keystrike-logo-dark

See true continuous authentication live at GISEC

Wondering what Keystrike Sanctum Guard looks like on both the user and hacker sides of the screen? Meet us at Stand No. G16, Hall 4, and take part in our live demo. 

homepage-try-keystrike
EU_shield_hz_rv

Did you hear the news from Emory University?  

Keystrike Named Start-Up of the Year for 2024

The ideas behind our product came to fruition in our very own Dr. Vigfusson’s lab while he was on the faculty at Emory. Today, those ideas have evolved into this exciting company we call Keystrike. We look forward to the award ceremony in Atlanta on March 21. 

Let us know if you're planning on stopping by 

gisec-2024-date-clr-bg
  • Find us at Stand No. G16, Hall 4
  • Keystrike team members on site for GISEC:
    • Ymir Vigfusson, Inventor/Co-Founder
    • Valdimar Oskarsson, CEO/Co-Founder
    • Leifur Saemundsson
  • Product available for demo on site: Sanctum Guard
  • Why you should see Sanctum Guard? Keystrike ensures that commands are physically made on the employee workstation, in a manner that a remote hacker cannot forge. 

Protect the rest of the company when an employee is hacked - meet Sanctum Guard

Keystrike Sanctum Guard ensures your servers receive only commands that are entered physically on your workstation, even when your workstation has been hacked. Sanctum Guard protects remote servers from further “lateral movement” compromise in your name, siloing even the stealthiest “living off the land” attackers, such those behind current ransomware attacks.

keystrike-product-diagram PDF-02

Features

product-tab_1-bolsters-security

Bolsters security of remote access

Modern security practices segment computers into islands of trust. Keystrike Sanctum Guard secures the bridges that are built between the islands.

product-tab_2-seamless

Seamless for your users

Keystrike’s adds security without needing any interaction from the employee: by simply physically using their device, they are automatically verifying their intentions.

product-tab_3-simple-no-alchemy

Simple idea—no alchemy needed

Keystrike cryptographically attests each physical mouse click and character typed on a keyboard. No machine learning, no voodoo. Keystrike complements others controls by certifying “good behavior” instead of trying to infer “bad behavior”.

product-tab_4-complements-authentication

Complements authentication solutions

After authentication, Keystrike protects the user session, continuously ensuring that all input was made by an authorized party.

Want to see Sanctum Guard in action at GISEC?