Secure your small business:
Apps → Data →

Do Plurilock™ products still work if users rely on password managers to enter their credentials?

Yes and no. Some Plurilock products work with password managers, while all Plurilock products make password managers far less necessary.

Because Plurilock's continuous authentication products analyze patterns in behavior throughout the course of the workday, they are unaffected by the use of password managers. Plurilock's login authentication products, on the other hand, are affected by the use of password managers—since they rely for identification on the way in which users enter their credentials, this identification does fails when users enter their credentials using automation tools.

On the other hand, the addition of Plurilock as a strong MFA identity factor means that the arcane password “rules” that make password both difficult to remember and difficult to type can be relaxed, making password managers less necessary. In general, users prefer to type simpler, human-readable, more stable passwords themselves rather than being forced to use clumsy applications to remember complex, non-human-readable passwords that change frequently.

Plurilock can thus be seen as a way to relieve users of the need to rely on password managers for a particular login prompt or service.

2FA/MFA Rapid Reference

Authentication at a glance

Download the 2FA/MFA Rapid Reference now:

  • 2FA and MFA basics and common solutions
  • The benefits and drawbacks of each
  • Glossary of authentication terms

 

2FA/MFA Rapid Reference

  • 2FA and MFA basics and common solutions
  • The benefits and drawbacks of each
  • Glossary of authentication terms
Save PDF  

Downloadable References

PDF
Sample, shareable addition for employee handbook or company policy library to provide governance for employee AI use.
PDF
Generative AI is exploding, but workplace governance is lagging. Use this whitepaper to help implement guardrails.
PDF
Cheat sheet for basics to stay secure, their ideal deployment order, and steps to take in case of a breach.
PDF
Real-time, continuous authentication using behavioral biometrics and machine learning.
 
 
 
 
 

Subscribe to the newsletter for Plurilock and cybersecurity news, articles, and updates.

You're on the list! Keep an eye out for news from Plurilock.