Continuous Authentication for healthcare

BioTracker provides healthcare organizations with continuous second or third-factor authentication that is frictionless and invisible to your users. This is because we use behavioral biometrics (the way they use the keyboard and mouse) to identify them and log out any unauthorized users.

Quietly protecting Personal Health Information

Plurilock's BioTracker end-point agent sits quietly on the user's workstation, monitoring the way they use the keyboard and mouse (not what they type or visit) to continuously ensure they are the owners of the account. If the style of use does not match the registered user's biometric profile, the agent can log out the user and force them to re-authenticate, alert the system administrator of a possible intrusion, take action to quietly reduce the user's permissions, or just log the event for future forensics and attribution.

The system administrator can set the actions, sensitivity levels, user-risk groups, as well as perform forensic and analytical actions on the logs. Events and logs can automatically be sent to SIEM and UBA systems in real-time.

The lightweight endpoint agent uses artificial intelligence to learn the way a user types and uses the mouse, it then builds a profile for the user on the system based on behavioral biometrics. It uses this data to provide continuous second-factor authentication for health information that is frictionless and invisible to the end user

One solution - Many applications

Continuous monitoring

Unauthorized users will immediately be logged out of a workstation in a semi-public environment.

Multi-Factor Authentication

Provide MFA, second and third-factor authentication to your infrastructure without adding more inconvenience to your end users.

Real time detection

Detect intrusions in real-time by stopping unauthorized users at a workstation before they can cause any damage.

Attribution

Eliminate the "It wasn't me" excuse. Definitively attribute actions to users by matching the profile of the user to the actions taken.

Meet your compliance needs

HIPAA / HITECH

Meet your HIPAA / HITECH requirements by providing multi-factor authentication and adhering to security rules.

NIST SP 800 53

Adhere to access control, identification, and authentication standards recommended by National Institute of Standards.

Per-record cost of a data breach in healthcare is $363.

90% of healthcare companies have been hacked.

65% of breaches come from external attackers