Plurilock for Government and military applications

Information and Identity Assurance
for Cyber Operations

Milspec authentication solutions to augment CAC infrastructure and protect legacy systems.

36 million
cyberattack emails are thwarted by the US DoD daily

The US Department of Defense handles 36 million phishing, malware, and virus-laden emails every day.

Balancing operational and field readiness against security overhead is a demanding problem. Continuous authentication with behavioral biometrics enables uniformed personnel to carry out orders efficiently.

Deploy silent behavioral-biometric authentication
to protect login workflows or entire duty station shifts.

Protect network and ADFS-based login workflows invisibly, without new steps or hardware. Exclude unauthorized personnel—even if they're using valid stolen credentials.

Protect Mac OS and Windows logins with continuous, full-shift background authentication. Detect and exclude unauthorized personnel in seconds, even when they step in to an already authenticated open session.

Achieve operational information and identity assurance.

Invisible Background Protection

Plurilock uses artificial intelligence to learn as personnel and operational realities evolve. It reacts rapidly and autonomously, reducing threat windows to seconds.

Continuous Operation

Plurilock detects intrusions in real-time, confirming identity every 3-5 seconds without interrupting critical activity—unless it detects a threat, interloper, or anomaly.

Configurable Sensitivity

Sensitivity levels, action thresholds, actions, and personnel-risk groups are configurable. Real-time data can be sent to SIEM, UBA, or EDR systems for analysis and action.

Demonstrated Deployability

Active contracts with multiple United States and Canadian federal government and military agencies demonstrate Plurilock's deployment-readiness in government contexts.

Maintain required standards compliance.

NIST 800-53

Compatible with NIST SP 800-53, Recommended Security Controls for Federal Information Systems and Organizations.

NIST 800-171

Compatible with NIST SP 800-171, Controlled Unclassified Information in Nonfederal Systems and Organizations.

NIST 800-207

Compatible with NIST Draft SP 800-207, Zero Trust Architecture, outlining the components of a zero trust architecture (ZTA).

Leverage behavioral-biometric identification.

Strong Activity Non-repudiation

Tie actions to particular individual personnel to achieve continuous identity assurance and activity non-repudiation, regardless of the logins or credentials in use.

Low Incident Response Times

Protect critical resources at machine speed without manual intervention, using automated responses configured to match operational requirements.

Legacy System MFA

Add MFA to legacy systems at a fraction of the cost of custom solutions, enabling compliance and CAC augmentation without needing policy exceptions.

Got questions?

We answer some of the most common questions on our products, authentication technology, security, and next steps.

Want to see Plurilock in action?
Let’s talk.

PLURILOCK IS THE LEADER IN ADVANCED AUTHENTICATION

Plurilock is the leader in advanced, risk-based authentication. We provide invisible, device-free MFA for corporate endpoints, Citrix sessions, cloud applications, and their users in finance, healthcare, education, and SaaS.

Follow

        

Contact Plurilock

Have a question or comment? 

© 2019 Plurilock. All Rights Reserved.

The appearance of U.S. Department of Defense (DoD) visual information does not imply or constitute DoD endorsement.