Continuous Proof of Presence for Critical Infrastructure

BioTracker provides critical infrastructure organizations with continuous proof of presence for users, meeting compliance and cyber-security standards. The solution is frictionless and invisible to your users. This is because we use behavioral biometrics (the way they use the keyboard and mouse) to identify them and recognize who is using the workstation.n

Determine who was doing what and when

By analyzing the mouse and keystrokes, BioTracker can identify and attribute actions to registered users of the workstation or system.

Plurilock's BioTracker end-point agent sits quietly on the user's workstation, monitoring the way they use the keyboard and mouse (not what they type or visit) to continuously ensure they are authorized users of the workstation. If the style of use does not match the registered users' biometric profile, the agent can alert the system administrator of a possible intrusion, take action to reduce the user's permissions, log out the user and force them to re-authenticate, or just log the event for future forensics and attribution.

The system administrator can set the actions, sensitivity levels, user-risk groups, as well as perform forensic and analytical actions on the logs. Events and logs can automatically be sent to SIEM and UBA systems in real-time.
The agent uses artificial intelligence to learn the way a user types and uses the mouse, it then builds a profile for the user on the system based on behavioral biometrics. It uses this data to provide multi-factor & continuous authentication for the federal government that is frictionless, invisible to the end user, and meets compliance and cyber-security standards.

Protect Critical Infrastructure from Cyber attacks

Proof of Presence

Continuously monitor critical workstations to know who the keyboard and mouse actions belong to.

Second / Third Factor Authentication

Provide multi-factor authentication (MFA) to your infrastructure without adding more inconvenience to your end users.


Eliminate the "It wasn't me" excuse. Definitively attribute actions to users by matching the profile of the user to the actions taken.

Real-Time Detection

Detect intrusions in real-time by stopping threat actors at a workstation before they can cause any damage.

Continuous Workstation Protection

Continuous authentication for workstations using behavioral biometrics and artificial intelligence.

Frictionless Compliance


Meet the Federal Energy Regulatory Commission and CIP (Critical Infrastructure Protection) standards for access control.

NIST SP 800 53

Adhere to access control, identification and authentication standards recommended by National Institute of Standards.

The mean time to identify a data breach is 200 days, and it takes 70 days to contain.

$221 average per-record cost of a data breach in the US.