Keeper ZT Keeper ZT
Products
logo product

Keeper ZT

  • Capabilities
    • Capabilities
      • History of processes
      • Application control
      • File system management
      • Process management
      • CMD and PowerShell Control
      • User Policy Management
      • Windows Logs and Keeper ZT
      • Windows OS protection
      • Corporate antivirus
      • Inventory
      • Events
      • Rule builder
      • Presets
  • Advantages
    • Advantages
      • Modular expansion
      • High level of compatibility
      • Expertise
      • Single console
      • Integration with Active Directory
      • Control of all levels
      • Easy integration
      • Isolated work
      • Legacy PC and OS support
      • Protection against deleting and stopping KZT
      • Minimum resource consumption
      • APM optimization
      • Protection against deleting and stopping Keeper ZT
  • Fields
    • Fields
      • Finance
      • Education
      • State institutions
      • IT and telecommunications
      • Military-industrial complex
      • Retail
      • Data processing center
      • Pharma retail
      • Industry
      • Real estate
      • Medicine
      • Logistics
  • What does it protect?
    • Keeper ZT protects and controls:
      • Workstations
      • Servers
      • ATMs
  • What threats does it protect against?
    • Keeper ZT protects and controls:
      • Virus
      • Worm
      • Botnet
      • Spyware
      • Bankbot
      • Rootkit
      • Exploit
      • Trojan
      • Lotl
      • Ransomware
      • Backdoor
      • Adware
Partners
Account
|
  • Keeper ZT
  • Partners
  • Account
|

Threats

Worm
  • Virus
  • Botnet
  • Spyware
  • Bankbot
  • Rootkit
  • Exploit
  • Trojan
  • Lotl
  • Ransomware
  • Backdoor
  • Adware
Keeper ZT

Worm

Worm

Network worm

Malicious software aimed at high propagation speed across the network mapping through multi-vector propagation.

Unlike other types of malicious software, Worm-attacks do not aim to secretly penetrate protected objects; their task is to spread to as many APMs as possible and linger on those that don’t take any actions to remove them.

To infect as fast as possible, network worms use:

  • Social Engineering Techniques (Email Clients)
  • Operating system exploits
  • Vulnerabilities in data transfer protocols
  • 0-day software vulnerabilities

Worm attacks are used for:

  • Hidden cryptocurrency mining
  • developing network Botnet
  • Steal bank card data
  • Hiding the true targets of the attack
Photo threat

SQL Slammer worm propagation speed:

7,500

servers per minute

The effectiveness of the Keeper ZT software against this type of attack has been proven in practice.

Using our software tool, you can solve the following tasks:

  • Control of the integrity of files on the protected point
  • Total control over the launch of all applications, services, scripts in the operating system
  • Impossibility of executing self-written code without the system administrator’s sanctions
  • Continuous control of the integrity of all software on the end host
  • Ability to block and control network services in order to prevent them from being seized by intruders
  • Block applications and services at workplaces of officials, the operation of which is beyond their type of activity in the workplace
Virus Botnet

Ready to discuss your project?

TRY Keeper ZT FOR FREE
Photo panel
  • Contacts
    • +7 (800) 707-13-52
    • info@trustsoft.one
    • 350063, Russia, Krasnodar
      Kubanskaya naberezhnaya street, 37, office 24
  • Account
    • Sign in
    • Sign up
  • Partners
    • See all partners
Keeper ZT software is listed in the unified register of Russian computer programs (registry number #8950)

© 2021 Trustsoft. All rights reserved.

Copying information from the website trustsoft.one is allowed with the written permission of the website administration