Determine who was doing what and when
By analyzing the mouse and keystrokes, Plurilock can identify and attribute actions to registered users of a workstation
Plurilock’s end-point agent sits quietly on the user’s workstation, monitoring keystrokes and mouse movement (not what they type or visit) to continuously ensure they are authorized users of the workstation.
If the style of use does not match the registered users’ biometric profile, the agent can alert the system administrator of a possible intrusion, take action to reduce the user’s permissions, log out the user and force them to re-authenticate, or just log the event for future forensics and attribution.
Configurable and ubiquitous
The system administrator can set the actions, sensitivity levels, user-risk groups, as well as perform forensic and analytical actions on the logs. Events and logs can automatically be sent to SIEM and UBA systems in real-time. This allows for seamless and continuous proof of presence for critical infrastructure users.
Protect critical infrastructure from cyber attacks
Proof of Presence
Continuously monitor critical workstations to know who the keyboard and mouse actions belong to.
Real-time detection and prevention
Continuous Workstation protection
NIST SP 800-53
Stay informed. Join our low-volume mailing list for Plurilock and cybersecurity news and updates.
PLURILOCK IS THE LEADER IN ADVANCED AUTHENTICATION
© 2020 Plurilock. All rights reserved.
Plurilock Lead Capture Block
Welcome to Plurilock!
We’d love to hear about your interest in our products.
We'd like to provide you with more info. How can we reach you?
|*||Enter your email above to agree to receive commercial electronic communication from Plurilock via email.|