03:00 PM
Dark Reading
Dark Reading
Products and Releases

Plurilock Surpasses $1M Revenue, Launches SaaS Products for Behavioral-Biometric Security

VICTORIA, British Columbia, Aug. 23, 2018 /PRNewswire/ -- Plurilock Security Solutions ("Plurilock"), provider of behavioral-biometric cybersecurity tools, today announced a new SaaS version of its cybersecurity suite. The company also announced added dedicated product for user behavior analytics (UBA) use cases, noting that high demand has enabled it to surpass $1 million in revenue in just 12 months.

Plurilock's new UBA offering complements its existing endpoint detection and response (EDR) technology, while the new SaaS-based products bring patented capabilities from its on-premise BioTracker product into the cloud. Plurilock will use these to serve government, finance, and other regulated industries facing ever-more sophisticated threats.

The new products include Plurilock Aware, which provides real-time endpoint visibility and human telemetry for UBA, and Plurilock Defend, which provides continuous, invisible EDR to defend against identity threats.

Aware integrates seamlessly with existing systems and monitors users' behavior to identify anomalies and provide identity risk scores for logging, attribution, or action. Defend provides what is presently the only continuous, invisible EDR solution for workplace identity threats, reducing response and remediation times from weeks or months to seconds.

"Governments and businesses are recognizing the need to go beyond single-point-in-time user validation to a real-time approach that continuously assures users' identities," said Plurilock CEO Ian Paterson. "We've refined our product offering to give customers the deployment flexibility that they need to meet a variety of requirements."

Plurilock's product suite uses behavioral biometrics and artificial intelligence to provide continuous, rather than login-based, authentication. This enables organizations to thwart insider threats, privileged access elevations, misused credentials, and other key vulnerabilities faster and more effectively than has previously been possible.

Like BioTracker, Plurilock Aware and Defend identify users as they work using unique patterns in their keystrokes and mouse movements. Identities and privileges are transparently validated in real-time, avoiding the interruptions that login-based authentication causes.

Plurilock's products can now be deployed silently and remotely either on-premise or via SaaS and can be configured to be entirely invisible to end-users. SaaS deployments can be on public or private clouds as required by customers.

Revenue Growth Drives Leadership Team Expansion

Fueled by $3 million in recent investment and rapid adoption, Plurilock has quickly reached the revenue million mark with an aggressive go-to-market strategy. To meet this demand, the company has added three new executives to spearhead momentum.

New Chief Financial Officer Roland Sartorius brings over 25 years of senior experience as former CFO of a Swiss private equity firm, an eight-year veteran of KPMG's Corporate Finance and Assurance division, and former CFO at Carmanah Technologies Corp and InfoSat Communications.

New Vice President of Worldwide Sales Darryl Athans brings over 20 years of senior experience as former director of global OEM sales at McAfee, having previously worked at CA Technologies acquisition Xceedium, Inc., at Credant Technologies, a Dell company, and at Verizon Business.

New Vice President of Engineering Jord Tanner brings over 25 years of experience in hardware and software development as a former key figure at Terapeak, where he scaled an award-winning SaaS analytics solution to hundreds of thousands of accounts before the company's 2017 acquisition by eBay.

"Our new team members bring expertise that will help us continue to improve our customer and end-user experiences," said Paterson. "Together with our global partners, ongoing product development, and revenue growth, we've built the momentum needed to accelerate our worldwide market expansion."

To learn more about Plurilock's behavioral biometrics security solutions, visit www.plurilock.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-02-17
The GloBee plugin before 1.1.2 for WooCommerce mishandles IPN messages.
PUBLISHED: 2019-02-17
HongCMS 3.0.0 allows arbitrary file read and write operations via a ../ in the filename parameter to the admin/index.php/language/edit URI.
PUBLISHED: 2019-02-17
OneFileCMS 3.6.13 allows remote attackers to modify onefilecms.php by clicking the Copy button twice.
PUBLISHED: 2019-02-17
Zabbix before 2.2.21rc1, 3.x before 3.0.13rc1, 3.1.x and 3.2.x before 3.2.10rc1, and 3.3.x and 3.4.x before 3.4.4rc1 allows open redirect via the request parameter.
PUBLISHED: 2019-02-17
Hotels_Server through 2018-11-05 has SQL Injection via the API because the controller/api/login.php telephone parameter is mishandled.