AMT-USC partnered with Plurilock Security Solutions is the first to offer to the US commercial and government market sectors, a real-time cybersecurity solution that uses artificial intelligence to identify, prevent, and eliminate insider threats, securing the enterprise and ensuring compliance with requirements in financial, healthcare, and federal organizations. Fully integrated into the AMT-USC Cyber Hub Defense zero trust system.
CONTINUOUS IDENTITY ASSURANCE
Plurilock uses patented behavioral biometrics technology to provide next-generation workplace security. It analyzes micro-patterns in keyboard and mouse behavior as users do their everyday work, recognizing authorized individuals and excluding intruders in real time—without authentication prompts and no matter which credentials.
Detects and responds to threats at machine speed, removing human limitations from the loop.
Learns and adapts to changes in behavioral patterns over time, evolving with users and their work.
No gaps during policy changes, signature updates, or other security infrastructure roll-outs.
Offers granular control to tune sensitivity and actions taken to environment and risk posture.
Relies on tiny patterns in movement, not computing activity, safeguarding privacy and confidentiality. re in use. This provides enterprises with unprecedented levels of protection against unauthorized access and security threats.
AMT-USC LLC officially announces the authorized U.S. sales of Plurilock’s BioTracker “behavioral monitoring” continuous user validation cybersecurity platform software.
Plurilock’s AI-powered behavior-based platform distinguishes between authorized users and intruders by analyzing the unique behavioral patterns of authorized users and blocking access when unrecognized behavior occurs. Unlike traditional multifactor and CAC-based authentication, which provide only a single-point-in-time identity validation.
Plurilock’s proof-of-presence software continuously authenticates users. After being installed, the software takes about 20 minutes to learn users’ keystroke style and speed, mouse use and other behaviors on laptops, desktops, and servers to create a profile. Using this information, Plurilock can then continuously validate that the current user is the authorized user, providing corporations and governments complete visibility into who, when and where users are on the network at all times. Plurilock’s software operates entirely in the background, requires no direct user interaction, and reduces the average breach detection time from more than six months to less than 30 seconds.
Key Plurilock Capabilities
INSIDER THREAT PREVENTION
Detect improper use, privilege-escalations and walk-away access
CREDENTIAL SHARING PREVENTION
Eliminate internal password sharing and compliance violations
TAKEOVER AND IMPERSONATION PREVENTION
Exclude unknown users regardless of credentials used
PRIVILEGED ACCESS & IDENTITY MANAGEMENT
Continuously authenticate actual persons, eliminating PAM risks
ENHANCED ENDPOINT VISIBILITY
Track and analyze realtime endpoint activity and human telemetry
Hardened with DISA STIG and SRG
• Penetration tested
• Vulnerability scanned
• Granted IATT on production
U.S. Army networks