- No public Tweets found
Plurilock’s BioTracker end-point agent sits quietly on the user’s workstation, monitoring keystrokes and mouse movement (not what they type or visit) to continuously ensure they are authorized users of the workstation.
If the style of use does not match the registered users’ biometric profile, the agent can alert the system administrator of a possible intrusion, take action to reduce the user’s permissions, log out the user and force them to re-authenticate, or just log the event for future forensics and attribution.
The system administrator can set the actions, sensitivity levels, user-risk groups, as well as perform forensic and analytical actions on the logs. Events and logs can automatically be sent to SIEM and UBA systems in real-time. This allows for seamless and continuous proof of presence for critical infrastructure users.
Continuously monitor critical workstations to know who the keyboard and mouse actions belong to.
Plurilock delivers preventative, instantaneous, and continuous solutions for workplace authentication and regulatory compliance. our software, BioTracker uses sophisticated behavioral biometrics to provide invisible authentication for endpoint detection and response (EDR), and Behavioral-Biometrics based User Behavior Analytics (UBA). Providing invisible second-factor authentication for financial services, as well as continuous authentication for healthcare to prevent identity threats.
© 2018 Plurilock. All Rights Reserved.