© 2017 Tritium Information Security 
Privacy Policy

Tritium Information Security | 3375 Park Ave Suite 4000  Wantagh, NY 11793 |  855-395-9896 |  info@tritiumusa.com

Eliminate the threat of keystroke capture before it can advance.

Utilize ACS EndpointLock™ Keystroke Encryption as a first line of defense against Advanced Persistent Threats. 

Desktop: PC & Mac | BYOD: Android & iOS  | For Developers: SDK Available

ACS EndpointLock™ Keystroke Encryption provides the missing link in endpoint security. EndpointLock encrypts all keystrokes, shielding credentials and other sensitive data from being captured by advanced persistent threats, including zero-day and polymorphic types. 

The Solution:
  • Guard against kernel, desktop & browser based keyloggers (Catalogued and Zero-Day)

  • Anti-subversion feature alerts user of kernel compromise

  • Encrypts double-byte characters

Continuous Protection
Real-Time Alerts
  • CryptoColor*: Visual confirmation highlights all forms to verify the text fields are safe to type into.

  • Anti-screen scraping

  • Anti-clickjacking warning

Versatile
  • Install in enterprise and deploy via group policies

  • Encrypts all international keyboards

  • Compatible with PS/2 port, USB, Wireless & Bluetooth keyboards

Trusted
  • Keystroke encryption technology, protected by three keystroke encryption patents

  • Built in the USA, more than 8 Million consumers & corporations have already deployed EndpointLock™ to protect themselves and their data

The Facts:

"81% of hacking-related breaches leveraged either stolen and/or weak passwords."

Verizon DBIR Report 2016 

Get in Touch.

If you'd like to place an order or have any inquiries, please reach out to us at 855-395-9896. If you prefer, you can also fill out our form below. 

  • Payment Transaction Entry

    • Credit/Debit Card, Bank Account

  • Personal Identifying Information Entry

    • ​Social Security Number, Date of Birth, Mailing Address

  • Login access for client and/or consumer

  • E-mail communications

  • BYOD access

Keystroke Encryption for:

Tritium Information Security is proud to partner with Advanced Cyber Security to present optimal endpoint software security solutions for your business. 

ACS EndpointLock™ is McAfee ePO compatible.

The initial stage of a breach is the capture of login information through various social engineering methods, such as phishing or clickjacking. Keyloggers and screen capturing malware are still in use to intercept endpoints and record information. While traditional antivirus and firewalls have circumvented some threats, keylogger software can bypass these security measures by changing its form to further infect other endpoints in your infrastructure. 

The Obstacle: