Enter your keyword

EndpointLock™

EndpointLock™

Patented Keystroke Encryption with KTLS™ Keystroke Transport Layer Security

Client, Customer, Vendor – Perimeter security begins at the keystroke

Desktop

Enterprise
Desktop Computers

Mobile

Enterprise
Mobile Devices

Applications

Enterprise
Mobile Applications

Anti-Screen Scraping - Hides the screen from screen loggers and sends them a black screen.

TRUSTED PLATFORM
TRUSTED PLATFORM

EndpointLock™ will automatically detect if a PC has an Intel TMP (Trusted Platform Module) chip

KERNEL COMPROMISE
KERNEL COMPROMISE WARNING

Warns the user of a kernel breach by detecting the presence any unsigned software or if a driver has been altered since it was released.

SELF-MONITORING
SELF-MONITORING

Anti-subversion technology prevents EndpointLock™ from being by-passed by other software by reinstalling itself in the first position in the kernel level.

ANTI-CLICKJACKING
ANTI-CLICKJACKING

Makes the invisible, visible. Hackers can embed invisible objects into iFrames, EndpointLock™ can detect this type of attack and unhide the invisible object.

KTLS™ Keystroke Transport Layer Security

EndpointLock Keystroke Encryption
  • Takes control of the keyboard driver at the lowest possible layer in the kernel, Ring “0”.
  • Protects keystroke data by creating an alternate AES 256 AES bit encrypted pathway, routing the data around the area of vulnerability.
  • Create Encrypted Keystroke packet per keystroke
  • Create Decrypt packet per keystroke for Encrypted Keystroke
  • Send Decrypt packet in to text box requesting stroke and then deliver encrypted keystroke and decrypt keystroke directly in to application
  • Sends a numerical sequence up the traditional data flow stack, rendering all data collected by keyloggers completely useless.

Control the keyboard driver at the lowest possible layer in the kernel, Ring “0”.

Keystroke Transport Layer Security KTLS

EndpointLock™ takes control of the keyboard driver at the lowest possible layer in the kernel, Ring “0”.

EndpointLock™ KTLS™ delivers Keystroke Transport Layer Security:
  • While SSL and TLS begin strong cryptography at Layer 4 or, the Transport Layer within OSI,
  • KTLS™ begins strong cryptography from the kernel level at ring 0 and encrypts all keystrokes.

Next Generation Enterprise Security Solutions

  • Keystroke Encryption
    • Keystroke Transport Layer Security (“KTLS”) -Endpointlock™

  • Multi-Factor Out-of-Band Authentication

  • Keystroke Encrypted Multi Factor Out of Band Authentication
    • KTLS and Multi-Factor Out of Band Auth (“CyGate™”)
EndpointLock NEXT GENERATION ENTERPRISE SECURITY SOLUTIONS

CyGate™

Custom brand label our Secure Keyboard utilizing the Software Development Kit (SDK)
with in your mobile application with your company logo and hyperlink.
EndpointLock enterprise mobile app via SDK.
error: Alert: Content is protected !!