IC card authentication system - List of Manufacturers, Suppliers, Companies and Products

IC card authentication system Product List

1~2 item / All 2 items

Displayed results

IC card authentication system 'ARCACLAVIS NSAS'

Basic design assuming introduction to large-scale networks! Use of issued IC cards is also possible.

"ARCACLAVIS NSAS" is a highly operational IC card authentication system specialized for Active Directory authentication. It is designed with the premise of being implemented in large-scale networks, eliminating the need for IC card issuance tasks or special authentication servers. It can directly accommodate the security policies of existing domains. With easy and simple operations, the schedule for implementation is significantly shortened. It is also possible to use already issued IC cards. 【Features】 ■ No need for IC card issuance tasks ■ No need for special authentication servers ■ Directly accommodates the security policies of existing domains ■ Significantly shortens the schedule for implementation ■ Easy emergency response *For more details, please refer to the PDF materials or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IC card authentication system for identifying PC users and managing attendance time!

"SecureSeed Plus," which enables two-factor authentication using IC cards, allows for accurate identification of PC users and precise tracking of actual working hours.

We would like to introduce the feature "IC Card Authentication" of SecureSeed Plus. With two-factor authentication using an IC card and password, it is possible to accurately identify individuals using PCs, as well as to accurately grasp actual attendance times. It is also possible to forcibly perform operations such as locking, logging off, or shutting down at specified times, which can be utilized for work style reform. 【Solutions to the following concerns】 ■ Unable to know when and who is using shared PCs; unclear usage status ■ Want to enhance not only security but also convenience when logging into PCs and software ■ Want to limit PC usage time to reduce overtime without applications *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration