Trojan Horse

Trojan horse - cybersecurity.

What is a Trojan Horse?

A program that appears to be non-threatening, but in fact has underlying malicious intent. This type of program is named after the famous Trojan Horse used by the Greek army to deceptively defeat Troy in Virgil's Aeneid.

In the story, the Greeks build a large wooden horse and claim that it is an offering to the Gods in return for s safe sea journey home. The Trojans brought the horse into the city without - not realizing that inside the wooden horse were hidden Greek soldiers. At night, the Greek soldiers emerged from hiding and opened the gates of Troy to the greater Greek army laying in wait - leading to the destruction of the city.

Malicious software disguises itself as a program that either naturally belongs or seems harmless. Many trojan horse programs open backdoors that cyber criminals can use to gain wider access to the target system - just like in the story.

Touchless, contactless, passwordless 2FA with continuous authentication. One key for all your passwords. Experience fully automated login and security. Instant 2FA, auto-OTP, password manager and worry-free workflow with proximity-based privileged access management for Windows 10, 8, 7, macOS, desktop applications, and websites.

Download the free Android app.

Proximity-based passwordless 2FA

Active Directory integration with admin console

Automatic lock for all workstations

Continuous authentication password manager

Automatic OTP on websites for 2FA

Wireless login for PC, Mac, web, and software

or call 240-547-5446