Atlas Systems Named a Representative Vendor in 2025 Gartner® Market Guide for TPRM Technology Solutions → Read More

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Keylogger

Last updated: Nov 26, 2025

Glossary › Keylogger

What is Keylogger?

Keyloggers capture user input such as passwords, messages, and confidential information. They may be installed through malware or physical access. In TPRM, keylogger infections at vendors represent severe compromise because they expose privileged access and sensitive customer data.

FAQs

Are keyloggers always malware?

Often yes, but hardware keyloggers exist too.

How are keyloggers detected?

EDR, behavioral analytics, and anti-malware tools.

Why are they dangerous for vendors?

They expose credentials and sensitive data.

robot-human

Responsible-AI TPRM Guide

Discover how risk teams apply AI responsibly to reduce third-party blind spots and stay audit-ready across global regulations.

Easier third-party onboarding. Seamless compliance. Complete risk control.