On the hunt for a CAC replacement
“For more than 10 years, the Common Access Card has been DOD’s standard identity credential, and the often-maligned card is not going away anytime soon. But Defense officials are making headway on identity management tools that can eventually replace the CAC.”
Army NETCOM to Implement Plurilock Authentication Software
“Plurilock also provide its platform to the Defense Innovation Unit Experimental organization for evaluation as a potential replacement to Common Access Cards.”
U.S. Army NETCOM to Deploy Plurilock BioTracker—the First Continuous Identity Authentication for Enhanced Cybersecurity
“BioTracker’s patented AI and behavioral biometrics technology is the only one of its kind that identifies authorized individuals based on their unique usage patterns on laptops, desktops and servers.”
U.S. Army to Protect Warfighters With Continuous Biometric Authentication
“Rather than having to wait for and triage a large number of network anomalies, the analysts know within seconds that it has occurred, and exactly where it occurred. Containment can be effected within minutes of the intrusion.”
Pentagon Expanding Behavioral Biometrics With Keystroke Tracker
“The NETCOM contract intends to install Biotracker on networks used by everyday employees, some of whom are warfighters or supporting warfighters, to prevent insider threats. The combat support agency is evaluating Plurilock specifically as a potential replacement to the Common Access Card.”
Pentagon now testing behavioral ID pilot that would replace CAC card
“It is really hard to issue a CAC card when people are dropping mortar shells on you and you need to get into your system. It just doesn’t work.”
Ex US Defense CIO: Spend cyber budget on people before tech
“By improving its cyber hygiene by even a small degree a company can make itself less vulnerable to attack as competitors become an easier target.”
US Army Will Implement Keystroke-Tracking Biometrics Authentication System
“Until now, the DOD has used classic access cards to let employees into facilities and access secure computer systems. These cards are known as CACs (Common Access Cards) and have caused some discomfort over the years as they were hard to replace in a timely fashion.”
DIACC: Spotlight on Plurilock
“As the threat landscape heats up, businesses and governments need solutions that can stay ahead of the attackers, and the ability to provide continuous, trustworthy identity assurance is critical in doing so.”
AMT-USC LLC now an authorized reseller in partnership with Plurilock
“Unlike traditional multifactor and CAC-based authentication, which provide only a single-point-in-time identity validation, Plurilock’s proof-of-presence software continuously authenticates users.”
iCyberCenter to help startups get a foothold in Maryland
“Plurilock, which develops proprietary software to analyze computer users’ behavior to identify intruders, sells to business and government clients, including the Department of Defense. Leaders of the iCyberCenter, as it is being branded, are hoping to draw to more companies like it to southwest Baltimore County.”
Plurilock’s AI Authentication Tech Enlists in the Army
“Although a growing number of technology startups using AI to reveal network threats and detect cyberattacks, the Canadian company’s approach to security is singular.”
US Army supplements passwords with behavioral biometrics
“The US army’s investment in the technology shows high confidence and promise in the evolution from binary point-in-time authentication to continuous probability.”
DoD Partners with Plurilock to Prevent Cybersecurity Threats
“Plurilock’s system builds user profiles, detects malicious behavior and stops intruders in real-time, securing the enterprise and solving key compliance challenges. There is no configuration of rules or reliance on signatures for the system to operate.”
DIUx taps Plurilock for AI authentication
“DIUx, which identifies emerging commercial technologies and speeds their adoption by DOD, is evaluating Plurilock’s technology as part of its effort to overhaul current authentication methods that rely on passwords and the common access card and build an integrated family of authenticators.”
Victoria Cyber Security Startup Plurilock Attracting Global Attention
“Plurilock’s digital profiling technologies are clearly among the most powerful cyber tools in the world today.”
Victoria’s Plurilock can identify a bad actor within a few keystrokes
“The system is blind to content. It doesn’t care what you say or buy, only how you use technology to say or buy it, based on the timing and cadence of keystrokes, how you parse words and subtleties affected by the weight of your swipes and even the length of your fingers.”