KeyTurion a program that monitors user’s activities on a computer with Windows operating system in a both discrete and explicit manner.
KeyTurion PRO is a KeyTurion software incorporating a dedicated cloud data storage service.
It supports all functions of the KeyTurion program and additionally provides a possibility of sending data to the server. Furthermore, it allows access to the administrative console (a separate data management application).
After purchasing a license for using KeyTurion PRO, you will be provided with your own account and space located on a remote server to which your data will be sent. It means that you will be able to use them wherever you are and without the need to have physical access to the monitored device.
This solution is highly recommended to customers who want to monitor more than 1 computer, especially within various organizations and companies.
It should also be pointed out that KeyTurion PRO allows remote configuration.
No, we do not recommend using the application for purposes prohibited by the provisions of law.
The application is to be used solely on user’s own computer or computers.
Pursuant to the provisions of law, in some countries a person that is being monitored, for example – an employee of your company, has to be informed about this fact and typically ought to provide consent in this regard. If you are not sure whether you can perform such monitoring activities, you should seek legal advice. The application allows for deactivating the keylogger module.
A single license allows to monitor one computer only.
There is the possibility of transferring a given license and using a different one. To do so, please contact us.
If you want to use the application on many computers at once, please purchase an appropriate number of licenses.
While purchasing more of them, you may be offered a lucrative rebate.
Absolutely not. We treat our products in a professional manner and we want our users to know that the application does not send any data to us. Furthermore, KeyTurion is void of any hidden functions. You will be able to personally define an e-mail address which will be used to send and receive logs (standard version of the application). As for the PRO version, a comprehensive end-to-end encryption ensures that your data are completely safe.
We approach the discussed issue with extreme care and meticulousness:
Your data are never sent to a server in a decrypted form and are always encrypted by using a very efficient algorithm using E2EE (end-to-end encryption)
Furthermore – you are the owner of the encryption key.
After logging to your account by means of the Administrator application, your data are locally encrypted in the memory of your computer only after entering your key/password.
Unfortunately, in such case you will be unable to encrypt data downloaded from the server. We are unable to access your logs, neither is the administrator of the server.
You are the only person who knows the key. You can define it by yourself and set it in the monitoring application, as well as provide it before accessing data by using the Administrator application.