Managing anomaly risk
Rathon-AM
Dynamically manage users' authentication levels with risk-based access control to provide a secure work environment.

Risk-based control for secure
web and cloud environments
Rathon Access Management (AM) provides access control to protect a
variety of business systems, both web applications and cloud-based. It
assesses risk factors based on data such as device identification, location,
and user behaviour, and enforces additional authentication if the risk score
exceeds a threshold to secure access to critical systems.
Risk-based management also provides a layered security approach to prevent
unauthorised users from accessing applications and viewing application
access history and blocking anomalies.
Features
Adaptive
authentication and
security
-
Enhanced authentication

- It supports transparent risk analytics and software-based 2FA credentialing, with authentication via a variety of standard integrations, including OAUTH, RADIUS, REST, SAML, and SOAP. It also supports integration with Siteminder, a single sign-on solution.
-
Manage risk

- Increase security efficiency by detecting each risk rule, decision, and consequence, perform real-time risk assessment, and support compliance with government regulations and internal security policies.
-
Audit

- You can view the access history of unauthenticated users, and also view anomaly blocking history.
Architecture
Key features
-
01
Risk assessment and risk
management- Collect data based on device identification, location, and user behaviour when
users access critical applications, and set policies to apply additional
authentication when the risk assessment score exceeds a threshold to enhance
security reliability.
- Collect data based on device identification, location, and user behaviour when
-
02
Support for multiple
standards-based integrations- It supports authentication to standards-based OAUTH, RADIUS, REST, SAML,
and SOAP methods and can integrate with single sign-on (SSO) and other web
access management systems.
- It supports authentication to standards-based OAUTH, RADIUS, REST, SAML,
-
03
Auditability and traceability
- It provides a history of access to critical systems and applications that users have
accessed and provides a history of anomaly detection for user access.
- It provides a history of access to critical systems and applications that users have


