Skip to content
Latest News:
Plurilock Announces US$868,600 in Critical Services Contracts with Nasdaq Listed Semiconductor Manufacturer
Watch:
Plurilock FY2024 Earnings Call
Live Now:
How EDR Killers are Changing Cybersecurity
Services & Solutions
Critical Services
IT and Cyber Modernization
Managed Services and Operational Support
—
U.S. Commercial Sales
U.S. Federal Sales
Canada Commercial Sales
Canada Federal Sales
In Your Area
Albuquerque – Santa Fe
Atlanta
Austin
Baltimore
Birmingham – Tuscaloosa
Boston – Manchester
Charlotte
Chicago
Cincinnati
Cleveland – Akron
Columbus
Dallas – Forth Worth
Denver
Detroit
Grand Rapids – Kalamazoo
Greensboro – Winston – Salem
Greenville – Asheville
Harrisburg – Lancaster
Hartford – New Haven
Houston
Indianapolis
Jacksonville
Kansas City
Las Vegas
Los Angeles
Louisville
Miami – Ft. Lauderdale
Milwaukee
Minneapolis – St. Paul
Nashville
New Orleans
New York
Norfolk – Portsmouth
Oklahoma City
Orlando – Daytona Beach
Philadelphia
Phoenix – Prescott
Pittsburgh
Portland Oregon
Quebec City
Raleigh – Durham – Fayetteville
Sacramento – Stockton
Salt Lake City
San Antonio
San Diego
San Francisco – Oakland
Seattle – Tacoma
St. Louis
Tampa – St. Petersburg
Washington D.C.
West Palm Beach
Calgary
Edmonton
Montreal
Ottawa
Toronto
Vancouver
Winnipeg
Resources
Tearsheets
Code and Country Podcast
Events
Webinar Recordings
Blog
Industry Voices
Cybersecurity Reference
About
Team and Board
Meet the Team
Press
Careers
Investors
Contact
Services & Solutions
Critical Services
IT and Cyber Modernization
Managed Services and Operational Support
—
U.S. Commercial Sales
U.S. Federal Sales
Canada Commercial Sales
Canada Federal Sales
In Your Area
Albuquerque – Santa Fe
Atlanta
Austin
Baltimore
Birmingham – Tuscaloosa
Boston – Manchester
Charlotte
Chicago
Cincinnati
Cleveland – Akron
Columbus
Dallas – Forth Worth
Denver
Detroit
Grand Rapids – Kalamazoo
Greensboro – Winston – Salem
Greenville – Asheville
Harrisburg – Lancaster
Hartford – New Haven
Houston
Indianapolis
Jacksonville
Kansas City
Las Vegas
Los Angeles
Louisville
Miami – Ft. Lauderdale
Milwaukee
Minneapolis – St. Paul
Nashville
New Orleans
New York
Norfolk – Portsmouth
Oklahoma City
Orlando – Daytona Beach
Philadelphia
Phoenix – Prescott
Pittsburgh
Portland Oregon
Quebec City
Raleigh – Durham – Fayetteville
Sacramento – Stockton
Salt Lake City
San Antonio
San Diego
San Francisco – Oakland
Seattle – Tacoma
St. Louis
Tampa – St. Petersburg
Washington D.C.
West Palm Beach
Calgary
Edmonton
Montreal
Ottawa
Toronto
Vancouver
Winnipeg
Resources
Tearsheets
Code and Country Podcast
Events
Webinar Recordings
Blog
Industry Voices
Cybersecurity Reference
About
Team and Board
Meet the Team
Press
Careers
Investors
Contact
Services & Solutions
Critical Services
IT and Cyber Modernization
Managed Services and Operational Support
—
U.S. Commercial Sales
U.S. Federal Sales
Canada Commercial Sales
Canada Federal Sales
In Your Area
Albuquerque – Santa Fe
Atlanta
Austin
Baltimore
Birmingham – Tuscaloosa
Boston – Manchester
Charlotte
Chicago
Cincinnati
Cleveland – Akron
Columbus
Dallas – Forth Worth
Denver
Detroit
Grand Rapids – Kalamazoo
Greensboro – Winston – Salem
Greenville – Asheville
Harrisburg – Lancaster
Hartford – New Haven
Houston
Indianapolis
Jacksonville
Kansas City
Las Vegas
Los Angeles
Louisville
Miami – Ft. Lauderdale
Milwaukee
Minneapolis – St. Paul
Nashville
New Orleans
New York
Norfolk – Portsmouth
Oklahoma City
Orlando – Daytona Beach
Philadelphia
Phoenix – Prescott
Pittsburgh
Portland Oregon
Quebec City
Raleigh – Durham – Fayetteville
Sacramento – Stockton
Salt Lake City
San Antonio
San Diego
San Francisco – Oakland
Seattle – Tacoma
St. Louis
Tampa – St. Petersburg
Washington D.C.
West Palm Beach
Calgary
Edmonton
Montreal
Ottawa
Toronto
Vancouver
Winnipeg
Resources
Tearsheets
Code and Country Podcast
Events
Webinar Recordings
Blog
Industry Voices
Cybersecurity Reference
About
Team and Board
Meet the Team
Press
Careers
Investors
Contact
Services & Solutions
Critical Services
IT and Cyber Modernization
Managed Services and Operational Support
—
U.S. Commercial Sales
U.S. Federal Sales
Canada Commercial Sales
Canada Federal Sales
In Your Area
Albuquerque – Santa Fe
Atlanta
Austin
Baltimore
Birmingham – Tuscaloosa
Boston – Manchester
Charlotte
Chicago
Cincinnati
Cleveland – Akron
Columbus
Dallas – Forth Worth
Denver
Detroit
Grand Rapids – Kalamazoo
Greensboro – Winston – Salem
Greenville – Asheville
Harrisburg – Lancaster
Hartford – New Haven
Houston
Indianapolis
Jacksonville
Kansas City
Las Vegas
Los Angeles
Louisville
Miami – Ft. Lauderdale
Milwaukee
Minneapolis – St. Paul
Nashville
New Orleans
New York
Norfolk – Portsmouth
Oklahoma City
Orlando – Daytona Beach
Philadelphia
Phoenix – Prescott
Pittsburgh
Portland Oregon
Quebec City
Raleigh – Durham – Fayetteville
Sacramento – Stockton
Salt Lake City
San Antonio
San Diego
San Francisco – Oakland
Seattle – Tacoma
St. Louis
Tampa – St. Petersburg
Washington D.C.
West Palm Beach
Calgary
Edmonton
Montreal
Ottawa
Toronto
Vancouver
Winnipeg
Resources
Tearsheets
Code and Country Podcast
Events
Webinar Recordings
Blog
Industry Voices
Cybersecurity Reference
About
Team and Board
Meet the Team
Press
Careers
Investors
Contact
Services & Solutions
Critical Services
IT and Cyber Modernization
Managed Services and Operational Support
—
U.S. Commercial Sales
U.S. Federal Sales
Canada Commercial Sales
Canada Federal Sales
In Your Area
Albuquerque – Santa Fe
Atlanta
Austin
Baltimore
Birmingham – Tuscaloosa
Boston – Manchester
Charlotte
Chicago
Cincinnati
Cleveland – Akron
Columbus
Dallas – Forth Worth
Denver
Detroit
Grand Rapids – Kalamazoo
Greensboro – Winston – Salem
Greenville – Asheville
Harrisburg – Lancaster
Hartford – New Haven
Houston
Indianapolis
Jacksonville
Kansas City
Las Vegas
Los Angeles
Louisville
Miami – Ft. Lauderdale
Milwaukee
Minneapolis – St. Paul
Nashville
New Orleans
New York
Norfolk – Portsmouth
Oklahoma City
Orlando – Daytona Beach
Philadelphia
Phoenix – Prescott
Pittsburgh
Portland Oregon
Quebec City
Raleigh – Durham – Fayetteville
Sacramento – Stockton
Salt Lake City
San Antonio
San Diego
San Francisco – Oakland
Seattle – Tacoma
St. Louis
Tampa – St. Petersburg
Washington D.C.
West Palm Beach
Calgary
Edmonton
Montreal
Ottawa
Toronto
Vancouver
Winnipeg
Resources
Tearsheets
Code and Country Podcast
Events
Webinar Recordings
Blog
Industry Voices
Cybersecurity Reference
About
Team and Board
Meet the Team
Press
Careers
Investors
Contact
Services & Solutions
Critical Services
IT and Cyber Modernization
Managed Services and Operational Support
—
U.S. Commercial Sales
U.S. Federal Sales
Canada Commercial Sales
Canada Federal Sales
In Your Area
Albuquerque – Santa Fe
Atlanta
Austin
Baltimore
Birmingham – Tuscaloosa
Boston – Manchester
Charlotte
Chicago
Cincinnati
Cleveland – Akron
Columbus
Dallas – Forth Worth
Denver
Detroit
Grand Rapids – Kalamazoo
Greensboro – Winston – Salem
Greenville – Asheville
Harrisburg – Lancaster
Hartford – New Haven
Houston
Indianapolis
Jacksonville
Kansas City
Las Vegas
Los Angeles
Louisville
Miami – Ft. Lauderdale
Milwaukee
Minneapolis – St. Paul
Nashville
New Orleans
New York
Norfolk – Portsmouth
Oklahoma City
Orlando – Daytona Beach
Philadelphia
Phoenix – Prescott
Pittsburgh
Portland Oregon
Quebec City
Raleigh – Durham – Fayetteville
Sacramento – Stockton
Salt Lake City
San Antonio
San Diego
San Francisco – Oakland
Seattle – Tacoma
St. Louis
Tampa – St. Petersburg
Washington D.C.
West Palm Beach
Calgary
Edmonton
Montreal
Ottawa
Toronto
Vancouver
Winnipeg
Resources
Tearsheets
Code and Country Podcast
Events
Webinar Recordings
Blog
Industry Voices
Cybersecurity Reference
About
Team and Board
Meet the Team
Press
Careers
Investors
Contact
Contact us today.
Phone: +1 888 776-9234
Email:
sales@plurilock.com
Cybersecurity Reference
Highlighted Solutions
AI Cybersecurity
Biometric Authentication
Cloud DLP
Cyber Supply Chain Risk Management
Data Security Posture Management
Digital Risk Protection
IAM Modernization
Identity Threat Detection and Response (ITDR)
Passive Authentication
Passwordless
Penetration Testing as a Service (PTaaS)
Public Key Infrastructure (PKI)
Purple Teaming
Social Engineering Testing
User Behavior Analytics (UBA or UEBA)
Highlighted Threats
Advanced Persistent Threat (APT)
AI Data Leaks
Alert Fatigue
Data Exfiltration
Deep Fakes
Ransomware
Remote Access Trojan (RAT)
SEO Poisoning
Highlighted Incidents
Airbus Data Leaks
Atlas VPN Data Breach
Callaway Data Breach
CNA Data Breach
Coffee Meets Bagel Data Breach
Freecycle Data Breach
Latitude Data Breach
Rollbar Data Breach
Targeted Satellite Hacking
University of Sydney Data Breach
US-Canada Water Commission Cyberattack
Topic Deep Dives
Account Takeover (ATO)
Active Directory Federation Services (ADFS)
Advanced Authentication
Advanced Persistent Threat (APT)
Alert Fatigue
Amazon Web Services (AWS)
Artificial Intelligence (AI)
Artificial Neural Networks (ANN)
Attack Surface
Attribution
Behavioral Biometrics
Biometric Authentication
Botnet
Bring Your Own Device (BYOD)
Brute Force Attack (BFA)
CIS Critical Security Controls (CIS CSC)
Continuous Authentication
Credential Sharing
Credential Stuffing
Customer Identity and Access Management (CIAM)
Cybersecurity & Infrastructure Security Agency (CISA)
Data Breach
Data Loss Prevention (DLP)
Denial-of-Service (DoS) Attack
Device-free MFA
Dictionary Attack
Digital Forensics and Incident Response (DFIR)
Distributed Denial of Service (DDoS)
Domain Spoofing
Doxing
Dwell Time
Electronic Health or Medical Records (EHR or EMR)
Electronic Protected Health Information (ePHI or PHI)
Employee Substitution
Endpoint
Endpoint Detection and Response (EDR)
Extended Detection and Response (XDR)
Face ID or Facial Recognition
False Acceptance Rate (FAR)
False Rejection Rate (FRR)
Federal Identity or Identity Federation
Fingerprint Scan
Health Insurance Portability and Accountability Act (HIPAA)
Identity and Access Management (IAM or IdM)
Identity Assurance
Identity Factor
Identity Threat Detection and Response (ITDR)
Inadequate Training
Indicators of Compromise (IoC)
Information Security
Insider Threat
Internet of Things (IoT)
Invisible Authentication
Keystroke Dynamics
Knowledge-Based Authentication (KBA)
Lateral Movement
License Sharing
Machine Learning
Malware
Mean Time to Resolution (MTTR)
Mouse Dynamics
Multi-factor Authentication (MFA)
Outdated Software
Passive Authentication
Password Hygiene
Password Security
Penetration Test (Pen Test)
Phishing
Ransomware
Remote Access Trojan (RAT)
Rubber Ducky Attack
Social Engineering
Spear Phishing
Trojan Horse
Unauthorized Credential Use
User Carelessness
How Do I
How do I reduce the number of passwords my employees have to manage?
How do I stop ChatGPT from learning from my data?
How do I stop my users from sharing company data?
Cybersecurity Glossary / Quick Reference
Plurilock Terms
ADAPT
Adaptive Factor Stack
(AFS)
DEFEND
Endpoint Agent
Enrollment
Identity Score
Impossible Travel
JavaScript Agent
Location Data
Master Profile
Network Context
Plurilock™ Application Programming Interface
(Plurilock API)
Profile
Threshold
Threat and Attack Terms
Account Takeover
(ATO)
Advanced Persistent Threat
(APT)
Botnet
Brute Force Attack
(BFA)
Credential Sharing
Credential Stuffing
Data Breach
Dictionary Attack
Distributed Denial of Service
(DDoS)
Employee Substitution
Insider Threat
Lateral Movement
License Sharing
Phishing
Ransomware
Remote Access Trojan
(RAT)
Rubber Ducky Attack
Social Engineering
Spear Phishing
Trojan Horse
Unauthorized Credential Use
User Carelessness
General Cybersecurity Terms
Alert Fatigue
Attack Surface
Attack Surface
Attribution
Bring Your Own Device
(BYOD)
Customer Identity and Access Management
(CIAM)
Data Loss Prevention
(DLP)
Digital Forensics and Incident Response
(DFIR)
Dwell Time
Endpoint Detection and Response
(EDR)
Extended Detection and Response
(XDR)
False Acceptance Rate
(FAR)
False Rejection Rate
(FRR)
Identity and Access Management
(IAM or IdM)
Identity Assurance
Identity Factor
Identity Threat Detection and Response
(ITDR)
Identity-as-a-signal
In-Band
In-session detection
Indicators of Compromise
(IOC)
Information Security
Invisible Authentication
Kerberos
Knowledge-Based Authentication
(KBA)
Malware
Mean Time to Resolution
(MTTR)
Multi-factor Authentication
Non-repudiation
Out-of-Band
(OOB)
Passive Authentication
Password Complexity
Password Hygiene
Password Manager
Passwordless Authentication
Penetration Test
(Pen Test)
Personally Identifiable Information
(PII)
Point-in-time Detection
(PiTD)
Principle of Least Privilege
(PoLP)
Privileged Access Management
(PAM)
Proof of Presence
(PoP)
Pwned
Remote Desktop Protocol
Risk-based Authentication
Security Information and Event Management
(SIEM)
Shared Secret
Single Sign-on
(SSO)
Tactics, Techniques, and Procedures
(TTP)
Two-factor Authentication
(2FA)
User Behavior Analytics
(UBA or UEBA)
Virtual CISO
(vCISO)
Vulnerability
Woot
Work From Home
(WFH)
Zero Trust
Zombie
Technology Terms
Active Directory Federation Services
(ADFS)
Advanced Authentication
Amazon Web Services
(AWS)
Artificial Intelligence
(AI)
Artificial Neural Networks
(ANN)
Behavioral Biometrics
Biometrics
Continuous Authentication
Device-free MFA
Endpoint
Face ID or Facial Recognition
Federated Identity or Identity Federation
Fingerprint Scan
Identity Signal
Internet of Things
(IoT)
Keystroke Dynamics
Machine Learning
Mouse Dynamics
Retina Scanner or Iris Scanner
Robotic Process Automation
(RPA)
SMS Authentication
Step-up Authentication
User Friction
Virtual Desktop Infrastructure
(VDI)
Virtual Private Network
(VPN)
Compliance Terms
23 NYCRR 500
CIS Critical Security Controls
(CIS CSC)
Dodd-Frank Act
Electronic Health or Medical Records
(EHR or EMR)
Electronic Protected Health Information
(ePHI or PHI)
Family Educational Rights and Privacy Act
(FERPA)
FFIEC Infosec Booklet
FIPS Publication 200
Gramm-Leach-Bliley Act
(GLBA)
Health Information Technology for Economic and Clinical Health Act
(HITECH)
Health Insurance Portability and Accountability Act
(HIPAA)
ISO 27001
National Futures Association Rulebook
(NFA Rulebook)
National Institute of Standards and Technology Publication 800-171
(NIST 800-171)
National Institute of Standards and Technology Publication 800-53
North American Electric Reliability Corporation Critical Infrastructure Protection
(NERC CIP v5)
Payment Card Industry Data Security Standard
(PCI DSS)
Regulatory Compliance
Sarbanes Oxley Act
(SOX Act)
Subscribe to the newsletter for Plurilock and cybersecurity news, articles, and updates.
Name
Email
Acceptance
I state that I opt in to email communication from Plurilock and agree to Plurilock's terms of use and
privacy policy
.
Subscribe
You're on the list! Keep an eye out for news from Plurilock.