for the Enterprise
THE MISSING LINK IN
Studies now show that over 90% of enterprise breaches begin with a successful phishing attack to an endpoint. This is frequently followed by the installation of spyware, specifically a keylogger. Keyloggers are one of the most common, yet dangerous components of malware and are used to gain access credentials needed to advance a breach. In fact, keyloggers were at the helm of some of the biggest breaches of our time including large retailers, banks and health organizations.
The only solution to STOP zero-day keyloggers
Perimeter and Network security fail to completely lock down the endpoint as "zero day" keyloggers (those not yet discovered and catalogued by antivirus) continue to make their way into organizations. In addition, may keyloggers are polymorphic, meaning they have the ability to change form to evade antivirus and go on undetected for months and sometimes years. EndpointLock™ Keystroke Encryption eliminates the ability of a keylogger to capture keystrokes on your device, even those which are "zero-day and polymorphic.
EndpointLock is sold as a stand alone product to the enterprise to protect all endpoints including BYOD (Bring Your Own Device). In addition, EndpointLock is bundled with our CyberIDLock Identity Theft Protection Plan which is sold to organizations as an Employee Benefit Plan.
Keystroke Transport Layer Security™ (KTLS™)
While SSL and TLS begin strong cryptography at Layer 4 or, the Transport Layer within the OSI, KTLS (Keystroke Transport Layer Security) begins strong cryptography from the kernel level at ring 0 and encrypts all keystrokes. Traditional keystroke data flows through a series of steps before it appears in your monitor. Hidden in these steps in an area of vulnerability where keyloggers can be installed. ACS EndpointLock Desktop for Windows and Mac proactively encrypts all keystrokes at the kernel, the point of data entry, and re-routes the encrypted keystrokes around the vulnerability through its own "Out of Band" channel, a separate path that is invisible to keyloggers, which is protected with a military-grade 256-bit encryption code.
KTLS™ protects your keystrokes by creating an alternate pathway, routing your data around the area of vulnerability. As a second level of security, this new pathway is protected by a complex 256bit encryption code.
Other Features for the Enterprise:
TPM (Trusted Platform Module) Support:
ACS EndpointLock™ will automatically detect if a PC has an Intel TMP (Trusted Platform Module) chip, which is designed to secure hardware and software integrity by integrating cryptographic keys into devices, and will install directly to the TPM on the PC.
Kernel Compromise Warning Feature:
Warns the user of a kernel breach by detecting the presence any unsigned software or if a driver has been altered since it was released. ACS EndpointLock™ indicator will turn yellow to indicate warning and log details of the breach including identity of the breached computer and its file location within that system.
Anti-subversion technology prevents ACS EndpointLock™from being by-passed by other software by reinstalling itself in the first position in the kernel level.
Anti-Screen Scraping Feature:
Hides the screen from screen loggers and sends them a black screen.
Makes the invisible, visible. Hackers can embed invisible objects into iFrames, ACS EndpointLock™ can detect this type of attack and unhide the invisible object, and paint a red border around the object, alerting the user not to click on this object.
Supports: Apple iPhones & iPads, Android Phones & Tablets.
BYOD (Bring your own device)
Logging into VPN
Entering PII (Personal Identifiable Information)
Entering EHR (Electronic Health Records)
An estimated 16 million mobile devices are infected with mobile malware, with threats constantly on the rise. Traditional keystroke data flows from your mobile keyboard through your operating system before it appears in your apps. Hidden along the way are areas of vulnerability where cyber criminals can plant keylogging spyware. With (BYOD) Bring your own device and mobile cyber attacks both increasing, enterprises must address security with tools to thwart the massive vulnerabilities that exist when using infected apps and phishing emails and messages, which download keylogging spyware.
EndpointLock™ for Mobile protects your keystroke data by installing a secure encrypted keyboard that creates an alternate pathway to your apps, routing your encrypted data around the areas of vulnerability. For added security, the EndpointLock™ pathway is protected by a complex 256-bit encryption code.
YOUR LOGO HERE
EndpointLock Mobile SDK
Software Developer's Kit
Secure your Desktop and/or Mobile Apps
Get keystroke encryption embedded right into your desktop and mobile app. Users will feel confident as they provision and use the app and add their credentials including typing in their credit card numbers. Please contact our sales dept. for more information.