AMT-USC partnered with Plurilock Security Solutions is the first to offer to the US commercial and government market sectors, a real-time cybersecurity solution that uses artificial intelligence to identify, prevent, and eliminate insider threats, securing the enterprise and ensuring compliance with requirements in financial, healthcare, and federal organizations. Our flagship product, BioTracker, continuously monitors how users interact with keyboard, mouse and or/touchscreen to compute a unique biometric signature for that user. We combine these biometrics, along with cognitive, contextual and network signals in our risk engine to detect and take action on attackers in real-time. Our solution provides continuous authentication for enterprises to detect and prevent cyber-attacks before they occur. This is unparalleled proactive security measures compared to today’s common reactive solutions.
Plurilock BioTracker Friction less Threat Mitigation End users don’t notice BioTracker because it runs in the background without any need for user involvement. This makes it the ideal balance between convenience and security as users don’t need to do anything other than their day to day work, while BioTracker protects against the threats.
AMT-USC LLC officially announces the authorized U.S. sales of Plurilock’s BioTracker “behavioral monitoring” continuous user validation cybersecurity platform software.
Plurilock’s AI-powered behavior-based platform distinguishes between authorized users and intruders by analyzing the unique behavioral patterns of authorized users and blocking access when unrecognized behavior occurs. Unlike traditional multifactor and CAC-based authentication, which provide only a single-point-in-time identity validation.
Authentication beyond Login
BioTracker uses artificial intelligence and machine learning to confirm your users’ identity even after they have logged in by learning the way they use the keyboard and mouse, BioTracker then continuously monitors this behavior and acts when it doesn’t match the registered user.
During login, BioTracker can be used as an additional factor for authentication by learning the way your users type their password or PIN (for CAC authentication) to silently protect the account.
Passive or Aggressive, or Both
If an anomaly is detected, the user can be challenged to re-authenticate, admins notified, network privileges revoked, or the event just logged in the background. All instantly and silently without user involvement or knowledge.
When first installed, BioTracker takes about 20 minutes of regular use to generate a profile for each user. Once enrolled, the user account is then protected, with logs being sent to the server.
Human behavior changes over time, and varies from day to day, which is why BioTracker continuously learns your users’ behavior, even after they are enrolled, and has the ability to adjust to variances in human behavior without compromising security.
Detect Intrusions, Act in Seconds
BioTracker takes seconds to detect and react to intrusions, which is a far cry from the average 200 days it takes the industry to detect and react to intrusions without BioTracker.
BioTracker Protects Against
✓Password / Credentials Sharing
✓Remote Access Trojan
✓Rubber Ducky Attacks