메인메뉴 바로가기 본문내용 바로가기

Managing anomaly risk

Rathon-AM

Dynamically manage users' authentication levels with risk-based access control to provide a secure work environment.

Risk-based control for secure
web and cloud environments

Rathon Access Management (AM) provides access control to protect a
variety of business systems, both web applications and cloud-based. It
assesses risk factors based on data such as device identification, location,
and user behaviour, and enforces additional authentication if the risk score
exceeds a threshold to secure access to critical systems.

Risk-based management also provides a layered security approach to prevent
unauthorised users from accessing applications and viewing application
access history and blocking anomalies.

Anomaly Risk Management

Features

Adaptive
authentication and
security

Enhanced authentication

It supports transparent risk analytics and software-based 2FA credentialing, with authentication via a variety of standard integrations, including OAUTH, RADIUS, REST, SAML, and SOAP. It also supports integration with Siteminder, a single sign-on solution.

Manage risk

Increase security efficiency by detecting each risk rule, decision, and consequence, perform real-time risk assessment, and support compliance with government regulations and internal security policies.

Audit

You can view the access history of unauthenticated users, and also view anomaly blocking history.

Architecture

Key features

  • 01

    Risk assessment and risk
    management

    • Collect data based on device identification, location, and user behaviour when
      users access critical applications, and set policies to apply additional
      authentication when the risk assessment score exceeds a threshold to enhance
      security reliability.
  • 02

    Support for multiple
    standards-based integrations

    • It supports authentication to standards-based OAUTH, RADIUS, REST, SAML,
      and SOAP methods and can integrate with single sign-on (SSO) and other web
      access management systems.
  • 03

    Auditability and traceability

    • It provides a history of access to critical systems and applications that users have
      accessed and provides a history of anomaly detection for user access.

Business Impact

Defending against anomaly risk

  • Support for a variety of authentication credentials and flows with risk analysis and management, and tiered authentication methods based on risk level

Comply with government regulations and internal security policies

  • Control and block access based on device identification, location, and user behaviour to assess the risk of access outside of designated locations and designated equipment

Reduce the impact of data
breaches and account takeover

  • Reduce account compromise and data breaches because passwords aren't stored on users' devices or systems

Secure Your Business
with Next-Gen IAM

From corporate account and privilege management to SSO/MFA authentication, build a secure and efficient security environment with Rathontech.

Get started