Cybersecurity Reference > Glossary
How scalable is Plurilock?
As SaaS products, both Plurilock ADAPT™ and Plurilock DEFEND™ scale seamlessly to meet customer needs.
The on-site resource requirements for Plurilock are trivial in modern systems and unaffected by the number of users or workstations to be protected. The majority of Plurilock analysis is done by behavioral-biometric and machine learning engines that live in the Plurilock cloud, which leverages top-tier cloud providers and easily scales to meet any deployment size.
On-premises deployments of Plurilock DEFEND are also available for government, military, and asset-accounting deployments. For on-premises deployments, contact Plurilock for advice on the infrastructure necessary to support a given deployment and user or system count.
2FA/MFA Rapid Reference
Authentication at a glance
Download the 2FA/MFA Rapid Reference now:
- 2FA and MFA basics and common solutions
- The benefits and drawbacks of each
- Glossary of authentication terms
2FA/MFA Rapid Reference
- 2FA and MFA basics and common solutions
- The benefits and drawbacks of each
- Glossary of authentication terms