Intelligently Simple Security
For today’s advanced crimeware challenges
AGILE, SOPHISTICATED SOLUTIONS
Combat the ever-changing techniques of today’s cyber criminals without halting business productivity.
Nimble data security
Trusted Knight defeats crimeware and all zero-day malware variants for enterprise ecoystem protection.
rapid deployment & minimal maintenance
Trusted Knight products are easy-to-deploy and require nominal support to keep protection up-to-date.
Cloud Delivered Products
Delivered as an executable or Amazon Web Services
Proven Track Record of Eliminating Cyber Theft
Proven to reduce online banking fraud losses due to stealth malware and website attacks that cause interruption to users to zero.
Designed to Secure
News & Events
The Association of Banks in Israel Wards Off Web Vulnerabilities
WordPress Security Shouldn’t be a Full-Time Job
Zeus-Derived POS Malware is Still Effective
Together, we learn from the past and then we adapt
Attacks against retailer
point-of-sale (pos) systems
In recent years, a number of large retailers have suered the compromise of customers credit card data from point-of-sale (PoS) systems. In 2013 and 2014, Target and Home Depot became two of the more high-profile victims of this type of breach. It is likely that both intrusions were the work of the same criminal group…
Internal Data Theft
at JP Morgan Chase
In July of 2014, J.P. Morgan Chase discovered a month-long breach of their corporate network that exposed personal information of about 76 million households and more than 7 million small businesses. Attackers leveraged their initial entry to eventually gain access to over 90 servers across the enterprise….
Keylogger Theft of Consumer
On December 26, 2014, a group of criminals claiming aliation with Anonymous released a file of more than 13,000 credentials for sites including Walmart, Amazon, Playstation Live, and Hulu Plus. These were clearly obtained from keylogging botnets and almost certainly represent only a portion of the credentials captured from the compromised computers as the attackers likely kept the higher-value data for themselves…