Block Lateral Movement
Detect and disrupt advanced persistent
threats (APT) living off the land.
How attackers Bypass Identity
Controls
Modern breaches typically start by compromising
workstations because people are the weakest link and
www.keystrike.com
perimeter defenses are easily bypassed with social
engineering. Attackers then move laterally by taking
over users’ authorized accounts. This is APT’s bread
and butter because identity security controls store
tokens, cookies, tickets, etc. on users’ workstations.
When the workstation is compromised, attackers can
simply usurp these access tokens for their own
purposes without raising any suspicion.
A Clean Signal for Workstation
Compromise
There is no correlation between compromising the Keystrike Benefits
software on a workstation and having physical access
to the workstation. When workstations are
Early detection of APTs
compromised, the one thing the attacker cannot do
remotely is physically type at the keyboard.
Isolate compromised workstations
This means remote connection attempts, without from sensitive systems
physical input, are sure signs of compromise.
Block ransomware
Stop breaches & data exfiltration
Rapid deployment via msi files
ATTACK
REMOTE LACK OF Zero user friction
CONNECTION PHYSICAL
ATTEMPTS INPUT
MFA & PAM Don’t Stop Lateral Movement
Even MFA and PAM solutions are ineffective against this common attack path because they also store access tokens on
the workstation. After privileged users provide the 2nd factor for MFA or PAM, the attacker can use the authorized
session concurrently with the administrator.
Keystrike Solution: Attestation for every remote connection command
Keystrike disrupts attacks before they become breaches by detecting compromised workstations and
isolating them from jump boxes and other sensitive systems.
Was the command typed at Does this command
this workstation keyboard? have attestation?
ADVANCED SENSITIVE
HACKER WORKSTATION SYSTEMS
AUTHORIZED USER
Keystrike assumes both the workstation and its authenticated
sessions are compromised. To protect sensitive systems (e.g. servers
with critical data, domain controllers, jump boxes, etc.) Keystrike
Supported Protocols
authenticates the intent of every remote command (RDP, SSH, VDI,
etc.) to filter malicious commands from legitimate ones without any RDP VNC
false positives.
OCA SSH
This stops APTs from using process injection or token hijacking to
send malicious commands that breach critical data or install TeamViewer VDI
ransomware on sensitive systems.
Uses cases
Detect and Stop APTs and Block Lateral Movement
Social engineering and zero-day exploits enable APTs to easily bypass perimeter security controls. However,
Keystrike detects APTs at the precise moment they attempt to move laterally.
Secure Privileged Accounts
Ensure that the remote commands from authorized users’ workstations (e.g. IT admins, developers, executives,
WFH/remote users, contractors, etc.) are from the authorized person, not attackers hijacking authorized
accounts.
Protect Jump Boxes and Bastion Hosts
Stop attackers from accessing the highest security network segments by taking over privileged accounts to
protect OT enviroments and SCADA systems.
Scan the QR code to sign up for a demo
For further information, please visit our website keystrike.com or send an email to info@keystrike.com.