Behavioral Biometrics

Behavioral Biometrics History, Applications, and Technology​

Considerations in Applicability

When deploying behavioral biometrics solutions, note the following caveats for environment and interaction design

Behavioral Biometrics: Chapter 4
Behavioral Biometrics: Insufficient Interaction


Behavioral biometrics enables authentication based on unique user behavior profiles. These are initialized when users engage with and use secured systems. In rare cases, however, exceptionally infrequent or irregular use may slow profile creation.

Users that interact with secured systems briefly and only once or twice per year, for example, may produce very little behavioral data.

In these cases, alternate authentication methods must be used until sufficient data about the user’s behavior can be gathered to enable behavioral-biometric identification.


Thanks to the Cambridge Analytica scandal, GDPR1 and similar regulations, and rising press coverage, concerns about user privacy have become key policy concerns. For similar reasons, fraud prevention measures that definitively identify users before granting access to data are becoming increasingly essential.Plurilock’s behavioral biometrics solutions meet both of these needs, without requiring complex workarounds or exceptions.
Behavioral Biometrics: Security and Privacy

Plurilock profiles consist of data used only to match real-time behavior to a profile of past behavior—data that, if found elsewhere, could not be tied to any real person.

What users do is not stored; only patterns of microbehavior (how keys were pressed, how mice were moved) are represented in each profile.

Privacy is a Cornerstone of Plurilock's Technology.

Plurilock only knows the way users type and move the mouse, not what they type or click on

Stay informed. Join our low-volume mailing list for Plurilock and cybersecurity news and updates.


Plurilock is the leader in advanced, risk-based authentication. We provide invisible, device-free MFA for corporate endpoints, Citrix sessions, cloud applications, and their users in finance, healthcare, education, and SaaS.



Contact Plurilock

Have a question or comment? 

Plurilock Lead Capture Block

Welcome to Plurilock!

We’d love to hear about your interest in our products.


Okay, cool.

We'd like to provide you with more info. How can we reach you?

Enter your email above to agree to receive commercial electronic communication from Plurilock via email.


Someone from Plurilock will get in touch with you soon.
In the meantime, learn more about our ADAPT and DEFEND products—and be sure to check out our Blog for in-depth cybersecurity coverage.