- Encryption and authentication
- Other security and surveillance systems
Achieve authentication speed of under 0.7 seconds! A facial recognition system that can be utilized in schools, tutoring centers, and training schools.
- Encryption and authentication
- Other security and surveillance systems
Achieving authentication speed of under 0.7 seconds! A facial recognition system that can be used in hospitals, nursing homes, and more!
- Encryption and authentication
- Other security and surveillance systems
Achieved significant labor cost reduction leading to a transformation in employee awareness! Case study of Fingered introduction.
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
Ensuring the safety of the entire building and each resident! Case study on the introduction of FingerGuard.
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
Strict access control implemented! Case study of FingerGuard introduction.
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
Introduction of fingerprint authentication for access control at all entrances and exits! Case study of FingerGuard.
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
The expanding fingerprint authentication system! Introducing a feature article on the fingerprint authentication key "FingerGuard."
- Encryption and authentication
- Personal authentication
- Entrance and exit control system
"Face" is the key! Achieving high authentication accuracy by 3D mapping the areas of the eyes and nose with 7,000 points. No need to touch the sensor, completely non-contact and hygienic!
- Encryption and authentication
Improving the working environment! Proposals for work style reform in the dispatch industry.
- Encryption and authentication
Everything is connected to the internet, and logistics and finance, along with many other things, are dramatically changing.
- Encryption and authentication
- Other security
Centralized management of data on an advanced IoT platform with scalability.
- Encryption and authentication
High security level and also user-friendly!
- Encryption and authentication
It's okay to wear a helmet or mask! Recommended for the construction industry as well.
- Encryption and authentication