Authentication management software - List of Manufacturers, Suppliers, Companies and Products

Authentication management software Product List

1~4 item / All 4 items

Displayed results

The Necessity of Access Control: Measures Against Shadow IT and Unauthorized Access

Explaining the necessary security measures to prevent shadow IT and unauthorized access.

In recent times, with the introduction of telework and the cloudification of business operations, are you aware that the necessary security measures are changing? This document explains the changes in the environment surrounding companies due to cloudification, the current state of security measures, and methods to achieve safe cloud usage. *For more details, please refer to the catalog.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Enhanced security through certificate authentication and OTA distribution.

Explaining why certificate authentication is effective against security threats both inside and outside the company.

One thing to be cautious about with the cloudification of business operations is the use of personal devices. It is necessary to prevent access from devices that are not known to the administrator. This document explains the changes in the environment surrounding cloudification, the current state of security measures, and methods to counter security threats both inside and outside the company. *For more details, please refer to the catalog.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Iris recognition × facial recognition system 'SmileOkay-Manager'

Is the information management of the iris and facial recognition terminal being carried out efficiently? SmileOkay-Manager can achieve efficient management/control.

"SmileOkay-Manager" is management and control software developed by IT Sec Co., Ltd., which implements effective features for work efficiency based on its track record of introducing iris recognition terminals and facial recognition terminals to many users. One iris recognition terminal or facial recognition terminal can register tens of thousands of users. The information to be registered needs to be done for each terminal individually. Registering information for each user one by one on each terminal requires significant effort from the administrator. Settings such as personal ID, personal name, organization ID, organization name, and authentication validity period need to be configured for each terminal. Additionally, many terminals cannot register in Japanese, and they are not always user-friendly. "SmileOkay-Manager" alleviates the inconveniences mentioned above. Main features include: - Bulk registration of user information - Automatic backup of data on the authentication terminal when sending registered information to the terminal - Setting authentication permissions for users in access groups - Deletion operations for user information linked to the authentication device - Ability to change terminal settings from SmileOkay-Manager And more. *For more details, please refer to the PDF document or feel free to contact us.

  • 一括登録2.png
  • 自動バックアップ2.png
  • アクセスグループ認証権限設定2.png
  • ユーザ情報削除連動2.png
  • デバイス設定変更2.png
  • 有効認証期間設定2.png
  • 特別管理者2.png
  • Entrance/exit management and personal identification system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Secure and safe environment for remote work.

What is necessary to make remote work secure and safe?

This explains the security challenges in implementing remote work and the tools necessary to create a safer remote work environment.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration