Continuous Proof of Presence for Critical Infrastructure
BioTracker provides critical infrastructure organizations with continuous proof of presence for users, meeting compliance and cyber-security standards. The solution is frictionless and invisible to your users. This is because we use behavioral biometrics (the way they use the keyboard and mouse) to identify them and recognize who is using the workstation.n
Determine who was doing what and when
By analyzing the mouse and keystrokes, BioTracker can identify and attribute actions to registered users of the workstation or system.
Plurilock's BioTracker end-point agent sits quietly on the user's workstation, monitoring the way they use the keyboard and mouse (not what they type or visit) to continuously ensure they are authorized users of the workstation. If the style of use does not match the registered users' biometric profile, the agent can alert the system administrator of a possible intrusion, take action to reduce the user's permissions, log out the user and force them to re-authenticate, or just log the event for future forensics and attribution.
The system administrator can set the actions, sensitivity levels, user-risk groups, as well as perform forensic and analytical actions on the logs. Events and logs can automatically be sent to SIEM and UBA systems in real-time.
The agent uses artificial intelligence to learn the way a user types and uses the mouse, it then builds a profile for the user on the system based on behavioral biometrics. It uses this data to provide multi-factor & continuous authentication for the federal government that is frictionless, invisible to the end user, and meets compliance and cyber-security standards.
Meet the Federal Energy Regulatory Commission and CIP (Critical Infrastructure Protection) standards for access control.
NIST SP 800 53
Adhere to access control, identification and authentication standards recommended by National Institute of Standards.
$221 average per-record cost of a data breach in the US.