Enterprise Solutions

Network and Endpoint Security Providers:

Your Portfolio Is Incomplete without

Patented Keystroke Encryption

Your Commercial-Grade Weapon

Against Zero-Day Keylogging Malware

Studies now show that 98% of enterprise breaches begin with a successful phishing attack to an endpoint, followed by the installation of spyware, specifically a keylogger.

Keyloggers are one of the most common, yet dangerous components of malware and are used to gain access credentials needed to advance a breach. In fact, keyloggers were at the helm of some of the biggest breaches of our time including large retailers, banks and health organizations.

Your Portfolio Is Incomplete without Patented Keystroke Encryption

What Are Keyloggers?

  • Keyloggers can record every keystroke made on a mobile device or desktop
  • Keyloggers are the single biggest threat leveraged in the first stages of almost all advanced threats
  • Today’s anti-virus solutions are unable to identify and stop keylogging
  • 98% of enterprise breaches include a phishing attack to install a keylogger
  • Keyloggers can change form and go undetected for months or years

How Keyloggers Hurt Businesses?

Keyloggers can steal your:

  • Privacy
  • Usernames and passwords
  • Personal identity
  • Credit card numbers
  • Proprietary corporate data
  • Email accounts
  • Corporate transactions
  • Banking data

Enterprise-Grade Keylogger Protection

for Mobile Devices, PCs and Macs

Mobile Device Security Complete Solution

EndpointLock™ –

for Enterprise Security Solution Providers

  • Encrypts all user keystrokes

  • Supports all PCs, Macs, iOS and Android devices

  • Supports iOS and Android

  • Adds value and distinction to your service offering

How EndpointLock™ Enhances Your Portfolio

EndpointLock™ safeguards your customers’ vulnerable endpoints and BYOD devices, preventing exposure of sensitive corporate data to keyloggers. It’s the only patented software that protects from the lowest possible layer in the kernel.

EndpointLock™ will:

  • Fortify your customers’ security perimeter, from keyboard to TLS port
  • Protect data at rest
  • Protect against keylogging malware and phishing emails
  • Prevent screen-scraping and clickjacking
  • Alert customers of a kernel compromise

How EndpointLock™ Works

Keystroke Transport Layer Security™ (KTLS™) is a patented cryptographic protocol that provides for the encryption and transport of keystrokes. EndpointLock is the commercial product name

by which KTLS protocol is implemented within an enterprise.

Deploy the EndpointLock Enterprise application via GPO (Group Policy Objects ) or Microsoft SCCM .

  • Deploys in minutes
  • Protects from the kernel, at the time of secure boot
  • Transports encrypted keystrokes via a patented “Out-of-Band” channel, invisible to keyloggers,
  • Works seamlessly in the background, alongside other security software, without any conflict or latency
  • Safeguards corporate data and login information that can lead to a costly breach

EndpointLock™ for iOS and Android Devices

endpoint_mobile
  • Supports: Apple iPhones & iPads, Android Phones & Tablets.

EndpointLock:

  • Encrypts all user keystrokes
  • Creates a secure keyboard with your branding
  • Supports all iOS and Android mobile devices
  • Supports all 5G iOS and Android IOT devices
  • Routes encrypted data around the vulnerability
  • Protects against infected apps and phishing emails/messages

An estimated 16 million mobile devices are infected with mobile malware, with threats constantly on the rise. Traditional keystroke data flows from your mobile keyboard through your operating system before it appears in your apps. Hidden along the way are areas of vulnerability where cyber criminals can plant keylogging spyware. With (BYOD) Bring your own device and mobile cyber attacks both increasing, enterprises must address security with tools to thwart the massive vulnerabilities that exist when using infected apps and phishing emails and messages, which download keylogging spyware.

EndpointLock™ for Mobile protects your keystroke data by installing a secure encrypted keyboard that creates an alternate pathway to your apps, routing your encrypted data around the areas of vulnerability. For added security, the EndpointLock™ pathway is protected by a complex 256-bit encryption.

EndpointLock™ Mobile SDK (Software Developer’s Kit)

Secure your Desktop and/or Mobile Apps

Get keystroke encryption embedded right into your desktop and mobile app. Users will feel confident as they provision and use the app and add their credentials including typing in their credit card numbers.

EndpointLock™ for Desktop Other Security Features

TPM (Trusted Platform Module) Support:

EndpointLock will automatically detect if a PC has an Intel TMP (Trusted Platform Module) chip, which is designed to secure hardware and software integrity by integrating cryptographic keys into devices, and will install directly to the TPM on the PC.

Kernel Compromise Warning Feature:

Warns the user of a kernel breach by detecting the presence any unsigned software or if a driver has been altered since it was released. EndpointLock indicator will turn yellow to indicate warning and log details of the breach including identity of the breached computer and its file location within that system.

Self-Monitoring Capability

Anti-subversion technology prevents EndpointLock from being
by-passed by other software by reinstalling itself in the first position in the kernel level.

Anti-Screen Scraping Feature

Hides the screen from screen loggers and sends them a black screen.

Anti-Clickjacking Feature:

Makes the invisible, visible. Hackers can embed invisible objects into
iFrames, EndpointLock can detect this type of attack and unhide the invisible object, and paint a border around the object, alerting the user not to click on this object.

Trending for Business: BYOD

Bring Your Own Device

  • 80% of businesses support a BYOD policy

  • 60% of workers use a smartphone for business purposes

  • BYOD market: $30 billion in 2014  à  $367 billion by 2022

  • Companies encouraging BYOD save $350 per year, per employee

67% of business data breaches are due to employee mobile device use

*Source: Forbes, January 2019

EndpointLock™ Features:

  • A toolbar turns on automatically when browser or application is launched
  • Advanced, 256-bit encryption
  • Early-warning kernel and ID theft monitoring
  • User-friendly, comprehensive reporting dashboard
  • Screen-capture protection
  • Clickjacking protection
  • Protection against Dark Web email attacks*
  • ID theft protection insurance*
  • Crypto-color visual verification technology

*Add-on, enhanced services, for licensed EndpointLock solutions

EndpointLock™ Benefits:

  • Enterprise-grade
  • Certified by Windows, Mac, Linux, Android and iOS operating systems
  • Supports keyboard-enabled iOS and Android 5G IOT devices
  • Deployed directly into Layer 0, within the kernel itself
  • Encryption and decryption occur directly within the application, without any modification to the app required
  • Compatible with Intel’s TPM (Trusted Platform Module)
  • Easily scalable: deployed through MS GPO, PowerShell, SCCM and 3rd-party apps
  • Works with PS2, USB, wireless, Bluetooth and international keyboards
  • Small memory footprint
  • Requires no spyware database updates

EndpointLock™ is CromTec Cyber’s unique flagship product, and is a crucial component of a comprehensive Managed Endpoint Security strategy, which we can craft for your business.

In today’s zero-trust environment, no device can be fully trusted. There’s EndpointLock™.

Add EndpointLock™ to your portfolio today

CEMS – CromTec Endpoint Managed Security

The CEMS Product Suite:

Establish a layered security strategy, with a customized program:

  • Assess your risk and threat vulnerabilities
  • Manage your endpoints
  • Detect and respond to threats
  • Provide back-up and disaster recovery solutions
  • Implement effective policies
  • Monitor your cyber health status
error: