Latest Tweets
  • No public Tweets found
Recent Comments

    How PLURILOCK’s BEHAVIORAL BIOMETRICs work

    Understanding the AWARE (UBA) and DEFEND (EDR) Continuous Authentication Tools

    The world needs new cybersecurity tools.

    Traditional authentication methods are a bust. Credentials get stolen. Users share accounts. Trojans infect endpoints. The result is always the same—the wrong user gets access.

    Passwords and 2FA tokens are everywhere, yet breaches are skyrocketing. Even fingerprint and face scans are vulnerable. Users step out but don’t log out. Scanners get fooled by clever copies.

    Plurilock has the answer.

    You need technology that verifies the identities of the actual users doing the actual work at at all times—no matter what credentials were used or whether some have walked off without signing off.

    That technology is just what we’ve developed—and patented—at Plurilock. ■

    AI-BASED CONTINUOUS AUTHENTICATION WITH BEHAVIORAL BIOMETRICS

       
    Authenticates
    Continuously

    Plurilock authenticates users continuously, not just at login or 2FA points. User changes and walk-aways are always caught.

       
    Is Invisible and
    Friction-Free

    Plurilock is completely invisible to users until the moment at which it becomes necessary to block unauthorized use.

       
    Uses Real-Time
    Behavioral Biometrics

    Plurilock makes decisions and acts every 3-5 seconds. Because it’s based on rapidly learned biometric use patterns, it can’t be fooled.

       
    Is Flexible and
    Self-Learning

    You decide what actions are taken, and under what conditions. The AI-based endpoint agent does the rest, learning as it goes.

    HOW PLURILOCK WORKS
    ON THE GROUND

    1. AGENTS ARE DEPLOYED

    Deploy Plurilock’s lightweight agent to your endpoints with the central management tools you already use. The endpoint agent then operates silently, in the background, all the time.

    Users only see the agent running if you want them to—otherwise, it’s entirely invisible and friction-free.

    installation-science

    1. USERS ARE ENROLLED

    Plurilock’s endpoint agent begins to silently analyze unique micro-patterns in each authorized user’s keyboard and mouse movements.

    Once enough high-quality data is gathered to build a user profile, continuous authentication begins. Enrollment happens silently, often in as little as 30 minutes of regular work.

    1. CONTINUOUS AUTHENTICATION AND MONITORING

    Plurilock continuously monitors each endpoint to ensure that the body operating the keyboard and mouse match an authorized user profile.

    Every 3-5 seconds, a decision is quietly made about whether the current user is still an allowed user—or whether someone unauthorized is now generating input at the endpoint.

    continuous-auth-science

    1. AUTOMATIC ENDPOINT DETECTION AND RESPONSE

    When confidence in the identity of the user at the endpoint drops, action is taken within seconds.

    Depending on configured policies, unauthorized use can be logged, signalled to staff or SIEM systems, launch a manual authentication step, or force an immediate block-out. ■

    Sounds Like What You’re Looking For? Let's Talk.

    Contact our team with questions or to schedule a demo. We love to show off our technology.

    PLURILOCK IS THE LEADER IN IDENTITY ASSURANCE USING BEHAVIORAL BIOMETRICS

    Plurilock delivers preventative, instantaneous, and continuous solutions for workplace authentication and regulatory compliance. Plurilock’s BioTracker software provides invisible authentication for endpoint detection and response (EDR) and behavioral biometrics-based user behavior analytics (UBA). These features enable transparent second-factor authentication and continuous identity verification for financial services and healthcare organizations.

    Follow

            

    Contact Plurilock

    Have a question or comment?