Read how Healthcare groups and hospitals can better adhere to HIPAA Password requirements
Read how this Contact Center stepped up their network security to protect
PII (personal identifying information)
Read how a Power & Utility vendor can improve endpoint security to safely log into their member's systems
Read the latest news on Keyloggers and find out how they are commonly used in breaches and identity theft.
KTLS™ Keystroke Transport Layer Security
McAfee Security Alliance shares vision to protect the enterprise from keyloggers.
The missing link in endpoint security
Studies now show that over 90% of enterprise breaches begin with a successful phishing attack to an endpoint. This is frequently followed by the installation of spyware, specifically a keylogger. Keyloggers are one of the most common, yet dangerous components of malware and are used to gain access credentials needed to advance a breach. In fact, keyloggers were at the helm of some of the biggest breaches of our time including large retailers, banks and health organizations.
The only solution to STOP zero-day keyloggers
Perimeter and Network security fail to completely lock down the endpoint as "zero day" keyloggers (those not yet discovered and catalogued by antivirus) continue to make their way into organizations. In addition, may keyloggers are polymorphic, meaning they have the ability to change form to evade antivirus and go on undetected for months and sometimes years. EndpointLock™ Keystroke Encryption eliminates the ability of a keylogger to capture keystrokes on your device, even those which are "zero-day and polymorphic.
EndpointLock is sold as a stand alone product to the enterprise to protect all endpoints including BYOD (Bring Your Own Device). In addition, EndpointLock is bundled with our CyberIDLock Identity Theft Protection Plan which is sold to organizations as an Employee Benefit Plan. Read More about this plan.
While SSL and TLS begin strong cryptography at Layer 4 or, the Transport Layer within OSI, KTLS™ (Keystroke Transport Layer Security) begins strong cryptography from the kernel level at ring 0 and encrypts all keystrokes. Traditional keystroke data flows through a series of steps before it appears in your monitor. Hidden in these steps in an area of vulnerability where keyloggers can be installed. ACS EndpointLock Desktop for Windows and Mac proactively encrypts all keystrokes at the kernel, the point of data entry, and re-routes the encrypted keystrokes around the vulnerability through its own "Out of Band" channel, a separate path that is invisible to keyloggers, which is protected with a military-grade 256-bit encryption code.
KTLS™ protects your keystrokes by creating an alternate pathway, routing your data around the area of vulnerability. As a second level of security, this new pathway is protected by a complex 256bit encryption code.
with KTLS™ Keystroke Transport Layer Security
EndpointLock™ Key Features:
The only solution that protects against zero-day keyloggers.
Operates as an anti-subversive, detects untrusted drivers and displays a warning containing the name of any suspicious driver.
Automatically installs to your TPM (Trusted Platform Module) if available.
Anti-Screen Scraping blocks screen capture.
Anti-Clickjacking Warning visually alerts you with a red dotted outline of untrusted areas.
CryptoColor: Visual confirmation highlights verifies the text fields are safe to type into.
Can be installed in an enterprise and deployed via group policy.
Compatible with McAfee ePolicy Orchestrator
Can encrypt double-byte characters
Can encrypt all international keyboards
Works with PS2, USB, Wireless & Bluetooth keyboards
Built here in the USA, and more than 8 Million consumers and corporations have already downloaded our technology.
McAfee ePO (ePolicy Orchestrator) Compatible
Protect your Android and iOS mobile devices from keylogging spyware
EndpointLock™ for Mobile:
Supports: Apple iPhones & iPads, Android Phones & Tablets.
BYOD (Bring your own device)
Logging into VPN
Entering PII (Personal Identifiable Information)
Entering EHR (Electronic Health Records)
An estimated 16 million mobile devices are infected with mobile malware, with threats constantly on the rise. Traditional keystroke data flows from your mobile keyboard through your operating system before it appears in your apps. Hidden along the way are areas of vulnerability where cyber criminals can plant keylogging spyware. With (BYOD) Bring your own device and mobile cyber attacks both increasing, enterprises must address security with tools to thwart the massive vulnerabilities that exist when using infected apps and phishing emails and messages, which download keylogging spyware.
EndpointLock™ for Mobile protects your keystroke data by installing a secure encrypted keyboard that creates an alternate pathway to your apps, routing your encrypted data around the areas of vulnerability. For added security, the EndpointLock™ pathway is protected by a complex 256-bit encryption code.
EndpointLock™ Mobile SDK
(Software Developer's Kit)
Secure your Desktop and/or Mobile Apps
Get keystroke encryption embedded right into your desktop and mobile app. Users will feel confident as they provision and use the app and add their credentials including typing in their credit card numbers. Please contact our sales dept. for more information.