Atlas Systems Named a Representative Vendor in 2025 Gartner® Market Guide for TPRM Technology Solutions → Read More
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Glossary › Keylogger
What is Keylogger?
Keyloggers capture user input such as passwords, messages, and confidential information. They may be installed through malware or physical access. In TPRM, keylogger infections at vendors represent severe compromise because they expose privileged access and sensitive customer data.
FAQs
Are keyloggers always malware?
Often yes, but hardware keyloggers exist too.
How are keyloggers detected?
EDR, behavioral analytics, and anti-malware tools.
Why are they dangerous for vendors?
They expose credentials and sensitive data.
Responsible-AI TPRM Guide
Discover how risk teams apply AI responsibly to reduce third-party blind spots and stay audit-ready across global regulations.
Easier third-party onboarding. Seamless compliance. Complete risk control.