List of Encryption and authentication products
- classification:Encryption and authentication
136~180 item / All 264 items
Introducing a case study that achieved enhanced security and single sign-on with the internal information infrastructure! (Crypto Delivery)
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Send all documents encrypted with TLS! A case study of achieving secure file transfer (Crypto Delivery).
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Achieve minimization of information risk due to misdelivery by utilizing a closed transmission function for the transfer of personal information of insurance subscribers (Crypto Delivery).
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Secure transfer of personal information and automation of file sending and receiving! Achieving significant cost reduction and improving operational efficiency (Crypto Delivery).
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Reduced the implementation hurdle for thin clients to 1/10, achieving deployment for all employees!
- Encryption and authentication
A complete abolition of the transfer of personal information using physical media such as CD-ROMs and USB drives! Significantly reduce the risk of leaks and the burden of media management!
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
[eBook] Collect My Number Safely and Efficiently! What are the Methods for Corporations to Transfer My Number?
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Excellent portability and advanced security achieved with the adoption of the next-generation standard encryption method AES! Suitable for corporate and medical/care settings.
- Personal authentication
- Encryption and authentication
- Other security
How to achieve it!? Considering solutions to the problematic "password-protected ZIP file" issue in the quest to eliminate PPAP.
- Encryption and authentication
- Other security
Easy authentication even with a mix of PCs and smart devices.
- Encryption and authentication
Secure network access from smart devices
- Encryption and authentication

Network authentication client app "SmartSignOn for eFEREC" has been upgraded. It now supports the latest version of iOS/iPadOS and is compatible with Apple M1 Macs for GIGA School (support for Chrome OS is also in preparation).
NetSpring Co., Ltd. (Headquarters: Minato-ku, Tokyo, President: Susumu Nishibu), which plans, develops, and sells network-related products, will officially start providing the network authentication client app "SmartSignOn for eFEREC" (abbreviated as SSO4eF) exclusively for its endpoint access management device eFEREC from May 11, with a version upgrade for iOS/iPadOS that supports Apple M1 chip-equipped Macs (M1 Macs). The SmartSignOn for eFEREC app for iOS/iPadOS (V0.9.3) is available for free from the App Store. Currently, the SSO4eF app is available on most mobile devices, including the Android version. A Chrome OS version is also planned for GIGA School. For more details, please check the attached file and related links.
An excellent authentication method with no concerns about accuracy or loss: "Iris Authentication."
- Personal authentication
- Entrance and exit control system
- Encryption and authentication
Building security for Raspberry Pi with hardware approach using microSD and USB memory with built-in security features for industrial applications.
- Encryption and authentication
- Embedded Board Computers
- Other embedded systems (software and hardware)
Blockchain as a platform for society Concurrent publication: The forefront of Fintech transforming financial services
- Encryption and authentication
- Server monitoring and network management tools
A cloud service called "safeAttach EVS" that enables small and medium-sized users to realize the elimination of PPAP and implement measures against email misdelivery.
- Email/Fax transmission
- Other core systems
- Encryption and authentication
A security platform that meets all requirements such as memory area encryption and reducing the burden on users!
- Encryption and authentication
CodeMeter Embedded is a static library that provides licensing and encryption through a dedicated API for embedded operating systems.
- Encryption and authentication
- Software (middle, driver, security, etc.)

Exhibiting at 【ET & IoT 2021】, planning a demonstration of license management for embedded devices.
WIBU-SYSTEMS AG, which sells the software protection and licensing solution CodeMeter, will exhibit at ET & IoT 2021 (November 17-19 at Pacifico Yokohama). Wibu-Systems will showcase CodeMeter's solutions for security in IoT and software monetization at their booth in the Yokohama Pavilion. The exhibition will feature a demonstration of CodeMeter Embedded integrated into a Raspberry Pi, designed for use in embedded devices. Additionally, SDKs (Software Development Kits) will be available for those who request them. While we will be taking infection control measures, we look forward to welcoming everyone. ■ Recommended for (job types) - Software developers - Business development and planning personnel - Companies that develop/sell packaged software ■ Recommended for those with the following challenges - Security for embedded devices - Reverse engineering and copy prevention measures - Monetization of licensing models
Send the password "securely" with "one word secure," memo.
- Encryption and authentication
PCI 5.x SRED certified keypad
- Encryption and authentication
Reliable file compression and restoration software with a secure patent.
- Other information systems
- EAI/ETL/WEB application server
- Encryption and authentication
◇Domestic and international patents for token economies utilizing blockchain technology ◇37 use cases from various fields
- Technical and Reference Books
- Server monitoring and network management tools
- Encryption and authentication
Achieving information sharing and protection/management of confidential information! Adaptable to large-scale networks.
- Encryption and authentication
Prevent information leakage even when taken out! Safe to use outside the company and with contractors.
- Encryption and authentication
I will explain about DataClasys, including methods and types of security measures.
- Encryption and authentication
"P-Pointer" × "DataClasys" collaboration! Personal information detection and encryption solution.
- Encryption and authentication
Numerous case studies published! Encryption regardless of the app! A confidential file protection and management system "DataClasys" that prevents leaks while keeping operations unchanged.
- Encryption and authentication
- Other security
- Other security and surveillance systems
Distributing confidential files encrypted to domestic and international locations!
- Encryption and authentication
The best-selling model in the Elsafe series of electronic safes for guest rooms, boasting the highest number of installations in the world. Equipped with new security standards and a non-cylinder lock...
- Other security
- cabinet
- Encryption and authentication
We can provide consistent proposals from solutions to operation and maintenance!
- Other services
- Software (middle, driver, security, etc.)
- Encryption and authentication
No pre-registration required, one-time fingerprint authentication lockers! It significantly reduces the burden on the management side, such as the hassle of key management and fingerprint registration...
- Personal authentication
- locker
- Encryption and authentication

Invitation to Exhibit at the 10th School and Education Comprehensive Exhibition
We will be exhibiting at the "School Facilities and Services EXPO" held at Tokyo Big Sight from June 19 (Wednesday) to June 21 (Friday). At this exhibition, we will showcase our flagship product, the fingerprint authentication locker "Personal 1 Armor," as well as the IC card key authentication "PC Storage Box," "AV Rack," and "Delivery Box." Please be sure to stop by our booth! Booth number: A11-36
Protect any trivial information from leaks with 'Management BOX for Important Documents'! For those who distrust the cloud and struggle with tedious tasks!
- Document and Data Management
- Encryption and authentication
Guarantees the authenticity of all electronic data. Enables the enhancement of the security of electronic data through timestamps quickly and economically.
- Encryption and authentication
- Document and Data Management
- Internal Control and Operational Management

Free Timestamp Seminar for Intellectual Property Protection - Utilizing the Prior User Rights System as an IP Strategy and Managing Trade Secrets.
In the field of intellectual property protection, there has been a growing need in recent years to promote comprehensive strategies for the protection and utilization of intellectual property, such as "open & closed strategies" and trade secret management. This seminar will focus on how to effectively utilize the "prior user rights system" to enhance the effectiveness of closed strategies and how to use timestamps for trade secret management. Additionally, we will hold individual consultation sessions after the presentation. We encourage you to take this opportunity to participate. ● Date and Time (The content for all sessions is the same) ◆ The session on January 21 (Thursday) has been fully booked due to popular demand. Thank you. ● Participation Limit: ◆ 10 people * If there are many applications, we will accept participants on a first-come, first-served basis, and if full, we will provide separate guidance. * We may refuse participation from customers of competing companies. Thank you for your understanding. ● Seminar Overview 1: Basics of Timestamps ~ What can you do with timestamps? ~ 2: How to Protect Intellectual Property with Timestamps ~ Are the legal basis and overseas litigation okay? ~ 3: How to Actually Protect Intellectual Property (Demo) ~ The operation is simple. Let's try it out! ~
It is equipped with newly developed image compression technology and high security features.
- Encryption and authentication
Approximately 110,000 licenses with a wealth of implementation experience! Achieve email misdelivery prevention and encryption for "Microsoft Outlook" for just about 83 yen per month!
- Email/Fax transmission
- Encryption and authentication
- Corporate information portal/groupware
IoT secure authentication technology to prevent "spoofing" in device-to-device communication.
- Encryption and authentication
- Software (middle, driver, security, etc.)
- Embedded Board Computers
Shutting out suspicious individuals and outsiders! Strict restrictions on visitor access will be enforced.
- Entrance and exit control system
- Encryption and authentication
- Other security