Determine who was doing what and when
By analyzing the mouse and keystrokes, Plurilock can identify and attribute actions to registered users of a workstation
Plurilock’s end-point agent sits quietly on the user’s workstation, monitoring keystrokes and mouse movement (not what they type or visit) to continuously ensure they are authorized users of the workstation.
If the style of use does not match the registered users’ biometric profile, the agent can alert the system administrator of a possible intrusion, take action to reduce the user’s permissions, log out the user and force them to re-authenticate, or just log the event for future forensics and attribution.
Configurable and ubiquitous
The system administrator can set the actions, sensitivity levels, user-risk groups, as well as perform forensic and analytical actions on the logs. Events and logs can automatically be sent to SIEM and UBA systems in real-time. This allows for seamless and continuous proof of presence for critical infrastructure users.
Protect critical infrastructure from cyber attacks
Proof of Presence
Continuously monitor critical workstations to know who the keyboard and mouse actions belong to.
Real-time detection and prevention
Continuous Workstation protection
NIST SP 800-53
PLURILOCK IS THE LEADER IN ADVANCED AUTHENTICATION
© 2019 Plurilock. All Rights Reserved.