Identity Assurance and CAC Augmentation for government and military organizations

Continuous proof of presence enables government agencies to meet mission requirements and protect the warfighter with advanced AI authentication solutions that leverage behavioral biometrics.

Detect and prevent intrusions in real time


Plurilock provides a new class of protection that combines critical features from authentication, threat detection, behavior monitoring, forensic activity attribution, and biometrics systems.

Plurilock’s endpoint agent runs quietly on workstations, monitoring biometric patterns in user keyboard and mouse behavior—without tracking or recording activity—to continuously ensure that users are both known and authorized.

When keyboard and mouse activity ceases to match an authorized biometric profile, the agent can log, warn, report, force reidentification, or block further access in a matter of seconds.


The Plurilock agent uses artificial intelligence to learn as users and contexts evolve. It reacts rapidly and autonomously, reducing threat and violation windows to seconds. This provides multi-factor continuous authentication that is frictionless, invisible to users, and meets federal compliance and cyber-security standards. 


Sensitivity levels, action thresholds, actions,  user-risk groups, and forensic and analytical  log activity are all configurable. Real-time data can automatically be sent to SIEM and UBA systems for inclusion, analysis, or action.


Plurilock provides identity assurance and CAC augmentation for federal, state, and local government and military organizations.

Adheres to NIST SP 800-53 of the Federal Information Security Management Act 

Adheres to NIST 800-171 for protecting the confidentiality of CUI


Plurilock awarded two contracts for CaC augmentation technology

Identity Assurance Using Behavioral Biometrics

of end user activities

Attribute actions to particular individuals with certainty, leveraging behavioral biometrics to achieve continuous identity assurance, regardless of the logins or credentials in use.

Robust 2FA for
legacy systems

Add second-factor authentication to legacy systems at reduced cost, meeting compliance requirements, limiting needed exceptions, and providing CAC augmentation capabilities.

Lowered incident
response times

Avert threats at machine speeds, without  security analyst intervention. Protect critical data and systems with automated responses configured to match organizational IT policies


Plurilock is the leader in advanced, risk-based authentication. We provide invisible, device-free MFA for corporate endpoints, Citrix sessions, cloud applications, and their users in finance, healthcare, education, and SaaS.



Contact Plurilock

Have a question or comment? 

© 2019 Plurilock. All Rights Reserved. | Plurilock Cage Code L02Z7; DUNS 248484623