Traditional keystroke data flows through a series of steps before it appears in your monitor. Hidden in these steps in an area of vulnerability where keyloggers can be installed. ACS EndpointLock™ Desktop for Windows and Mac proactively encrypts all keystrokes at the kernel, the point of data entry, and re-routes the encrypted keystrokes around the vulnerability through its own "Out of Band" channel, a separate path that is invisible to keyloggers, which is protected with a military-grade 256-bit encryption code and KTLS™ (Keystroke Transport Layer Security).
Keystroke Transport Layer Security
KTLS™ is an ACS patented cryptographic protocol that provides for the encryption and transport of keystrokes originating from the kernel at the time of secure boot and entry in to any application, web application or web browser. KTLS™ fills a gap in enterprise security by providing a first layer of defense against keylogging malware, which has been consistently leveraged in the beginning stages of many of the biggest hacks of our time. Read more about KTLS™ technology in our EndpointLock™ Keystroke Encryption product.