Latest Tweets
  • No public Tweets found
Recent Comments

    Behavioral Biometrics

    The definitive PLURILOCK guide

    You are the NEW password

    Behavioral biometrics and authentication today

    Passwords have long been the standard authentication tool. But there are a growing number of serious problems with this form of authentication.

    Users today have a lot of passwords to remember—more than ever before—and they’re asked to change them frequently. Each of these passwords can be used by anyone that has them if they’re compromised or stolen.

    Meanwhile, the need for ever more complex passwords, in ever greater numbers, that are ever more ready at hand leads to poor password hygiene and habits. These defeat the purpose of password use.

    Behavioral Biometric: User Friction Passwords

    Password management software makes it easier to store and manage passwords, but passwords remain vulnerable to human error, social engineering, and theft—and once a password is in the wrong hands, the door is wide open.

    Behavioral Biometrics Carelessness, Loss, or Theft

    For these reasons, multi-factor authentication (MFA) is now in widespread use. By requiring both a known password and the possession of a particular device or other hardware, MFA is designed to plug some of the holes that decades of password use has created.

    But devices, too, are vulnerable to loss, social engineering, and theft—often at the same time that passwords are being stolen—and MFA makes heavy demands on users and support teams.

    Behavioral biometrics, on the other hand, plugs these holes by providing transparent authentication that is neither password- nor device-dependent.

    Instead, everyday behavior provides continuous, real-time verification of identity, whatever device is being used. Meanwhile, strangers are caught and excluded—with or without the “right” passwords and devices.

    Behavioral Biometric Authentication

    Authentication Methods: A Side-by-Side Comparison

    A closer look at how current authentication methods perform


    User Friction

    Regulatory Compliance


    Password Vulnerability


    Prone to human error, poor hygiene, and theft.

    Password User Friction


    Forgetfulness and complex password policies lead to high support needs.

    Password Compliance


    Do not alone meet many current  regulatory standards.

    Multi-factor Auth

    Multi-Factor Vulnerability


    Prone human error and compromised by device loss or theft.

    Multi-Factor USER FRICTION


    Further increases complexity and imposes new logistical constraints.

    Multi-Factor Compliance


    Enables regulatory standards to be met, though at high costs.

    Behavioral Biometrics

    Behavioral Biometrics Vulnerability


    The capture and re-use of micro-behaviors is currently not possible.

    Behavioral BIometrics USER FRICTION


    Authenticates in real time while invisible to the user.

    Behavioral Biometrics Compliance


    Continuous, strong authentication is driving rapid adoption in regulated organizations and industries. 


    Plurilock delivers preventative, instantaneous, and continuous solutions for workplace authentication and regulatory compliance. Plurilock’s BioTracker software provides invisible authentication for endpoint detection and response (EDR) and behavioral biometrics-based user behavior analytics (UBA). These features enable transparent second-factor authentication and continuous identity verification for financial services and healthcare organizations.



    Contact Plurilock

    Have a question or comment?