Interface Security - KeyGhost - The ultimate hardware keystroke recording tool
THAWTE AUTHENTIC SITE Secured by SSL
Ordering
Customer Support Products Company Info Links Helpdesk  
We welcome
VISA
MasterCard American Express

Home
Home
New products
Products
Reviews
Reviews
Demonstration
Demonstration
Testimonials
Testimonials
Photos
Photos
Specifications
Specifications
Frequently Asked Questions
FAQ
Press releases
Press releases
Download
Download
Legal Disclaimer
Legal Disclaimer
Affiliates
Affiliates
Distributors
Distributors

 

GeekVortex Review
3rd December 2000
computer fraud investigations
'It has a very easy installation, a very easy operation, and is extremely innovative as an idea. To sum the KeyGhost in one sentence, "A Masterpiece of Engineering". Nothing more nothing less.' - DataOrb
> Read the independent review

 

 

How the KeyGhost is used

ORDER NOW!

KeyGhost used as security tool. Computer users who want to monitor activity on their own PC will find the KeyGhost most helpful. For example, top executives who hold confidential files on their office PC, can use the KeyGhost to detect unauthorised entry, tampering, or use of their PC. Parents: Monitor your children's computer activity, use of the internet, email and chatrooms, as the KeyGhost captures every key your child types.

KeyGhost used as an investigation tool. Currently, security professionals in private and government organisations are one of the most common groups using the KeyGhost. For example, investigators can use it as a monitoring device to establish an audit trail on a suspect's computer; auditors, receivers and liquidators can use it to create an unalterable log of all electronic communication on their client's computers.

KeyGhost used as a back up tool. The KeyGhost provides peace of mind. The KeyGhost reduces the level of stress caused by the loss of work due to system lockups or electricity failure. Systems developers, who have used a KeyGhost during our market testing, claim that it reduced their stress level by 100%. Professional writers who need protection from unexpected systems failure can use KeyGhost. Retrieval of data is very easy and does not need extensive computer knowledge.

Article

Over $120 billion was lost in the USA due to employee fraud last year. And this figure is growing.

KeyGhost used as a deterrent. If employees are aware that a KeyGhost has been installed, or that their keyboard is a 'KeyGhost Security Keyboard', it is very likely that unauthorised uses of the computer will be reduced. The employees will know that the likelihood of being caught increases with the installation of such a device. The KeyGhost makes it easy to monitor the use of internet and email.

Online Tutorial *new*
We designed the KeyGhost with maximum ease of use in mind. It can be installed in seconds, begins recording automatically, and recorded keystrokes can be retrieved in ANY text editor and on ANY PC computer at a later date. Find out how easy it is to access the recorded keystrokes on any PC using our 'keystroke ghosting' technology. click here >>

How does the KeyGhost™ work? > click here to find out <

Legal: Tips for creating a keystroke monitoring notification banner. > click here <

ORDER A KEYLOGGER NOW!

What are the advantages of using a KeyGhost over software keyloggers?
> go read more <

 

 

 

We respect your privacy and security. If you have any questions or comments about this site? Contact the Webmaster. Tel: +64 3 379-3883. Fax: +64 3 379-3885. Email: HelpDesk@keyghost.com. Postal Address: KeyGhost Ltd, P.O.Box 3279, Christchurch 8001, New Zealand. Physical Address: 109 Montreal Street, Christchurch, New Zealand.

© Copyright 2000 KeyGhost Ltd. All rights Reserved.