- No public Tweets found
An additional layer of silent security ensures that only the authorized users have access to sensitive financial or deal information
Provide multi-factor authentication (MFA) to your infrastructure without adding more inconvenience to your end users
Eliminate the “It wasn’t me” excuse. Definitively attribute actions to users by matching the profile of the user to the actions taken
Detect intrusions in real-time by stopping unauthorized users at a workstation before they cause damage
Continuous, invisible second-factor authentication for financial services using behavioral biometrics
Plurilock’s end-point agent sits quietly on the user’s workstation, monitoring the way they use the keyboard and mouse (not what they type or visit) to continuously ensure they are the owners of the account. If the style of use does not match the registered user’s biometric profile the agent can log out the user and force them to re-authenticate, alert the system administrator of a possible intrusion, take action to quietly reduce the
user’s permissions, or just log the event for future forensics and attribution.
The system administrator can set the actions, sensitivity levels, user-risk groups, as well as perform forensic and analytical actions on the logs. Events and logs can automatically be sent to SIEM and UBA systems in real-time.
The agent uses artificial intelligence to learn keystrokes and mouse movements, building a behavioral biometric profile for the user to provide continuous invisible second-factor authentication for financial services that is frictionless and meets compliance standards.
Comply with the Dodd-Frank requirements for security controls. Minimize time to detect, respond, and report breaches.
Manage vulnerabilities and breaches by providing strong access control over customer data using continuous authentication.
Plurilock delivers preventative, instantaneous, and continuous solutions for workplace authentication and regulatory compliance. Plurilock’s BioTracker software provides invisible authentication for endpoint detection and response (EDR) and behavioral biometrics-based user behavior analytics (UBA). These features enable transparent second-factor authentication and continuous identity verification for financial services and healthcare organizations.