Keeper ZT Keeper ZT
Products
logo product

Keeper ZT

  • Capabilities
    • Capabilities
      • History of processes
      • Application control
      • File system management
      • Process management
      • CMD and PowerShell Control
      • User Policy Management
      • Windows Logs and Keeper ZT
      • Windows OS protection
      • Corporate antivirus
      • Inventory
      • Events
      • Rule builder
      • Presets
  • Advantages
    • Advantages
      • Modular expansion
      • High level of compatibility
      • Expertise
      • Single console
      • Integration with Active Directory
      • Control of all levels
      • Easy integration
      • Isolated work
      • Legacy PC and OS support
      • Protection against deleting and stopping KZT
      • Minimum resource consumption
      • APM optimization
      • Protection against deleting and stopping Keeper ZT
  • Fields
    • Fields
      • Finance
      • Education
      • State institutions
      • IT and telecommunications
      • Military-industrial complex
      • Retail
      • Data processing center
      • Pharma retail
      • Industry
      • Real estate
      • Medicine
      • Logistics
  • What does it protect?
    • Keeper ZT protects and controls:
      • Workstations
      • Servers
      • ATMs
  • What threats does it protect against?
    • Keeper ZT protects and controls:
      • Virus
      • Worm
      • Botnet
      • Spyware
      • Bankbot
      • Rootkit
      • Exploit
      • Trojan
      • Lotl
      • Ransomware
      • Backdoor
      • Adware
Partners
Account
|
  • Keeper ZT
  • Partners
  • Account
|

Capabilities

processManagement
  • History of processes
  • Application control
  • File system management
  • CMD and PowerShell Control
  • User Policy Management
  • Windows Logs and Keeper ZT
  • Protection of OS files and drivers
  • Inventory
  • Presets
  • Rule builder
  • Events
  • Corporate antivirus
Keeper ZT

Process management

Process management

Keeper ZT monitors all active processes

Many organizations from various fields of activity face an increasingly acute problem of encountering targeted attacks, which increasingly use a combination of common threats, zero-day vulnerabilities, unique schemes without the use of malware, bodiless methods, etc. Using solutions on the basis of preventive technologies, as well as systems aimed at detecting complex malicious activities only in network traffic, isn’t enough to protect an enterprise from complex targeted attacks.

You can view and interact with all endpoint processes in real-time. User and system processes are color-coded for easy responsiveness. If an untrusted process is detected, it can be stopped, frozen, or deleted. You can determine which file is its parent, go to the file that launched it, and perform additional actions with it through this process.

Panel photo
  • Contacts
    • +7 (800) 707-13-52
    • info@trustsoft.one
    • 350063, Russia, Krasnodar
      Kubanskaya naberezhnaya street, 37, office 24
  • Account
    • Sign in
    • Sign up
  • Partners
    • See all partners
Keeper ZT software is listed in the unified register of Russian computer programs (registry number #8950)

© 2021 Trustsoft. All rights reserved.

Copying information from the website trustsoft.one is allowed with the written permission of the website administration