Built to Close the Gap Between Access Intent and Access Reality

Keystrike was founded by researchers and security engineers who identified a persistent blind spot in enterprise security: the space between who is granted access and what that access is actually used for. We built the governance layer the security stack was missing.

Keystrike is a continuous remote access governance platform. We govern what happens after login.

Continuous Remote Access Governance

When a user authenticates and gains access, most security stacks have done their job. IAM and PAM granted access. SIEM and XDR will log events — after the fact. But the live session itself — what commands run, what systems are reached, what an authenticated user actually does — remains ungoverned.

Keystrike closes that gap. Our platform operates inside active remote sessions, delivering live visibility (SEE), deterministic enforcement (CONTROL), and cryptographically attested, audit-ready evidence (PROVE).

Keystrike does not replace IAM, PAM, or SIEM. It completes them.

The Problem We Set Out to Solve

The Keystrike founding team came from research and enterprise security backgrounds. The pattern we kept seeing was the same: organizations with strong identity stacks, mature PAM deployments, and comprehensive SIEM coverage — still unable to answer the question: What actually happened inside that session?

Authentication tells you who was granted access. It tells you nothing about what they did with it. That gap — between access intent and access reality — is where the most significant risks in modern enterprise security live. Authenticated attackers operate here. Ransomware is deployed through legitimate credentials here. Third-party contractors exceed their authorized scope here.

We built Keystrike to govern it.

How We Work

The principles that guide everything we build and every decision we make

We strive for excellence

High performance, shared accountability, ambitious goals. We win together or not at all.

The customer is our cornerstone

We empower customers by simplifying and securing their operations. Security should not require trade-offs with usability.

We are innovative

Built on academic roots, we challenge conventions and foster research inside and outside our organization.

We act with empathy and integrity

Transparent, honest, accountable. We say what we mean and take responsibility for our actions.

We are playful and balanced

Endlessly curious tinkerers who embrace challenges with enthusiasm, and know that sustainable performance requires balance.

Deployed in environments that matter

Critical infrastructure, financial services, healthcare, and government — sectors where remote access governance is not optional.

The Team Behind Keystrike

Research-led. Operationally proven. Built for enterprise security.

Valdimar Oskarsson

Co-founder, CEO

Valdimar identified the Governance Gap through years of enterprise security work — the persistent blind spot between authentication and what happens inside the session. He co-founded Keystrike to build the governance layer the security stack was missing.

Ymir Vigfusson, PhD

Co-founder, CTO

Ymir leads the technical architecture of Keystrike's continuous remote access governance platform. His academic research background in distributed systems and security directly informs Keystrike's approach to deterministic enforcement and cryptographic attestation inside live sessions.

Steindor Gudmundsson

Co-founder, CPO

Steindor shapes how Keystrike delivers session governance to enterprise security teams — ensuring that deterministic enforcement and audit-ready evidence are accessible without operational friction.

Arni S. Petursson

Co-founder, COO

Arni leads Keystrike's global operations, scaling the delivery of continuous remote access governance to enterprise customers across critical infrastructure, financial services, and government sectors.

Helena Hallgrimsson

VP Marketing

Helena leads Keystrike's marketing, building category awareness around continuous remote access governance and helping security leaders understand the Governance Gap and how Keystrike closes it.

Johanna Vigdis Gudmundsdottir

VP Business Development

Johanna leads strategic partnerships and enterprise market development, expanding Keystrike's reach across critical infrastructure, financial services, and government sectors globally.

What Security Leaders Say

What security leaders say about governing remote access with Keystrike

“When I learned about Keystrike, I loved the simplicity. Keystrike ensures that only our own employees are accessing our servers, not adversaries who have hacked our employees. But Keystrike also doesn't bother or distract our employees at all, which is a great win-win: stronger security without added inconvenience.”

Heimir Kristjánsson
Cyber Security Operations Manager
Amer Sports

“In about 20 minutes, I had Keystrike up and running. The deployment is simple, well thought out, with clear documentation. Now Keystrike helps us establish that commands are genuine and trustworthy by detecting lurking attackers and blocking when they inject themselves into active sessions. With the combination of powerful technology and ease of deployment, I highly recommend testing Keystrike.”

Steven Brill
VP of IT Operations and Security
Global Water Resources
Global Water Resources operates critical water infrastructure across the American Southwest.
20min
Deploys in 20 minutes
Try Keystrike free for 30 days

See Why Security Leaders Trust Keystrike to Govern What Happens After Login

Keystrike closes the governance gap between access intent and access reality. If you're assessing what governs your authenticated remote sessions — and what evidence you can produce when an auditor asks — the right first step is a direct conversation.