Contact us today.Phone: +1 888 282 0696Email:

Plurilock DEFEND

Plurilock DEFEND relies on behavioral biometrics and machine learning to recognize users based on the way that they work during the day. Plurilock's patented DEFEND endpoint technology uses machine learning techniques to monitor a user’s pointer and keyboard movement patterns, one micro-gesture at a time, without capturing content or activity.
As users work throughout the day, they are constantly using their input devices—their keyboard and their mouse or other pointer hardware. Plurilock DEFEND uses the movement patterns that users exhibit as they compute to confirm or reject identity. When a user's observed movement patterns match the user's previous normal behavior, no risk is reported. When DEFEND assesses a user’s input movements to be unusual, however, it begins to log risk. If a configurable threshold is crossed, DEFEND instantly alert security staff to the presence of an identity threat.

Most authentication strategies only confirm identity at initial logon—a strategy that can't detect when the authorized user's session is taken over by another user. Plurilock's DEFEND endpoint technology eliminates this uncertainty.

Video embed...
Learn about the Plurilock DEFEND technology that Aurora recommends for all Zero Trust environments.
Aurora, a Plurilock Company, has been helping security-conscious organizations solve their complex IT challenges since 1990. Aurora’s highly trained sales and service teams uniquely combine to position Aurora as a single source security service provider. With a wide range of cybersecurity solutions and services, including Plurilock DEFEND, Aurora can provide organizations with innovative technology for organizations to meet their goals.

Learn More

Talk to Aurora