1~45 item / All 49 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~45 item / All 49 items
The OTP token "c610" is an authenticator that generates a multi-factor authentication (MFA) one-time password (6-digit number). Registration is completed simply by having the user scan the displayed QR code with this product. Therefore, it can be operated without placing a burden on the administrator. It can be used as an alternative to the mobile authenticator app for employees who are not provided with a company mobile phone. 【Features】 ■ Easy to introduce ■ Easy to operate ■ Safe even without a smartphone ■ Compliant with OATH standards ★ Please apply for a free trial version through "Contact Us" ★ * For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis blog introduces precautions regarding the use of VPNs during remote access. A VPN establishes a virtual private line over the internet, ensuring a secure route for exchanging important information, thereby protecting confidential data from security threats such as "eavesdropping" and "tampering." To prevent the spread of viruses, companies implementing telework, such as remote work from home, are rapidly increasing. As phishing attacks targeting remote workers are also on the rise, there is a growing demand for enhanced security measures, such as multi-factor authentication, when using VPNs for remote access. [Contents] ■ Alerts from the Cybersecurity and Infrastructure Security Agency (CISA) ■ Applying security patches to devices used for remote access ■ Reasons for implementing multi-factor authentication in VPN connections *For more details, please refer to the related links. *For further information, please consult the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationTwo Factor Authentication (2FA) is a system that uses two elements to authenticate a user. For a long time, authentication using an ID and password was common, but this is an authentication method based on a single element, "ID + password." In recent years, there have been continuous incidents of account information leaks, and it has been pointed out that authentication based on a single element poses security issues. Two Factor Authentication requires two out of the three elements of authentication to be present for the authentication to be successful, significantly enhancing the strength of the authentication. In this blog, we introduce examples of Two Factor Authentication. Please take a moment to read it. [Contents] ■ What is Two Factor Authentication? ■ Advantages and disadvantages of major authentication methods ■ Why is password authentication problematic? ■ Combining different authentication methods *Detailed content of the blog can be viewed through related links. *For more information, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis blog introduces "MFA (Multi-Factor Authentication)" that can be implemented at a low cost. Multi-factor authentication, which requires two or more authentication factors, has become essential for web services provided by major companies. MFA using one-time password authentication tokens can be implemented at a low cost, and while user operations are simple, it enhances security, leading to an increase in its adoption. [Contents] ■ Multi-factor authentication (MFA) is also used in services of major IT companies ■ Easy-to-use one-time password (OTP) tokens ■ Provides robust security even in online banking * For more details, you can view the related links. * For more information, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis blog introduces "Physical Security Keys that Achieve Strong Security and Convenience." As online services become widespread, relying solely on passwords for authentication increases the risk of information leaks. Additionally, two-factor authentication using SMS (short message service) on smartphones can be cumbersome and time-consuming. Therefore, the use of security keys is gaining attention as a measure to enhance corporate security. Since they are used like a physical key, authentication can be performed smoothly. [Contents] ■ FIDO-compliant security keys are becoming mainstream ■ "Having it" serves as identity verification ■ Effective in preventing phishing scams ■ The necessity of multi-factor authentication is advancing, expanding its applications * For more details, you can view the related links. * For more information, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis blog introduces "Tokens/Security Keys Available with Azure AD Authentication." Microsoft's Azure AD (Active Directory) is used as the authentication infrastructure for various cloud services, including "Microsoft 365." Users can utilize authentication methods using traditional usernames and passwords, as well as security keys compliant with "FIDO2" and OTP tokens compliant with OATH. Additionally, it is possible to complement or replace the basic password with additional authentication methods, enhancing security. [Content Included] ■ A robust network of Azure spanning countries and regions ■ Azure AD supporting sign-ins to services like Microsoft 365 ■ Basic features of Azure AD ■ Benefits of implementing Azure AD ■ Authentication methods of Azure AD *Detailed content of the blog can be viewed through related links. *For more information, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis blog introduces the "Mandatory Implementation of MFA (Multi-Factor Authentication) for Salesforce." The customer relationship management (CRM) solution "Salesforce" made the use of multi-factor authentication (MFA) mandatory in February 2022. As the threat of unauthorized access continues to rise, the aim is to protect important information of client companies by enhancing security through the combination of two or more factors, rather than relying solely on ID and password. Since two-factor authentication via SMS or email alone cannot meet the requirements of mandatory multi-factor authentication, three authentication methods are recommended. [Content Overview] ■ Reasons why Salesforce requires MFA (Multi-Factor Authentication) ■ Responding to rapidly changing threats ■ What MFA (Multi-Factor Authentication) methods does Salesforce recommend? *For more details, you can view the related links. *For more information, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis blog features AI facial recognition terminals that can also measure body temperature. Our company sells the AI recognition terminal "SpeedFace-V5L/ProFace X," which enables contactless facial recognition and palm recognition, to businesses, schools, and clinics, such as offices and factories. Without touching the terminal, it alerts users with screen displays and alarm sounds when it detects individuals without masks or with abnormal body temperatures, making it a focus of attention as an effective measure for preventing viral infections. [Content] ■ AI-based temperature measurement, advanced and highly reliable access management support ■ AI recognition through walk-through, detecting abnormalities and issuing warnings *For more details, you can view the related links. *For more information, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis blog discusses methods to achieve both enhanced security and infection control. There is an increasing effort to strengthen security by integrating facial recognition with existing systems. Due to its high accuracy in preventing impersonation and its hygienic nature, there are more cases of implementing facial recognition in system integration in response to the spread of viruses. [Content] ■ Strengthening security through impersonation prevention ■ Enabling contactless, walk-through authentication ■ Entire apartment buildings using facial recognition * For more details, you can view the related links. * For more information, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis blog features information about system integration with facial recognition edge devices. Facial recognition edge devices are on-site terminals that verify identity using facial recognition. Thanks to the Internet of Things (IoT), they can now integrate with systems that provide various functions over the internet. Their applications are expanding in facilities such as companies, schools, hospitals, and apartment complexes for purposes like access control, attendance management, and enhancing security. [Content Featured] ■ Edge devices that excel in speed, cost, flexibility, and scalability ■ Examples of system integration with facial recognition edge devices *For more details, you can view the related links. *For more information, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis blog discusses how to enable cashless transactions using IoT devices. In Japan, there are many coin-operated machines that require inserting coins to receive services. However, by utilizing these IoT devices, there is a growing interest in evolving them into online machines that enable cashless payments. Transforming coin-operated machines to support cashless payments and online functionality can lead to various management improvement effects. [Content Overview] - The risk of missing business opportunities with offline machines alone - Affordable retrofitting of cashless functionality using IoT devices - Diverse payment options, comprehensive support, and easy implementation... *For more details, please refer to the related links. *For further information, please check the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis blog features a convenient service for managing authentication information in bulk. Microsoft's Azure Active Directory (AD) is used as the authentication foundation for various cloud services, including Microsoft 365. In addition to authentication methods using ID and password, device authentication can be added with FIDO security keys and OTP tokens compliant with OATH, enabling enhanced security through multi-factor authentication (MFA). [Content] ■ Maintaining the security level of cloud service authentication ■ Achieving MFA by adding FIDO security keys ■ Utilizing tokens for Azure AD authentication ■ Field sales representatives logging in on shared devices *For more details, you can view the related links. *For more information, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis blog discusses the benefits of adopting passwordless authentication. Authentication using ID/password is exposed to the risk of "unauthorized access" if the password is leaked to a third party. To protect important information and assets of individuals and companies from malicious unauthorized access, passwordless authentication, which does not use passwords, is gaining attention. [Content] ■ Risk reduction through multi-factor authentication (MFA) such as "biometric authentication" ■ Utilizing the passwordless authentication standard "FIDO" that balances security and convenience ■ Liberation from the stress of password management *For more details, you can view the related links. *For more information, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis blog discusses the zero trust approach to user authentication. With the advancement of mobile devices such as laptops and tablets, there is an increasing business scene of telecommuting away from the office. While there are benefits from this digital transformation, the security risks targeting information, which is a critical asset for companies, are also rising. The first barrier to reducing the risk of information leakage from both external and internal sources is the zero trust approach to user authentication. [Content] - Zero Trust = Trust nothing - Zero Trust authentication through Multi-Factor Authentication (MFA) - Preventing information leakage due to internal misconduct - Low-cost, efficient management is key to improving productivity *For more details, you can view the blog through the related links. *For more information, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis blog discusses measures against information leakage using file encryption software. File encryption is the process of converting certain data into another form through special processing. To view the encrypted data, it is necessary to decrypt the file using a "key," such as a password. By using file encryption software, even if the data falls into the hands of a third party, its contents cannot be read. [Contents] ■ Loss of customer trust if information leakage occurs ■ Software that automatically performs encryption is gaining attention ■ Choose based on the overall cost-performance ratio of information leakage countermeasures * For more details, you can view the related links. * For more information, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis blog features devices suitable for multi-factor authentication. As the risks of unauthorized access through password-only authentication are being pointed out, many internet-related services are beginning to implement multi-factor authentication as part of their security enhancements. We have seen an increase in inquiries about using hardware as MFA devices, including not only cases that utilize smartphones commonly used but also various types such as physical security keys and hardware tokens that display one-time passwords. [Content Featured] - Utilizing smartphones, which are familiar MFA devices - "Physical security keys" that are inserted like a key for user authentication - MFA devices that display one-time passwords - FIDO security keys for MFA in Azure AD and Salesforce *For more details about the blog, you can view it through the related links. *For more information, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis blog provides detailed information about "FIDO Passkeys." This product is a new security technology that replaces passwords. The "FIDO Alliance" and the "World Wide Web Consortium" are working together to develop it, and the three major U.S. IT companies—Google, Microsoft, and Apple—have announced plans to support it as a standard for passwordless sign-in. [Content] ■ Solving the challenges of reconfiguration with multi-device support ■ Support from Google, Microsoft, and Apple ■ Synchronizing cryptographic keys belonging to FIDO Passkeys across devices * More details can be viewed through the related links. * For more information, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis blog discusses methods to prevent the misuse of licenses. Software license violations pose a significant risk to companies and organizations. If one unknowingly uses software illegally in their operations, they may face not only fines but also a loss of social credibility. To avoid this, it is crucial to thoroughly implement "license management," understand the contract periods of software, and utilize "protector tools" such as dongles to prevent unauthorized use. [Content] ■ The risk of having to pay multiple times the usage fee if a license violation occurs ■ Assembling necessary software and managing licenses properly ■ The benefits of managing software licenses ■ Utilizing cost-effective protector tools *For more details, you can view the related links. *For more information, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis blog features suitable authentication solutions. The IT environments of companies are diversifying, ranging from traditional on-premises systems to cloud-based systems, and it is necessary to consider the implementation of authentication security that fits their own systems. In response to these changes in the environment, more companies are adopting authentication solutions that incorporate multi-factor authentication, such as the use of one-time password tokens and security keys. [Content] ■ Addressing the risks of entrusting data to cloud services ■ The increase of hybrid on-premises and cloud systems necessitates a response to diversification ■ "Zero Trust Security," which perceives internal and external network environments as borderless * For more details, you can view the related links. * For more information, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis blog discusses the advantages and disadvantages of one-time password authentication. One-time passwords are gaining renewed attention as a system to enhance login authentication security. Unlike traditional ID/password authentication methods, one-time passwords utilize disposable passwords that can be used only once, significantly improving security levels. [Content] - Strengthening authentication with user-friendly one-time passwords - New attack methods targeting one-time passwords - Utilizing multi-factor authentication in the cloud service authentication platform "Azure AD" *For more details, you can view the related links. *For more information, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis blog features a facial recognition system that is well-suited for managing office entry and exit. The facial recognition system is an authentication method that identifies individuals by matching facial information captured by a camera with a database. It is a secure authentication method that makes impersonation and other fraudulent activities difficult, and it does not require the setting of passwords. Additionally, it is contactless and highly convenient, resulting in less psychological burden for users. [Content Included] ■ What is a facial recognition system? ■ AI image recognition technology and its accuracy ■ Well-suited for office entry and exit management ■ Benefits of implementation *For more details, you can view the related links. *For more information, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationApplied Geology Co., Ltd. is a geological survey company / construction consulting company. Hiten Japan's "Raku-Nin" is used for authentication when the company's clients, private developers and house manufacturers, access the survey data related to ground and geology provided by the company. "We have received feedback that it is a management system that can be understood without referring to the manual much if you understand the system, and the user log management is well organized, which provides peace of mind." ★Please apply for a free trial version from "Contact Us"★ For detailed case information, please refer to the related links below. 【Case Overview】 ■Implementation Site: Applied Geology Co., Ltd. ■Implemented Product: Cloud Authentication Service "Raku-Nin" ■Effects ・After implementation, customers were able to switch over without discomfort. ・The replacement also enabled the use of software tokens. *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationSwallow Incubate Co., Ltd. is a cutting-edge technology venture in the IT and IoT fields, established in Tsukuba in 2013. We purchased the USB dongle "ROCKEY" from Hiten Japan and incorporated it into the SDK developed by the company. By ensuring that the ID of the dongle matches during the SDK compilation, we are able to deter unauthorized use. With this implementation, we can now sell to offline customers who cannot use the company's technology online, effectively doubling our sales channels. ★Please apply for a free trial version through the "Contact Us" section★ For detailed case information, please refer to the related links below. 【Case Overview】 ■Implementation Company: Swallow Incubate Co., Ltd. ■Implemented Product: USB Dongle "ROCKEY" ■Effect: Enabled sales to offline customers who cannot use the company's technology online. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationBodywork Service Co., Ltd. is a company that installs, rents, and sells massage chairs to various facilities, businesses, and individuals across the country. The new model of massage chair "Space Shuttle," released in September 2021, is equipped with Hiten Japan's IoT platform "IoT Cube"/Pay BOX. "We felt that the technical support was robust during development. Additionally, there was support in terms of information, and it was great to be able to consult on various matters," was the feedback we received. For detailed case information, please refer to the related links below. [Case Overview] ■ Client: Bodywork Service Co., Ltd. ■ Product Introduced: IoT platform "IoT Cube"/Pay BOX ■ Challenge: In the case of coin-operated machines, it takes time to confirm sales. ■ Effect: Users can use it without confusion. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe challenges faced by Azure AD users contacting our company include: "We want to distribute hardware tokens for MFA to employees who do not have company smartphones," and "Since remote work has become widespread across the company, we want to implement Azure AD multi-factor authentication to enhance security." The "FIDO Security Key" enables passwordless authentication using PIN/biometric authentication by utilizing FIDO2. Additionally, the "One-Time Password (OTP) Token" allows you to choose between a 30-second type and a 60-second type, and it displays the battery level, reducing the risk of running out of battery. 【Features of the FIDO Security Key】 ■ Achieves passwordless authentication using PIN/biometric authentication by utilizing FIDO2 ■ Designed to replace traditional authentication with strong hardware-based authentication using public key cryptography to protect against various cyber attacks ■ A rich lineup of options ★ Please apply for a free trial version through "Contact Us" ★ * For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationSalesforce has made multi-factor authentication (MFA) mandatory to address threats related to customer data protection, such as unauthorized access. The "FIDO Security Key" enables strong two-factor authentication through a simple operation: after entering your ID/password (U2F) or PIN (FIDO2), just touch the security key. You can choose from a range of products, including cost-effective options, those with fingerprint sensors, and USB-TypeC compatible products that suit your needs. 【Features of the FIDO Security Key】 ■ FIDO2/U2F standard compliant ■ Wide variety of lineup ■ Easy operation ★ To request a free trial version, please apply through "Contact Us" ★ *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe IoT platform "IoT Cube"/Pay BOX brings offline devices online and allows coin-operated machines to accept both cash and cashless payments. With internet connectivity, it is possible to remotely obtain sales, operational status, and marketing information. It also enables management of change, inventory control of prizes, adjustments to fees, and monitoring of machine troubles. 【Features】 ■ Centralized management of cash and cashless payment sales remotely ■ Reduction of human resources ■ Decrease in vending machine losses = Increase in sales ■ Easy and inexpensive implementation in a short period *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe provide AI facial recognition terminals that allow for safe management of entrance, store access, and room entry without the need for personnel. In addition to temperature measurement, it can also determine whether a mask is being worn. Furthermore, it can be integrated with existing systems such as electric locks and attendance management. 【Product Lineup】 ■Elite [TI] ■ProFace X [TI] ■SpeedFace-V5L [TI] *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe "AI Face Recognition Module" is a product well-suited for embedded development in on-premises systems, client PCs, and various devices' fixtures, enclosures, and panels. Since it can also estimate age, gender, and emotions, it can be used for marketing purposes by integrating it into various devices. We have a rich lineup, including the "FA51M/FA51MC," which can perform palm recognition and mask detection, so please feel free to contact us. 【Features】 ■ Face recognition ■ Age estimation ■ Gender estimation ■ Emotion estimation ■ Biometric determination ■ USB connection *For more details, please refer to the related links or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe offer a range of high-quality, secure two-dimensional code payment terminals. Starting with the "ePayPOS QE41," which intentionally limits its features to keep costs low, and including the "SCITUS F40," which is equipped with Android 7.0 and a high-speed thermal printer, we have a rich lineup. These devices can be utilized in a wide variety of settings, such as retail stores and outdoor events. 【Features】 <ePayPOS QE41> ■ Double display ■ Cordless ■ Dedicated scanning window *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"Raku-Nin" is a cloud authentication service that enables two-factor authentication and two-step verification by being integrated into your system. You can choose from multiple authentication methods to add. It can be developed and implemented in a short period, and it is priced significantly lower than other cloud services. 【Features】 ■ Excellent usability ■ Simplification through cloud services ■ Compatible with various systems ■ Peace of mind with international security standards ■ Utilizes domestic servers ★ Please apply for a free trial version through "Contact Us" ★ *For more details, please download the PDF or feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWhen it comes to web authentication, passwords are the standard, but they come with the disadvantages of information leakage risks and the hassle of management. Recently, attention has turned to the authentication standard 'FIDO' that achieves both security and convenience without using passwords. FIDO is expected to become the de facto standard for online authentication. Please feel free to contact us for more details. 【Features of FIDO Security Keys】 ■ High Security There is no risk of information leakage as confidential information is not shared with the server, making it safe. ■ Easy Operation Authentication is completed with simple actions, eliminating the need to rely on memory. ■ Peace of Mind with International Security Standards It is expected to become the de facto standard for online authentication. ★ To borrow a free trial version, please apply through "Contact Us" ★ *For more details, please refer to the related links or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"BioPass FIDO2" is a password-free fingerprint authentication device. It is the next-generation authentication FIDO that balances security and convenience. Since it does not share sensitive information with servers, there is no risk of information leakage, making it safe. This device alone achieves two-factor authentication and securely stores biometric information. 【Features】 ■ Passwordless ■ Achieves two-factor authentication with this device alone ■ Securely stores biometric information ■ Usable across multiple services ■ Authentication is completed with a simple operation, without relying on memory ★ Please apply for a free trial version through "Contact Us" ★ *For more details, please refer to the PDF document or feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe "One-Time Password (OTP) Token" is an authentication device that enables stronger authentication than fixed passwords. It generates a one-time disposable password to identify the user, allowing for access restrictions to important applications and confidential information. Compliant with the OATH standard, it can be integrated with other OATH-compliant products from different manufacturers, providing a high-quality solution. 【Features】 ■ Provides compatibility with third-party software due to OATH standard compliance ■ Does not require connection to a PC, so end users do not need to install drivers or applications ■ Pressing the button on the token displays a one-time disposable password, eliminating the need to remember it ■ Capable of integration with various applications ■ Portable design for easy carrying ★ To request a free trial version, please apply through "Contact Us" ★ * For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe "C200" is a one-time password token that generates a one-time password at regular intervals, enabling two-factor authentication during login. The display of battery life allows for risk management of running out of battery in advance, such as through replacement or stockpiling. 【Our OTP Features】 ■ High security ■ High convenience ■ Low cost ■ Usable for a wide range of applications ■ Customizable design ★ Please apply for a free trial version through "Contact Us" ★ * For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe "ePass USB Token" is a two-factor authentication device that securely stores user information and prevents unauthorized access through impersonation. Equipped with advanced encryption algorithms, it securely stores important personal authentication information (electronic certificates, private keys, user IDs/passwords). It robustly protects against threats such as data leakage and tampering due to impersonation. It can be integrated with various authentication solutions compliant with PKI. 【Features】 ■ Prevents unauthorized access with enhanced authentication ■ Supports multi-access ■ Two-factor authentication ■ Easy integration ■ A rich product lineup tailored to various use cases ★ Please apply for a free trial version through "Contact Us" ★ *For more details, please refer to the PDF materials or feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"FOAS" is a robust OTP authentication system required in the cloud era. It enhances the security level of authentication by using one-time password tokens. It strengthens authentication across various information devices such as PCs, tablet PCs, and smartphones. It achieves high security at a low cost. 【Features】 ■ Easily add strong authentication ■ Interoperable with various systems ■ Usable regardless of the format of information devices ■ Low implementation cost ■ Easy to switch from other authentication servers compliant with the international standard OATH ■ Custom integration using APIs is possible ★ To request a free trial version, please apply through "Contact Us" ★ *For more details, please refer to the PDF materials or feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe FIDO security key is a next-generation authentication technology that balances security and convenience without using passwords. Since it does not transmit authentication information over the network or store it on servers, there is no risk of password leakage. In today's world, where online services are widely adopted, it is being used by many individuals and companies as a next-generation authentication technology that replaces password authentication. The FIDO Alliance, the organization that develops the standards, includes leading companies in the IT industry such as Google, Microsoft, and Yahoo, and the number of member companies continues to grow each year. 【Features of the FIDO Security Key】 ■ High Security There is no risk of information leakage as confidential information is not shared with the server, making it safe. ■ Easy Operation Authentication is completed with simple actions, eliminating the need to rely on memory. ■ Peace of Mind with International Security Standards It is expected to become the de facto standard for online authentication. ★ Please apply for a free trial version through the "Contact Us" section. ★ *For more details, please refer to the related links or feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe IoT platform "IoT Cube"/Pay BOX enables remote centralized management of cash and sales, monitoring of machine operating conditions, and inventory management of prizes. By being able to grasp the situation remotely, it is expected to reduce labor costs and improve sales. It can be implemented easily and inexpensively in a short period, making it available for many small and medium-sized businesses. 【Features】 ■ Centralized management of cash and cashless payment sales remotely ■ Reduction of human resources ■ Decrease in vending machine losses = Increase in sales ■ Easy and inexpensive implementation in a short period *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"SecureCore For BioPass" is a solution that enables passwordless two-factor authentication by utilizing a fingerprint authentication device. By inserting the fingerprint authentication device "BioPass" as a physical "key" into the PC, users can log on. If the BioPass is removed during use, the PC will be locked to prevent unauthorized access. Since it is a fingerprint authentication device compliant with FIDO (international standard), multiple FIDO services can be used with this single security device. 【Features】 ■ Equipped with logging functionality ■ Can issue one-time passwords ■ User-friendly GUI interface for IT administrators ■ Policy setting tools allow for pre-configuration of restrictions ■ Usable with the three factors of "possession" + "biometrics" + "knowledge (password)" *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"SecureCore" is software that controls logon to Windows PCs using a USB key (ePass token) as a physical "key." With the administrator software, adding and registering USB tokens is easy. Policy settings can also be freely modified. You can consolidate and store various website IDs and passwords within the USB token, allowing for automatic authentication simply by accessing websites with Internet Explorer. 【Features】 ■ Logging function included ■ Two-factor authentication combined with ID and password ■ One-time password issuance available ■ Can store electronic certificates ■ Policy settings can be freely modified ★ Please apply for a free trial version through the "Contact Us" section ★ *For more details, please refer to the PDF materials or feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"SecureVisit" is a web authentication enhancement solution that achieves advanced security through a robust two-factor authentication method utilizing USB keys or one-time password tokens, surpassing traditional authentication methods. It can be easily implemented without the need to modify existing web servers. It is suitable for customers managing corporate web services solely with IDs and passwords. 【Features】 ■ Advanced devices that enable two-factor authentication ■ Easy implementation, construction, and operation ■ Low implementation and operational costs ■ Flexible support for large corporations to small and medium-sized enterprises ★ Please apply for a free trial version through "Contact Us" ★ *For more details, please download the PDF or feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"SecureCore DSE" is software that creates a secure internal environment by being installed on all computers within the company. Files of target applications generated within this product are instantly encrypted. It prevents any gaps and protects against the leakage of confidential information during work. It packages various security features into an all-in-one solution, significantly reducing not only the cost of the product itself but also the total costs associated with information leakage prevention. 【Features】 ■ Prevents internal misconduct ■ Controls external media and communication devices ■ Even if an email is mistakenly sent, the file remains encrypted ■ Simplified initial setup and a non-complicated system reduce the burden on administrators ■ Provides a response that does not interfere with customer operations, balancing productivity and security ★ Please apply for a free trial version from "Contact Us" ★ *For more details, please refer to the PDF materials or feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"SecureCore SFE" is a client PC-based encryption application that easily implements advanced encryption and automatic password assignment for data on file servers and NAS. If advanced encryption and password authentication are applied to the data in the event of a confidential data leak, reporting to the Personal Information Protection Commission becomes unnecessary, significantly reducing "threats and risks of cybercrime," "strengthened penalties under the Personal Information Protection Act," and "indirect risks related to information leakage." 【Features】 ■ Functional Aspects - Adopts advanced encryption (AES government recommended) - Encrypts data from various applications ■ Operational Aspects - Simply place this program in the shared folders of file servers or NAS to start operation ■ Management Aspects - No need for a management server or individual client installation work - No performance issues *For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"ROCKEY4ND" is a high-performance, high-functionality driverless dongle that employs anti-tampering body and onboard encryption engine. By utilizing the API, powerful protection can be implemented, and existing applications can also be protected using the ROCKEY4ND envelope tool. 【Features】 ■ Driverless, so it can be used simply by connecting to a PC ■ In addition to the A1 standard package, an E5 compact package has been added ★ Please apply for a free trial version through "Contact Us" ★ * For more details, please download the PDF or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration