Wondering what Keystrike Sanctum Guard looks like on both the user and hacker sides of the screen? Meet us at Stand No. G16, Hall 4, and take part in our live demo.


Did you hear the news from Emory University?
The ideas behind our product came to fruition in our very own Dr. Vigfusson’s lab while he was on the faculty at Emory. Today, those ideas have evolved into this exciting company we call Keystrike. We look forward to the award ceremony in Atlanta on March 21.

Keystrike Sanctum Guard ensures your servers receive only commands that are entered physically on your workstation, even when your workstation has been hacked. Sanctum Guard protects remote servers from further “lateral movement” compromise in your name, siloing even the stealthiest “living off the land” attackers, such those behind current ransomware attacks.


Bolsters security of remote access
Modern security practices segment computers into islands of trust. Keystrike Sanctum Guard secures the bridges that are built between the islands.

Seamless for your users
Keystrike’s adds security without needing any interaction from the employee: by simply physically using their device, they are automatically verifying their intentions.

Simple idea—no alchemy needed
Keystrike cryptographically attests each physical mouse click and character typed on a keyboard. No machine learning, no voodoo. Keystrike complements others controls by certifying “good behavior” instead of trying to infer “bad behavior”.

Complements authentication solutions
After authentication, Keystrike protects the user session, continuously ensuring that all input was made by an authorized party.