- No public Tweets found
Plurilock’s BioTracker endpoint agent sits quietly on the user’s workstation, monitoring the way they use the keyboard and mouse (not what they type or visit) to continuously ensure they are the owners of the account. If the style of use does not match the registered user’s biometric profile, the agent can log out the user and force them to re-authenticate, alert the system administrator of a possible intrusion, take action to quietly reduce the user’s permissions, or just log the event for future forensics and attribution.
The system administrator can set the actions, sensitivity levels, user-risk groups, as well as perform forensic and analytical actions on the logs. Events and logs can automatically be sent to SIEM and UBA systems in real-time.
Adheres to standards NIST SP 800-53 of the Federal Information Security Management Act
Adheres to NIST 800-171 standards for protecting the confidentiality of CUI
The agent uses artificial intelligence to learn the way a user types and uses the mouse. It builds a profile for the user based on behavioral biometrics, which it uses to provide multi-factor and continuous authentication for the federal government that is frictionless, invisible to the end user, and meets compliance and cyber-security standards. Plurilock provides identity assurance and CAC augmentation for government and military organizations.
Get certainty in “who did what” by
leveraging behavioral biometrics to achieve continuous identity assurance
Get second-factor authentication capabilities for legacy systems, meeting compliance requirements, and reducing the number of exceptions needed and providing CAC augmentation capabilities
React at machine speed, without requiring a security analyst in the loop. Protect critical data and systems by configuring automated responses that match organizational IT policies
Plurilock delivers preventative, instantaneous, and continuous solutions for workplace authentication and regulatory compliance. Plurilock’s BioTracker software provides invisible authentication for endpoint detection and response (EDR) and behavioral biometrics-based user behavior analytics (UBA). These features enable transparent second-factor authentication and continuous identity verification for financial services and healthcare organizations.