Reduce the threat of a hacker

Stop cybercriminals from hacking your computers and mobile devices and keep your sensitive information secure. We protect all endpoints from eavesdropping spyware.

How Does Our Endpoint Protection Work?

Select a device below


Privacy Protection for Desktop Computers and Laptops

Works on both PC and MAC


Outsmart cybercriminals

Protect your keystroke data at the point of origin – the keyboard – and deliver it safely and securely into the application or browser.

A new path to foiling cybercriminals

Our keystroke protection stops malicious spyware and malware programs by encrypting keystroke data and routing it directly to your internet browser or desktop through a secure pathway that’s invisible to the keyloggers.

Traditional keystroke data flows through a series of steps before it appears on your monitor, similar to running a relay race. Hidden in these steps is an area of vulnerability where cyber criminals try to take advantage using keylogger spyware.

We bypass the places keyloggers can reside, helping to eliminate your vulnerability to attack. As a second level of security, we protect the pathway it creates with a military-grade 256-bit encryption code. At the same time, we send out a sequence of meaningless numbers in place of keystrokes, making any data collected by hackers completely meaningless.

Key Features

  • Keystroke Encryption
    Controls your keyboard at the lowest layer in the kernel to guard against existing and new, “zero day” keyloggers.
  • Anti-Clickjacking
    Detect and highlight hidden clickjacking attacks to warn you from clicking on malicious invisible objects embedded in legitimate web pages
  • Anti-Screen Capture
    Prevents malware from secretly taking screenshots of your personal information or content displayed on your screen.
  • CryptoColor®
    Visual verification shows you that GuardedID® is protecting your input by highlighting what you type in a color you select. (Currently available for Internet Explorer and Chrome, and coming soon for other browsers.)
  • Malicious Driver Monitoring
    Works as a constant anti-subversive service, detecting untrusted drivers, such as keyloggers, and displaying a warning containing the name of any suspect driver.
  • Full Protection
    Includes USB, wireless, PS2 and Bluetooth keyboards; can encrypt all international keyboards.

Privacy Protection for Mobile Devices

Works on both Apple (iOS) and Android

An estimated 16 million mobile devices are infected with mobile malware, with threats constantly on the rise. We have the world’s most advanced security suite for mobile devices, with the power to protect your confidential information, online transactions and login access against keylogging spyware. We even help you create and store hard-to-crack passwords.

They can’t hack what they can’t see

Traditional keystroke data flows from your mobile keyboard through your operating system before it appears in your apps. Hidden along the way are areas of vulnerability where cyber criminals can plant keylogging spyware and malware.

We protect your keystroke data by installing a secure encrypted keyboard that creates an alternate pathway to your apps, routing your encrypted data around the areas of vulnerability. For added security, the pathway is protected by a complex 256-bit encryption code.

Key Features

  • Secure Keyboard
    Encrypts keystrokes and prevents from being logged into your mobile device’s data storage, no need to keep resetting your cache.
    *Works with all apps that accept a 3rd party keyboard
  • Secure Web Browser
    Encrypts keystrokes between your on-screen keyboard and the browser
  • Encrypted password manager
    Safely stores an unlimited number of passwords with associated websites.
  • Password generator
    Creates strong passwords based on your preferences and drops them into your password vault for future use.
  • Two-Factor (2FA) Authenticator
    Works with all OATH-compliant authentication systems to enable secure login to internal or external sites directly from within the application without the need for a physical token.