What is Plurilock DEFEND?

Plurilock DEFEND offers continuous authentication during active computing sessions by utilizing behavioral biometrics in conjunction with the keyboard and mouse devices already employed by employees. The system operates through an invisible endpoint agent and applies machine learning algorithms to assess and verify a user's identity based on their console interactions, eliminating the need for visible authentication processes. When integrated with SIEM/SOAR systems, DEFEND enhances the ability to triage and respond to security operations center alerts by providing high-confidence identity threat intelligence. Furthermore, by seamlessly integrating into login and application workflows, DEFEND delivers immediate identity verification signals in the background, enabling a truly seamless login experience once identity has been established. The DEFEND solution is compatible with various platforms, including Windows, Mac OS, IGEL, and Amazon Workspaces VDI clients, ensuring broad applicability across different environments. This flexibility makes DEFEND a versatile choice for organizations looking to enhance their security posture without disrupting user experience.

Pricing

Price Starts At:
$9 per user per month

Screenshots and Video

Company Facts

Company Name:
Plurilock Security
Date Founded:
2016
Company Location:
Canada
Company Website:
plurilock.com/products/defend/
Edit This Page

Product Details

Deployment
SaaS
Windows
Mac
On-Prem
Training Options
Documentation Hub
Online Training
On-Site Training
Support
Standard Support
24 Hour Support
Web-Based Support

Product Details

Target Company Sizes
Individual
1-10
11-50
51-200
201-500
501-1000
1001-5000
5001-10000
10001+
Target Organization Types
Mid Size Business
Small Business
Enterprise
Freelance
Nonprofit
Government
Startup
Supported Languages
English

Plurilock DEFEND Categories and Features

Endpoint Detection and Response (EDR) Software

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Authentication Software

Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On