Latest Tweets
  • No public Tweets found
Recent Comments

    Plurilock DEFEND.
    Authenticate users invisibly.
    800 times a day.

    Smooth access for the right users.
    No access for anyone else.

    DEFEND stops illicit use immediately—without bothering authorized users.

    Plurilock’s unique stack of invisible authentication factors identifies actual people as they work, not just their logins and passwords, all day long. When a stranger or a script appears—pre-session or mid-session—access is ended. Just like that.
    trojan-red

    STOP
    Remote Access Trojans

    insider-red

    STOP
    Inside and Outside Threats

    persistent-red

    STOP
    Scripts and USB Attacks

    cred-share-red

    STOP
    Credential Sharing

    keyboard-perspective

    Continuous multi-factor authentication.

    DEFEND is strong, invisible, and always on.

    Protect corporate endpoints, HTML5 + JS applications, and Citrix VDI sessions transparently, as users work. Authentication doesn’t end after login. It’s continuous—and goes on until logout. The moment a user is no longer recognized, they’re gone.

    Human identities, not logins and passwords.

    Keyboard
    Mouse
    Touchscreen
    Posture
    Ambient Light
    Geolocation
    Network Packets
    Network Latency
    Time of Day

    Plurilock’s adaptive factor stack tracks micro-patterns in behavior that are as unique as fingerprints—without compromising user privacy.

    Granular and configurable identity scoring and lockdowns.

    Reauthorize invisibly, 20 times a minute, without a false positivies or IT overhead.

    High score

    When a check returns a high score, the result is logged, the user is reauthorized, and work continues uninterrupted.

    Medium score

    When a check returns a medium score, DEFEND can log, ping a SIEM, notify, or take other actions you configure. False positive? Mark it. DEFEND's AI learns as it goes using your decisions.

    Low score

    When a check returns a low score, the right user is no longer present. DEFEND takes action, closing the session, prompting for a hard step-up, or taking other steps you've defined.

    Minimal IT overhead means fewer headaches.

    eye-icon-red

    Invisible to authorized users.

    Plurilock's lightweight endpoint, Javascript, and Citrix-ADFS agents are lightweight and transparent.

    deploy-icon

    Centralized deployment, RESTful development.

    Use GPO, SCCM, RMM, or MSI for corporate endpoint deployment and a simple RESTful API for the rest.

    alert-icon-red

    Autonomous threat response.

    Detects and responds to unauthorized use at machine speeds, eliminating admin-busy lag.

    gear-icon-red

    Continuous refinement with machine learning.

    Learns over time from decisions, eliminating the need for endless, frustrating policy and threshold tweaks.

    Continuous, all-day, human-centric authentication.
    Not just a couple of fob checks.

    DEFEND authorizes people—not just their credentials—to spot unknown users and scripts in seconds. Then, it takes immediate action, on terms you control, to remedy the situation and stop any undesired access. All day long.

    Behavioral Identity Factors
    Continuous Authentication
    Mobile Step-Up Capability
    Policy Engine
    Auth Events Daily
    Transparent to Users
    Required Hardware
     Behavioral Identity Factors
     Continuous Endpoint Visibility
     Mobile Step-Up Capability
     Policy Engine
    600–800 Identity Checks Daily
    YesTransparent to Users
    NoneNo Hardware Required
     Behavioral Identity Factors
     Continuous Endpoint Visibility
     Mobile Step-Up Capability
     Policy Engine
    1–2 Identity Checks Daily
    Not Transparent to Users
    USB Fob Required
     Behavioral Identity Factors
     Continuous Endpoint Visibility
     Mobile Step-Up Capability
     Policy Engine
    1–2 Identity Checks Daily
    Not Transparent to Users
    Phone Required
     Behavioral Identity Factors
     Continuous Authentication
     Mobile Step-Up Capability
     Policy Engine
    600–800 Auth Events Daily
    YesTransparent to Users
    NoneNo Hardware Required

    Want to learn more?
    Schedule a demo.

    Stay informed. Join our low-volume list for news and updates.

    PLURILOCK IS THE LEADER IN IDENTITY ASSURANCE USING BEHAVIORAL BIOMETRICS

    Plurilock delivers preventative, instantaneous, and continuous solutions for workplace authentication and regulatory compliance. Plurilock’s BioTracker software provides invisible authentication for endpoint detection and response (EDR) and behavioral biometrics-based user behavior analytics (UBA). These features enable transparent second-factor authentication and continuous identity verification for financial services and healthcare organizations.

    Follow

            

    Contact Plurilock

    Have a question or comment? 

    © 2019 Plurilock. All Rights Reserved.