About KEY-SHIELD

KEY-SHIELD is a product trademark belonging to JUNKAI-TECH, a technology enterprise dedicated to technology research and innovation development, specializing in security information technology research, providing security products and security information technology application solution services.

KEY-SHIELD is a series of professional security tool products designed and developed by a team of professional engineers engaged in information security and chip security applications.

KEY-SHIELD security tool products, the main feature is to integrate industrial-grade chip hard encryption technology into software products, empowering the information security needs of various industries.

KEY-SHIELD Security Product Overview

Based on the integration of financial security level encryption chip and PKI technology, it provides the security protection function of hard encryption.

2FA/MFA Multi-Factor Authentication Logon

Provide two-factor or multi-factor authentication logon security tools based on PKI technology for terminal devices and server hosts to meet the authentication access control and strong authentication security needs of Windows devices, Windows servers and Linux terminals and servers, industrial computers, etc., and to realize the security reinforcement and security control of various terminal devices and servers.

KEY-SHIELD Data Leakage Prevention DLP Products

KEY-SHIELD DLP is specialized in computer file security protection and anti-leakage tool products, using advanced transparent drive encryption engine and financial security level chip key management technology, from the source of the data on the document strong encryption processing, for the user is completely transparent, non-perceptive.

KEY-SHIELD Distinctive Tools Products

We also offer a range of enterprise-level encryption products specifically designed for businesses and individuals who need to secure their data assets.

Cloud Data Encryption Client

Secure KEY-based data encryption tool, easy to use, easy to implement PKI technology and DLP encryption based on cloud object storage data encryption and protection functions, effectively preventing the organization or individual public cloud storage data application scenarios under the risk of data leakage, for enterprises and individuals to safely use a variety of cloud storage services to provide security. Compatible and supportive of mainstream S3 protocol cloud object storage, including Wasabi, US3, AWS, and Aliyun

PC Device Port Protector Lock

Provides port management and control functions for all kinds of office computers and notebook devices, which can disable/enable USB ports, Ethernet ports, wireless WiFi, Bluetooth and other I/O ports of computers, and provides a black and white list control mechanism for removable storage media, which realizes effective supervision and management of USB flash disks, CD-ROMs, CD-ROMs, MMC cards, SD cards and other removable storage media, and prevents security risks caused by misuse of unidentified removable storage media effectively. It can effectively prevent the security risks caused by the misuse of unknown removable storage media and provide a set of economical and practical port protection tools for IT administrators and security personnel.

We use professional technology to build simple products and tools, with a sincere attitude to provide product value and service, welcome to evaluate the trial and consulting.

KEY-SHIELD's range of security products and tools provide the following key functional values and application benefits

Each tool and product can be used independently or deployed in combination to prevent data leakage and unauthorized access at the source. Easy to flexible selection and configuration.

Preventing unauthorized access

Provide two-factor or multi-factor strong authentication for computer devices to prevent internal unauthorized employees or outsiders from logging in and using computers, and can register the login access to the device, reducing the risk of password vulnerability and change maintenance costs.

Preventing loss, theft and leakage

The combination of device lock and encryption engine effectively prevents data loss and leakage of physical hardware such as computers, hard disks, external storage devices, USB flash drives and other physical hardware caused by loss, theft or malicious seizure.

Prevent document data leakage

Regardless of the personal use environment or corporate office environment, to prevent various internal office documents and technical and commercial confidentiality of important information by internal personnel malicious copying, copying and theft and network transmission leakage, and even external illegal access and other means of leakage of all kinds of loss of digital assets caused by the risk of loss of protection of enterprises and organizations, core secrets and personal digital privacy.

Preventing Unwitting Leaks

Driver-level transparent and automatic encryption mechanism effectively prevents internal data leakage caused by internal staff's work errors or unconscious behavior; and also prevents the risk of intrusion and leakage caused by the unconscious activities of related business outreach partners/third-party personnel.

Preventing Internet leakage

Preventing and blocking all kinds of file and data transfer leakage paths through instant messaging software, WeChat, cloud applications, FTP, email and WEB and other Internet methods, supporting local data protection of employees' work computers when they go out on business trips or outsourcing activities.

Preventing Device Port Leakage

End-device ports implement a disable/enable control mechanism to effectively prevent the risk of intentional or unintentional leakage through the pathways of USB ports, Ethernet ports, wireless WiFi, Bluetooth ports, and I/O ports such as CD-ROM drives, MMC and SD card drives.

A safe and affordable umbrella for your privacy and digital assets.

From then on, there is no fear of wind or rain, and one can sleep well and travel far!

We in line with the “pragmatic, focused, innovative and professional” culture of engineers, financial chip security applications in the market for more than 10 years of cultivation and service, with enterprise-level product application experience precipitation and technology accumulation, to create cost-effective and functional value of security tools, we are committed to making the development of each tool software products are able to provide users with easy-to-use and functional security products and high-quality service value. We are committed to making every tool and software product we develop able to provide users with easy-to-use and practical security products and high-quality service value.

2 products

Microsoft Official Signed Product Certificates

11 chip applications

Certificate of Financial Security Level Chip Application Certification

300+

Domestic and overseas installers

10+

Domestic and foreign medium and large institutional users

KEY-SHIELD Main Products List

Provide extra-long free experience, evaluate before you buy, please contact customer service for related product trial and consultation!

SecVSC
Two-factor, multi-factor logon authentication
  • Supports PKI smart cards and USB-KEYs
  • Support for mobile credentials(MFA)
  • Stand-alone and Enterprise versions available
  • Fully compatible with existing PKI systems and CA platforms
View More
Disk Encryption
  • Support mechanical hard disk, SSD, USB flash drive and other devices
  • Windows Embedded Encryption Component
  • Supports 2FA and MFA certified switch locks
  • Fully compatible with existing PKI systems and CA platforms
View More
Data Leakage Prevention (DLP)
  • Supports transparent encryption of all types of files
  • Anti-copy, anti-duplication, anti-screenshot, anti-printing
  • Digital watermarking support
  • Support document outgoing control management
View More

SMART CARD
  • JAVA CARD
  • Support for financial and security PKI applications
  • Support for GlobalPlatform (GP)
  • Support PBOC3.0/PKI/EMV
View More
KEY-SHIELD SECURE USB DISK
  • Chip-level hard encryption
  • Anti-Replication, Anti-Copy, Anti-Virus
  • Hard and soft encryption
  • Supports Windows and Linux platforms
View More
Cloud Data Encryption Client
  • Hardware strong authentication and hard encryption
  • Supports mainstream cloud object storage
  • Securing Customer Data in the Cloud
  • Customers control their own keys, secure and controllable
View More

Copyright © 2024.JUNKAI-TECH All rights reserved.

Collect from KEY-SHIELD KEY-SHIELD