Keeper ZT Keeper ZT
Products
logo product

Keeper ZT

  • Capabilities
    • Capabilities
      • History of processes
      • Application control
      • File system management
      • Process management
      • CMD and PowerShell Control
      • User Policy Management
      • Windows Logs and Keeper ZT
      • Windows OS protection
      • Corporate antivirus
      • Inventory
      • Events
      • Rule builder
      • Presets
  • Advantages
    • Advantages
      • Modular expansion
      • High level of compatibility
      • Expertise
      • Single console
      • Integration with Active Directory
      • Control of all levels
      • Easy integration
      • Isolated work
      • Legacy PC and OS support
      • Protection against deleting and stopping KZT
      • Minimum resource consumption
      • APM optimization
      • Protection against deleting and stopping Keeper ZT
  • Fields
    • Fields
      • Finance
      • Education
      • State institutions
      • IT and telecommunications
      • Military-industrial complex
      • Retail
      • Data processing center
      • Pharma retail
      • Industry
      • Real estate
      • Medicine
      • Logistics
  • What does it protect?
    • Keeper ZT protects and controls:
      • Workstations
      • Servers
      • ATMs
  • What threats does it protect against?
    • Keeper ZT protects and controls:
      • Virus
      • Worm
      • Botnet
      • Spyware
      • Bankbot
      • Rootkit
      • Exploit
      • Trojan
      • Lotl
      • Ransomware
      • Backdoor
      • Adware
Partners
Account
|
  • Keeper ZT
  • Partners
  • Account
|

Threats

Ransomware
  • Virus
  • Worm
  • Botnet
  • Spyware
  • Bankbot
  • Rootkit
  • Exploit
  • Trojan
  • Lotl
  • Backdoor
  • Adware
Keeper ZT

Ransomware

Ransomware

Encrypter

Malicious software that encrypts (locks) files on a workstation, requiring a financial transaction for decryption. Ransomware is independently distributed on the Internet and local networks through software vulnerabilities, especially in Microsoft Windows.

One of the most popular ransomware is WannaCry, which peaked in 2017. Infection occurred through a «hole» in the SMB Windows network protocol. WannaCry scanned the computers of Internet users for this vulnerability. No user action was required to get infected. WannaCry encrypted all files on the hard drive except those needed for its operation. Then a window appeared on the user's screen with a request to transfer bitcoins to the specified account, otherwise, the encrypted files would be destroyed after a week.

$1,000,000,000

confirmed worldwide damage from WannaCry ransomware

The effectiveness of the Keeper ZT software against this type of attack has been proven in practice.

Using our software tool, you can solve the following tasks:

  • Total control over the launch of all applications, services, scripts in the operating system
  • Impossibility of executing self-written code without the system administrator’s sanctions
  • Block applications and services at workplaces of officials, the operation of which is beyond their type of activity in the workplace
  • Continuous control of the integrity of all software on the end host
  • Ability to block and control network services in order to prevent them from being seized by intruders
  • Control of the integrity of files on the protected point
  • Inability to launch applications and services without the system administrator or information security officer awareness
LotL Backdoor

Ready to discuss your project?

TRY Keeper ZT FOR FREE
Photo panel
  • Contacts
    • +7 (800) 707-13-52
    • info@trustsoft.one
    • 350063, Russia, Krasnodar
      Kubanskaya naberezhnaya street, 37, office 24
  • Account
    • Sign in
    • Sign up
  • Partners
    • See all partners
Keeper ZT software is listed in the unified register of Russian computer programs (registry number #8950)

© 2021 Trustsoft. All rights reserved.

Copying information from the website trustsoft.one is allowed with the written permission of the website administration