Reference Materials and Resources

Guidance and Recommendations

Detailed Plurilock recommendations for password policies, along with the reasoning behind them.
Summary of authentication recommendations from major standards bodies, plus Plurilock’s own recommendations.
Is multi-factor authentication always good for privacy? See why it isn't, and which strategies make the grade.
Our recommendations for when to deploy behavioral-biometric solutions for maximum effectiveness.

Product Information

How Plurilock helped a Top-10 hedge fund to move beyond YubiKey and protect its critical data.
Learn more about Plurilock Advanced MFA and Plurilock ADAPT and DEFEND.
The state of authentication today—and why you need Plurilock products.
How Plurilock products enable NIST 800-207 Zero Trust compliance.
Quick, visual summaries of Plurilock value, use cases, architecture, and typical clients.
Plurilock enables your clients to deploy strong Citrix MFA without training or new hardware.
Plurilock products designed for banks and financials: What they are and how they work.
How Plurilock helped a mid-market manufacturer to secure its systems rapidly.
The definitive guide to behavioral biometrics, a core Plurilock technology.

Stay informed. Join our low-volume mailing list for Plurilock and cybersecurity news and updates.

PLURILOCK IS THE LEADER IN ADVANCED AUTHENTICATION

Plurilock is the leader in advanced, risk-based authentication. We provide invisible, device-free MFA for corporate endpoints, Citrix sessions, cloud applications, and their users in finance, healthcare, education, and SaaS.

Follow

        

Contact Plurilock

Have a question or comment? 

Plurilock Lead Capture Block

Welcome to Plurilock!

We’d love to hear about your interest in our products.

Great!

Okay, cool.

We'd like to provide you with more info. How can we reach you?

By submitting this form, you agree to receive periodic news, updates, and offers from Plurilock.

Thanks!

Someone from Plurilock will get in touch with you soon.
 
In the meantime, learn more about our ADAPT and DEFEND products—and be sure to check out our Blog for in-depth cybersecurity coverage.