BioTracker provides Financial Services organizations with continuous second or third-factor authentication that is frictionless and invisible to your users. This is because we use behavioral biometrics (the way they use the keyboard and mouse) to identify them and logout any unauthorized users.


Plurilock's BioTracker end-point agent sits quietly on the user's workstation, monitoring the way they use the keyboard and mouse (not what they type or visit) to continuously ensure they are the owners of the account. If the style of use does not match the registered user's biometric profile the agent can log out the user and force them to re-authenticate, alert the system administrator of a possible intrusion, take action to quietly reduce the user's permissions, or just log the event for future forensics and attribution.

The system administrator can set the actions, sensitivity levels, user-risk groups, as well as perform forensic and analytical actions on the logs. Events and logs can automatically be sent to SIEM and UBA systems in real-time.

The agent uses artificial intelligence to learn the way a user types and uses the mouse, then builds a profile for this user on the system based on behavioral biometrics, which it uses to provide continuous second-factor authentication for financial services that is frictionless and invisible to the end user.

Protect Financial Data

Ethical Information Barriers

An additional layer of silent security ensures that only the authorized users have access to sensitive financial or deal information.

Second and third-factor authentication

Provide multi-factor authentication (MFA) to your infrastructure without adding more inconvenience to your end users.


Eliminate the "It wasn't me" excuse. Definitively attribute actions to users by matching the profile of the user to the actions taken.

Continuous Application Protection

Continuous second-factor authentication for financial services using behavioral biometrics and artificial intelligence.

Real-time Detection

Detect intrusions in real-time by stopping unauthorized users at a workstation before they can cause any damage.

Non-Intrusive Compliance & Standards


Designate the responsible party as part of the Gramm-Leach-Bliley Act.


Sarbanes Oxley compliance through COSO / COBIT / ITGI Frameworks for access and authentication controls, monitoring of logs and events, network security, as well as physical biometric security.


Comply with the Dodd-Frank requirements for security controls. Minimize time to detect, respond, and report breaches.


Manage vulnerabilities and breaches by providing strong access control over customer data using continuous authentication.

Companies experienced an average stock price drop of 5% after breach with recovery time between 44 to 71 days

40% of breaches involved internal actors

Per-record costs for data breaches is $215 for financial services firms