The software provides web-based browser protection against:
Phishing Websites
Keystroke Loggers
Unauthorised screen captures
Ransomware encrypting your data
The software focuses on protecting the personal data of internet users. It does this by neutralising three of the greatest threats towards a user's data - Ransomware, keystroke loggers and Phishing attacks. Combined, these three attack vectors are the cause of over 95% of all personal data stolen from PC users. By protecting against keystroke loggers and unauthorised screen captures every time you enter data online into your web browser, and by preventing phishing sites from loading in your browser, the software provides peace of mind whenever you need to browse the web or shop online.
Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files until a ransom is paid. Criminals have successfully made fortunes from Ransomware and due to its ease of implementation and speed of converting infiltration into cash, it remains the leading tactic of choice for many criminal enterprises. Ransomware is not going away any time soon, but you can have peace of mind knowing that the software is on duty constantly watching in the background for malicious ransomware activity.
The software is not designed to replace anti-virus, anti-spyware, or other desktop internet security suites, but rather to supplement them by providing focused protection for all data entered into websites. Independent tests have verified that the unique and proactive nature of the solution means that it protects against brand new (zero-day) threats better than any other solution - counteracting the weak points of conventional desktop anti-virus security software.
By installing the software, you can have peace of mind knowing that your personal data is constantly protected while surfing or shopping over the web.
Phishing is a malicious practice that uses websites or emails with deceptively similar appearances to trusted sources to collect sensitive personal information such as login data, passwords, credit card numbers or account numbers. Most commonly, banks and financial institutions' websites are often fraudulently spoofed and then used to target unsuspected users into entering their personal information which is then stolen for illegal purposes.
The software protects against identity and data theft by identifying whenever you navigate to a phishing site. If a fraudulent website is suspected, the software prevents the site from loading, thus safeguarding you from entering confidential data into these web pages and the following warning message will appear in the browser:

Keystroke loggers are forms of Spyware or Trojans that monitor your computer activities and covertly record the keystrokes entered by a user. Criminals use keystroke loggers to steal a person’s identity, usernames, passwords, credit card numbers, banking details, SSN and more. The software protects the data that you enter online from being harvested by key loggers by cleverly scrambling every keystroke as you type. This means that the criminal will never successfully see your actual keystrokes. The anti-key logging features of this software work on multiple levels of your operating system and are far more powerful in terms of protecting data than those measures employed by conventional anti-virus solutions.
Many key logging Trojans also have a screen capture facility which allows personal data to be stolen from online keypads, drop down menus etc. The software prevents these Trojans from stealing sensitive information by preventing them from taking screen captures of your screen. Once again, this feature ensures that users are far safer browsing the net than if they merely have conventional anti-virus software alone installed.
Ransomware is one of the most crippling cyber threats today. Once Ransomware has infiltrated a computer, it can encrypt all the user's valuable data files – such as photographs, documents, emails, spreadsheets, etc. This can be extremely disruptive and damaging – imagine having all your files encrypted and being unable to access them! After encrypting the files, the ransomware then presents the ransom demand message – the user is asked to pay money in return for the decryption key. As you would be dealing with criminals, paying the ransom demand does not guarantee that the files will be decrypted, or that you would be safe from further encryption and payment demands in the future.
The software protects against this scenario. Once installed, it works silently in the background, monitoring all attempts at encryption activity. Any malicious encryption activity on the computer is stopped before it can cause any damage.
When an encryption process is detected, the software will intelligently and automatically determine the risk based on several variables, and determine if the process should be blocked or allowed. In addition, the user is notified via a sliding notification:

The user will be notified also if an encryption process is detected but not deemed suspicious enough to block:

Visual aspects of the software
The first thing you will notice after the software has been installed and the PC has been restarted, is a fake character display in the web-browser window title bar. This display only appears when you are working in your browser:

One of the main anti-key logging measures of the software is that anything you type into the web fields in the browser is automatically scrambled - it is replaced with fake random characters. The green display shows these scrambled characters as you enter data. This is what any key logger in your computer would pick up - not your real key entries. When you see the scrambler working, you know your key entries are being protected.

The About tab contains the 'About page' which displays information relating to your product or this page. Here you will find information relating to how the software works and how to obtain support should you need to. You can access the About page by right-clicking the shield icon in the system tray in the bottom right of your screen.

The Options tab provides you with details regarding the settings of the software such as whether the Screen Capture protection is enabled or not and if the scrambler display should be hidden. You can also find version numbers relating to your product. Should you need to open a support ticket or contact SentryBay for any reason you are likely to be asked for this information

The Protect tab displays a log of all the encryption processes that have been blocked or allowed, with the added flexibility of reversing the verdict in the event that the user wants to reverse the decision.

The Report tab provides an analysis on the software's activity on your computer, including processes analysed by Ransomware protection and webpages analysed by Anti-phishing protection.

The Shield menu is located on your Windows system tray at the bottom right of your screen.
Double clicking the shield will open the user interface.
The Help link is located on the options window. It navigates you to the SentryBay website.
The software is supported on the Windows 10 and 11 operating systems and operates with all major browsers including Chrome, Firefox and Edge.
Towards the end of your subscription period your will receive reminder notices from the software that your subscription will be ending soon. The messages displayed will provide you with all the information you need to renew the software and ensure you maintain the high level of online protection SentryBay provides you.