Glossary
of IAM and cybersecurity terminology
Plurilock Terms
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
Threat and Attack Terms
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
General Cybersecurity Terms
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
Technology Terms
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
Compliance Terms
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
read more
Plurilock Terms
Plurilock ADAPT
Plurilock ADAPT is a Plurilock product that provides invisible, frictionless, biometric multi-factor authentication (MFA). ADAPT uses behavioral-biometric, environmental, and contextual identity factors to authenticate users during login workflows. ADAPT relies on machine learning to maintain a fingerprint-unique profile of users’ identity characteristics.¶If during login the authenticating individual does not match the expected user’s profile, they may either be excluded (login failed) or prompted to perform step-up authentication (such as with a phone code or email link) to confirm identity.
ADAPT makes stolen credentials useless to attackers; even if an attacker has captured a user’s password, their location behavior, network characteristics, and behavioral-biometric typing and pointing style won’t match the intended user, ensuring that inappropriate access is not granted.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on Behavioral Biometrics, check out our Behavioral Biometrics Guide.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Accordion Content
Adaptive Factor Stack
Plurilock’s Adaptive Factor Stack is a combination of behavioral-biometric, environmental, and contextual identity signals that are processed by Plurilock’s machine learning engine to assemble an identity profile unique to every user. By combining or layering these factors, Plurilock’s machine learning engine is able to authoritatively identify real people, not just credentials, as they try to log in—drastically reducing the chance that an attacker can use stolen credentials to assume a legitimate user’s identity.
Plurilock AWARE
Plurilock AWARE is a Plurilock product that provides continuous identity monitoring for enterprise workstations or endpoints. AWARE uses behavioral-biometric, environmental, and contextual identity signals to validate and users’ identities continuously, as they carry out computing tasks.
This ongoing record of identity validation can be provided in real time to SIEM systems or other infrastructure for further activity, enabling, for example, automated exclusion of unauthorized users or the automatic maintenance of an audit log for non-repudiation purposes.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Plurilock DEFEND
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Endpoint Agent
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Enrollment
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Impossible Travel
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
JavaScript Agent
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Location Data
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Master Profile
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Network Context
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Plurilock API
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Profile
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Score
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Threshold
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Plurilock Terms
Impossible Travel
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
JavaScript Agent
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Location Data
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Master Profile
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Network Context
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Plurilock API
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Profile
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Score
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Threshold
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Compliance Terms
Example Information Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Example Information Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Example Information Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Example Information Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Example Information Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Example Information Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Threat Terms
Example Information Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Example Information Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Example Information Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Example Information Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Example Information Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Example Information Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Security Terms
Example Information Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Example Information Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Example Information Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Example Information Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Example Information Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE
Example Information Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean porta erat neque, sed condimentum urna eleifend eu. Donec luctus facilisis nisi, vel ornare libero bibendum eget.
For more information on privacy in security, check out ourPDF GUIDE