List of Personal authentication products

  • classification:Personal authentication

1~45 item / All 412 items

Displayed results

Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!

  • PRエリア.png
  • Other conveying machines

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A belt grinding machine that has been in use for about 50 years since 1973. In addition to trust and proven results, the lineup is also extensive.

  • Other machine tools

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
ベルト.png

Belt grinding machine "Veda Machine" has high durability and a wide range of service parts.

The "Bader Machine" is our belt grinder that boasts excellent polishing performance for each individual unit. By selecting models and types according to the shape and size of the workpiece, and by equipping it with a polishing belt suitable for the task, it can flexibly accommodate a wide variety of items across various fields. Please make extensive use of it for high-efficiency polishing and grinding, reduction of work time, labor-saving, and standardization of tasks. 【Lineup】 ■ Portable type BP-K (air motor type) ■ Made-to-order machine PC-1 (wheel centerless), BC (standard dust cover) ■ Installed type BM (basic type), SBA-1, BH-2 ■ Wheel type SBD-4S, SBD-7, BWd *For more details, please download the PDF or contact us.

Compatible with various applications! Portable design that's easy to carry.

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Basic design based on the premise of introduction to large-scale networks! Use of issued IC cards is also possible.

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The number of measurement points is 7,000! Equipped with attendance management features using various authentication methods.

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Available at various facilities! Immediate response during power outages with mechanical emergency unlocking.

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
ISO-Base.JPG

We will be exhibiting at the 32nd Industrial Technology Exhibition "Technical Show Yokohama" from February 2 (Wednesday) to February 4 (Friday), 2011.

We will be exhibiting at the Technical Show Yokohama held at Pacifico Yokohama. The exhibits will include: - Key management made easy! "IC Key Terminal" - Access control system - Production management system, production scheduler and more. We invite you to take this opportunity to see our products. If you would like an invitation ticket, please write "Request for invitation ticket" to info@biss.co.jp and provide your contact information. You can also do this through the Ipros page. You can find more details below: http://www.ipros.jp/company/254201/products_detail000000040.html

For identity verification in important facilities that require high security, such as government offices, plant facilities, and data centers.

  • Personal authentication
  • Entrance and exit control system
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information on qualified personnel that companies should be aware of. A detailed explanation of its purpose! <Face recognition impersonation prevention solution>

  • Personal authentication
  • Entrance and exit control system
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Achieving entry and exit management that reduces the burden and cost of biometric information management with face recognition that does not require a database <Face recognition impersonation preventi...

  • Entrance and exit control system
  • Personal authentication
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Recently, there has been a lot of discussion about quality fraud and data tampering. This explains "what happens if you commit fraud" and "what should be done to prevent it"!

  • Personal authentication
  • Entrance and exit control system
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Streamlining the entry and exit management of guests and part-time employees at factories prone to long queues using database-free facial recognition.

  • Personal authentication
  • Entrance and exit control system
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Explaining the reasons and countermeasures for unauthorized occurrences! How to protect a company's brand and trust: <Face recognition impersonation prevention solution>

  • Personal authentication
  • Entrance and exit control system
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

I can create a key that is only available to me! Widely implemented in manufacturing, distribution, finance, and more.

  • Personal authentication
  • Entrance and exit control system
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Introduction Video] Face Recognition Spoofing Prevention Solution

At the NEC Solution Gallery, we are introducing the "Face Recognition Spoof Prevention Solution" through a video. <Content (Video Duration: 2 minutes 38 seconds)> - Differences between this solution and standard face recognition - A series of tasks from taking a facial photo to issuing a QR code - The process of entry using face recognition and QR codes - Entry procedures when lending an employee ID to someone else - Use cases Please take a look at the related link "NEC Solution Gallery" below.

Preventing opportunities for tampering with inspection results to support fraud prevention! Introducing examples of the "Face Recognition Impersonation Prevention Solution."

  • Personal authentication
  • Entrance and exit control system
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Contributing to the prevention of fraud with a face recognition system that does not require a database! Introducing use cases in the manufacturing industry.

  • Personal authentication
  • Entrance and exit control system
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Efforts to prevent "tampering with quality inspection results" and "inspections by unqualified individuals" using database-less facial recognition!

  • Personal authentication
  • Entrance and exit control system
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Utilizing a facial recognition spoofing prevention solution, we have achieved stricter attendance management without requiring identity verification by staff!

  • Personal authentication
  • Entrance and exit control system
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Support for resolving concerns in embedded development with facial recognition! Two case studies included.

  • Personal authentication
  • Entrance and exit control system
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

With the use of "active IC tags," you can enter and exit hands-free. There's no need to take out your "IC card" anymore!

  • Entrance and exit control system
  • Personal authentication
  • IC tag

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A leading company in access security and safety certification systems.

  • Entrance and exit control system
  • RFID/IC tags
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Achieving unmanned monitoring through constant cloud connectivity!

  • Personal authentication
  • Other measurement, recording and measuring instruments
  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IT-based 'Safety-board' for managing entry slots, enhancing safety and efficiency.

  • IC tag reader/writer
  • Entrance and exit control system
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

You can now manage the "entry and exit records" of on-site operations remotely / A system that is easy to install on-site, "Safety-board."

  • IC tag reader/writer
  • Entrance and exit control system
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The "Safety-board" allows for remote management of the current "entry and exit records" for work inside the tank, and it is also easy to install on-site.

  • IC tag reader/writer
  • Entrance and exit control system
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Entry and exit management system "Safety-board" that improves the safety and efficiency of in-trough operations.

  • Other security and surveillance systems
  • Entrance and exit control system
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The "Safety-board" allows for remote management of "entry and exit records" for work inside the tank, improving safety and efficiency.

  • Other security and surveillance systems
  • Entrance and exit control system
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Integration with infrared body temperature measurement is also possible! It contributes to improving productivity in event operations.

  • 2D Code Reader
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Health management without contact! Easily usable with smartphones and car cameras, simple measurement.

  • 01_with_tm_positive.jpg
  • Other Software
  • Personnel and Labor
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

★ High-performance demodulation processing device. Optimal for long-range pseudo-spread spectrum codes that are difficult with IC/LSI! An option to enhance secure communication.

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
A.JPG

"Technical documentation for transmitting images via radio waves" now available all at once!

★ We are releasing a wealth of technical information that includes experience and know-how related to radio laws, antennas, transmitters and receivers, installation, etc., when transmitting video via radio waves. A must-read for all stakeholders! ● When transmitting video via radio waves, we provide a clear explanation of legal considerations, antenna selection, performance evaluation of transmitters and receivers, the latest digital wireless technologies, and installation precautions. ● In explaining video transmission via wireless, we aim to avoid using formulas as much as possible, instead providing clear explanations through text and photos that are easier to understand than formulas. This is essential reading for researchers and salespeople involved in radio operations! ● The author has been involved in wireless operations for 30 years and explains the know-how gained from experience in research, design, manufacturing, and on-site installation in an easily understandable manner within limited pages. ● As we are in an era of energy conservation and efficiency, we hope you will utilize this material to review products related to wireless equipment. ● Considering various individuals engaged in wireless-related fields, we have tried to explain things with minimal use of formulas. We hope this can serve as a helpful resource for enhancing everyone's knowledge.

Introducing a case where a cloud-based human resource management system integrates a facial recognition system, enabling attendance and absence management via smartphones and tablets.

  • Other security and surveillance systems
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Masks, goggles, and helmets can be certified even outdoors! Examples of access control systems in factory facilities.

  • Other security and surveillance systems
  • Entrance and exit control system
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introducing examples of implementing two-factor authentication using facial recognition in government agencies and local municipalities to enhance login security for computers and systems.

  • Other security and surveillance systems
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

This is an AI facial recognition engine that can be equipped with world-class facial recognition capabilities for various software, hardware, and services.

  • Personal authentication
  • Other embedded systems (software and hardware)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
SDK7.2 NR (19).png

Ranked 5th in the latest NIST age estimation evaluation test - CyberLink's AI facial recognition engine "FaceMe".

In the latest "Age Estimation Evaluation Test" conducted by NIST, the AI facial recognition engine "FaceMe" ranked 5th in the world. 【What is the NIST FATE Age Estimation Evaluation Test?】 The NIST FATE Age Estimation Evaluation Test is one of the international benchmarks for facial analysis technology conducted by the National Institute of Standards and Technology (NIST) in the United States, which evaluates the age estimation accuracy of AI algorithms using a large-scale facial image dataset. 【Evaluation Results of FaceMe】 - World Ranking: 5th FaceMe ranked 5th among 20 global vendors, demonstrating top-class accuracy in an international competitive environment. - Mean Absolute Error (MAE): 2.87 years The average error in FaceMe's estimated age is 2.87 years, with only a 0.35-year difference from the top-ranked algorithm, achieving world-class accuracy. *MAE (Mean Absolute Error): Quantifies the error in estimated age (the smaller the number, the higher the accuracy). *NIST conducted the evaluation using 1 million facial images of individuals aged 18 to 30.

FaceMe is a world-class AI facial recognition product with a rich track record of adoption in offices and factories. [Presentation materials on facial recognition systems available.]

  • Other security and surveillance systems
  • Entrance and exit control system
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A verification device that can display the front and back information of My Number cards, foreign resident cards, and driver's licenses on a reading screen for identity verification and counterfeit de...

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
カッティングエッジ マイナンバーカード本人確認、運転免許証本人確認、外国人在留カード本人確認、偽造判定、データベース管理が可能な装置 EXC-2800.jpg

A factory for counterfeiting residence cards and My Number cards has been raided. The EXC-2800 device can instantly view the front and back information of My Number cards, driver's licenses, foreign residence cards, etc., and can verify identity as well as detect counterfeiting or alteration.

A Chinese national suspect who forged My Number cards and residence cards has been arrested. Approximately 750 sheets for forgery were discovered at their home, and the data for forgery was sent via the Chinese communication app WeChat, with about 3,000 pieces of data believed to be for card forgery. The majority were for residence cards, while about 70 were for My Number cards. We would like to introduce the EXC-2800 device, which allows for immediate viewing of information on the front and back of My Number cards, driver's licenses, foreign residence cards, etc., as well as the information within the IC chip, enabling identity verification and detection of forgery/alteration. 1. With a single insertion, front and back information, IC chip data, and facial photos can be quickly compared and verified on a PC. 2. Information such as name, address, date of birth, and expiration date can be converted into text data using OCR character recognition, allowing for quick database creation and prevention of input errors. 3. Data can be saved in various formats, including text, CSV, and JPEG images. 4. For driver's licenses and My Number cards with unknown PINs, the device can read surface patterns using a unique algorithm to determine authenticity. 5. It has a tampering check function that detects surface adhesive forgery, making it possible to identify altered cards.

A device that reads the photo page and IC chip information of a passport and international driver's license, displaying them on a screen for identity verification and forgery authentication.

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
カッティングエッジ マイナンバーカード本人確認、運転免許証本人確認、外国人在留カード本人確認、偽造判定、データベース管理が可能な装置 EXC-2800.jpg

A factory for counterfeiting residence cards and My Number cards has been raided. The EXC-2800 device can instantly view the front and back information of My Number cards, driver's licenses, foreign residence cards, etc., and can verify identity as well as detect counterfeiting or alteration.

A Chinese national suspect who forged My Number cards and residence cards has been arrested. Approximately 750 sheets for forgery were discovered at their home, and the data for forgery was sent via the Chinese communication app WeChat, with about 3,000 pieces of data believed to be for card forgery. The majority were for residence cards, while about 70 were for My Number cards. We would like to introduce the EXC-2800 device, which allows for immediate viewing of information on the front and back of My Number cards, driver's licenses, foreign residence cards, etc., as well as the information within the IC chip, enabling identity verification and detection of forgery/alteration. 1. With a single insertion, front and back information, IC chip data, and facial photos can be quickly compared and verified on a PC. 2. Information such as name, address, date of birth, and expiration date can be converted into text data using OCR character recognition, allowing for quick database creation and prevention of input errors. 3. Data can be saved in various formats, including text, CSV, and JPEG images. 4. For driver's licenses and My Number cards with unknown PINs, the device can read surface patterns using a unique algorithm to determine authenticity. 5. It has a tampering check function that detects surface adhesive forgery, making it possible to identify altered cards.

A personal identification verification counterfeit detection device that allows for the display and comparison of the front and back information of identification documents such as My Number Card, dri...

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
カッティングエッジ マイナンバーカード本人確認、運転免許証本人確認、外国人在留カード本人確認、偽造判定、データベース管理が可能な装置 EXC-2800.jpg

A factory for counterfeiting residence cards and My Number cards has been raided. The EXC-2800 device can instantly view the front and back information of My Number cards, driver's licenses, foreign residence cards, etc., and can verify identity as well as detect counterfeiting or alteration.

A Chinese national suspect who forged My Number cards and residence cards has been arrested. Approximately 750 sheets for forgery were discovered at their home, and the data for forgery was sent via the Chinese communication app WeChat, with about 3,000 pieces of data believed to be for card forgery. The majority were for residence cards, while about 70 were for My Number cards. We would like to introduce the EXC-2800 device, which allows for immediate viewing of information on the front and back of My Number cards, driver's licenses, foreign residence cards, etc., as well as the information within the IC chip, enabling identity verification and detection of forgery/alteration. 1. With a single insertion, front and back information, IC chip data, and facial photos can be quickly compared and verified on a PC. 2. Information such as name, address, date of birth, and expiration date can be converted into text data using OCR character recognition, allowing for quick database creation and prevention of input errors. 3. Data can be saved in various formats, including text, CSV, and JPEG images. 4. For driver's licenses and My Number cards with unknown PINs, the device can read surface patterns using a unique algorithm to determine authenticity. 5. It has a tampering check function that detects surface adhesive forgery, making it possible to identify altered cards.

We would like to introduce a case where facial recognition devices were installed at four office entrance doors!

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

By outputting the information from the read card directly as Wiegand, it can be used with controllers and readers compatible with controller modes!

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

From the detection of authentication data to the authentication decision takes about 1 second! It is possible to prevent impersonation using photo images and other means.

  • image_01.png
  • image_02.png
  • image_03.png
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Encrypt user data! Advanced hardware and software optimized for facial recognition.

  • image_02.png
  • image_03.png
  • image_04.png
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

It is possible to apply it to strengthening security, traffic surveys, and promotional activities in retail stores!

  • Personal authentication
  • Other measurement, recording and measuring instruments

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Even in difficult situations for recognition, real-time matching with millions of face databases is possible!

  • Other security and surveillance systems
  • Personal authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Only one ID/PASS is required for login! Promising high security and convenience.

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Easily authenticate users of your company's official app to streamline and enhance efficiency at the reception, and securely log in to store terminals.

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Four measures against targeted phishing emails that you can start today, along with an introduction to the characteristics of targeted phishing emails!

  • Personal authentication
  • ISO-related consultant

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Filter

classification
Delivery Time
Location