Built to Close the Gap Between Access Intent and Access Reality
Keystrike was founded by researchers and security engineers who identified a persistent blind spot in enterprise security: the space between who is granted access and what that access is actually used for. We built the governance layer the security stack was missing.
Keystrike is a continuous remote access governance platform. We govern what happens after login.
Continuous Remote Access Governance
When a user authenticates and gains access, most security stacks have done their job. IAM and PAM granted access. SIEM and XDR will log events — after the fact. But the live session itself — what commands run, what systems are reached, what an authenticated user actually does — remains ungoverned.
Keystrike closes that gap. Our platform operates inside active remote sessions, delivering live visibility (SEE), deterministic enforcement (CONTROL), and cryptographically attested, audit-ready evidence (PROVE).
Keystrike does not replace IAM, PAM, or SIEM. It completes them.
The Problem We Set Out to Solve
The Keystrike founding team came from research and enterprise security backgrounds. The pattern we kept seeing was the same: organizations with strong identity stacks, mature PAM deployments, and comprehensive SIEM coverage — still unable to answer the question: What actually happened inside that session?
Authentication tells you who was granted access. It tells you nothing about what they did with it. That gap — between access intent and access reality — is where the most significant risks in modern enterprise security live. Authenticated attackers operate here. Ransomware is deployed through legitimate credentials here. Third-party contractors exceed their authorized scope here.
We built Keystrike to govern it.
How We Work
The principles that guide everything we build and every decision we make
We strive for excellence
High performance, shared accountability, ambitious goals. We win together or not at all.
The customer is our cornerstone
We empower customers by simplifying and securing their operations. Security should not require trade-offs with usability.
We are innovative
Built on academic roots, we challenge conventions and foster research inside and outside our organization.
We act with empathy and integrity
Transparent, honest, accountable. We say what we mean and take responsibility for our actions.
We are playful and balanced
Endlessly curious tinkerers who embrace challenges with enthusiasm, and know that sustainable performance requires balance.
Deployed in environments that matter
Critical infrastructure, financial services, healthcare, and government — sectors where remote access governance is not optional.
The Team Behind Keystrike
Research-led. Operationally proven. Built for enterprise security.
Valdimar Oskarsson
Co-founder, CEO
Valdimar identified the Governance Gap through years of enterprise security work — the persistent blind spot between authentication and what happens inside the session. He co-founded Keystrike to build the governance layer the security stack was missing.
Ymir Vigfusson, PhD
Co-founder, CTO
Ymir leads the technical architecture of Keystrike's continuous remote access governance platform. His academic research background in distributed systems and security directly informs Keystrike's approach to deterministic enforcement and cryptographic attestation inside live sessions.
Steindor Gudmundsson
Co-founder, CPO
Steindor shapes how Keystrike delivers session governance to enterprise security teams — ensuring that deterministic enforcement and audit-ready evidence are accessible without operational friction.
Arni S. Petursson
Co-founder, COO
Arni leads Keystrike's global operations, scaling the delivery of continuous remote access governance to enterprise customers across critical infrastructure, financial services, and government sectors.
Helena Hallgrimsson
VP Marketing
Helena leads Keystrike's marketing, building category awareness around continuous remote access governance and helping security leaders understand the Governance Gap and how Keystrike closes it.
Johanna Vigdis Gudmundsdottir
VP Business Development
Johanna leads strategic partnerships and enterprise market development, expanding Keystrike's reach across critical infrastructure, financial services, and government sectors globally.
What Security Leaders Say
What security leaders say about governing remote access with Keystrike
“When I learned about Keystrike, I loved the simplicity. Keystrike ensures that only our own employees are accessing our servers, not adversaries who have hacked our employees. But Keystrike also doesn't bother or distract our employees at all, which is a great win-win: stronger security without added inconvenience.”
“In about 20 minutes, I had Keystrike up and running. The deployment is simple, well thought out, with clear documentation. Now Keystrike helps us establish that commands are genuine and trustworthy by detecting lurking attackers and blocking when they inject themselves into active sessions. With the combination of powerful technology and ease of deployment, I highly recommend testing Keystrike.”
See Why Security Leaders Trust Keystrike to Govern What Happens After Login
Keystrike closes the governance gap between access intent and access reality. If you're assessing what governs your authenticated remote sessions — and what evidence you can produce when an auditor asks — the right first step is a direct conversation.