Frequently Asked Question

How scalable is Plurilock?

As SaaS products, both Plurilock ADAPT and Plurilock DEFEND scale seamlessly to meet customer needs.

The on-site resource requirements for Plurilock are trivial in modern systems and unaffected by the number of users or workstations to be protected. The majority of Plurilock analysis is done by behavioral-biometric and machine learning engines that live in the Plurilock cloud, which leverages top-tier cloud providers and easily scales to meet any deployment size.

On-premises deployments of Plurilock DEFEND are also available for government, military, and asset-accounting deployments. For on-premesis deployments, contact Plurilock for advice on the infrastructure necessary to support a given deployment and user or system count.

2FA/MFA Rapid Reference

Authentication at a glance

Download the 2FA/MFA Rapid Reference now:

  • 2FA and MFA basics and common solutions
  • The benefits and drawbacks of each
  • Glossary of authentication terms

 

2FA/MFA Rapid Reference

  • 2FA and MFA basics and common solutions
  • The benefits and drawbacks of each
  • Glossary of authentication terms
Save PDF  

MORE DOWNLOADABLE REFERENCES

PDF

2020 Authentication Guide

Summary of authentication recommendations from major standards bodies, plus Plurilock’s own recommendations.
PDF

White Paper: Advanced Authentication

The state of authentication today—and why you need Plurilock products.
PDF

Understanding MFA vs. Privacy

Is multi-factor authentication always good for privacy? See why it isn't, and which strategies make the grade.
PDF

Behavioral Biometrics Guide

The definitive guide to behavioral biometrics, a core Plurilock technology.