Continuous Authentication for healthcare
BioTracker provides healthcare organizations with continuous second or third-factor authentication that is frictionless and invisible to your users. This is because we use behavioral biometrics (the way they use the keyboard and mouse) to identify them and log out any unauthorized users.
Quietly protecting Personal Health Information
Plurilock's BioTracker end-point agent sits quietly on the user's workstation, monitoring the way they use the keyboard and mouse (not what they type or visit) to continuously ensure they are the owners of the account. If the style of use does not match the registered user's biometric profile, the agent can log out the user and force them to re-authenticate, alert the system administrator of a possible intrusion, take action to quietly reduce the user's permissions, or just log the event for future forensics and attribution.
The system administrator can set the actions, sensitivity levels, user-risk groups, as well as perform forensic and analytical actions on the logs. Events and logs can automatically be sent to SIEM and UBA systems in real-time.
The lightweight endpoint agent uses artificial intelligence to learn the way a user types and uses the mouse, it then builds a profile for the user on the system based on behavioral biometrics. It uses this data to provide continuous second-factor authentication for health information that is frictionless and invisible to the end user
90% of healthcare companies have been hacked.
65% of breaches come from external attackers