Glossary Term

Invisible Authentication

Invisible Authentication is a method of authenticating users that requires no specific activity for the purpose of establishing identity.

Invisible multi-factor authentication (MFA) is a form of muli-factor authentication that silently gathers the data needed for multi-factor identity verification while users are entering their username and password, eliminating the need for time-consuming MFA steps such as code entry or fingerprint scans.

Plurilock observes a combination of behavioral-biometric, environmental, and contextual identity signals to deliver strong yet invisible multi-factor authentication in its Plurilock ADAPT product.

More About Plurilock

PDF

2020 Authentication Guide

Summary of authentication recommendations from major standards bodies, plus Plurilock’s own recommendations.
PDF

White Paper: Advanced Authentication

The state of authentication today—and why you need Plurilock products.
PDF

Plurilock Quad Chart

Quick, visual summaries of Plurilock value, use cases, architecture, and typical clients.
PDF

Behavioral Biometrics Guide

The definitive guide to behavioral biometrics, a core Plurilock technology.

Stay informed. Join our low-volume mailing list for Plurilock and cybersecurity news and updates.

PLURILOCK IS THE LEADER IN ADVANCED AUTHENTICATION

Plurilock is the leader in advanced, risk-based authentication. We provide invisible, device-free MFA for corporate endpoints, Citrix sessions, cloud applications, and their users in finance, healthcare, education, and SaaS.

Follow

        

Contact Plurilock

Have a question or comment? 

Plurilock Lead Capture Block

Welcome to Plurilock!

We’d love to hear about your interest in our products.

Great!

Okay, cool.

We'd like to provide you with more info. How can we reach you?

By submitting this form, you agree to receive periodic news, updates, and offers from Plurilock.

Thanks!

Someone from Plurilock will get in touch with you soon.
 
In the meantime, learn more about our ADAPT and DEFEND products—and be sure to check out our Blog for in-depth cybersecurity coverage.