Latest Tweets
  • No public Tweets found
Recent Comments

    Continuous proof of presence for critical infrastructure

    Plurilock helps critical infrastructure organizations meet compliance and cyber-security standards by providing continuous proof of presence for users using behavioral biometrics

    Determine who was doing what and when

    By analyzing the mouse and keystrokes, Plurilock can identify and attribute actions to registered users of a workstation

    Silent authentication

    Plurilock’s end-point agent sits quietly on the user’s workstation, monitoring keystrokes and mouse movement (not what they type or visit) to continuously ensure they are authorized users of the workstation.

    If the style of use does not match the registered users’ biometric profile, the agent can alert the system administrator of a possible intrusion, take action to reduce the user’s permissions, log out the user and force them to re-authenticate, or just log the event for future forensics and attribution.


    Configurable and ubiquitous

    The system administrator can set the actions, sensitivity levels, user-risk groups, as well as perform forensic and analytical actions on the logs. Events and logs can automatically be sent to SIEM and UBA systems in real-time. This allows for seamless and continuous proof of presence for critical infrastructure users.


    Protect critical infrastructure from cyber attacks

    Proof of Presence

    Continuously monitor critical workstations to know who the keyboard and mouse actions belong to.

    Multi-Factor Authentication

    Provide multi-factor authentication (MFA) to your infrastructure without adding more inconvenience to your end users.


    Eliminate the “It wasn’t me” excuse. Definitively attribute actions to users by matching the profile of the user to the actions taken.

    Real-time detection and prevention

    Detect intrusions in real-time by stopping threat actors at a workstation before they can cause any damage.

    Continuous Workstation protection

    Continuous authentication for workstations using behavioral biometrics and artificial intelligence.

    Frictionless Compliance


    Meet the Federal Energy Regulatory Commission and CIP (Critical Infrastructure Protection) standards for access control.

    NIST SP 800-53

    Adhere to access control, identification and authentication standards recommended by National Institute of Standards.


    Plurilock delivers preventative, instantaneous, and continuous solutions for workplace authentication and regulatory compliance. Plurilock’s BioTracker software provides invisible authentication for endpoint detection and response (EDR) and behavioral biometrics-based user behavior analytics (UBA). These features enable transparent second-factor authentication and continuous identity verification for financial services and healthcare organizations.



    Contact Plurilock

    Have a question or comment? 

    © 2019 Plurilock. All Rights Reserved.