2.2 Key Features of OARM

OARM revolves around user activities, which are secured using business friendly rules.

Key differentiating features of OARM include:
  • Risk Evaluation: Administrators can seamlessly create, edit, and delete security rules in the user-friendly administration console. You can create both access and transaction-based rules from the library of conditions available. The combination of configurable rules, real-time behavioral profiling, and predictive analysis makes OARM a unique offering. It provides a new level of intelligence especially with seeding of data feeds from external sources.
  • Auto-Learning Technology: OARM leverages a unique mix of real-time and predictive auto-learning technology to profile behaviors and detect anomalies. This enables OARM to recognize high-risk activities and proactively take actions to help prevent fraud and misuse. In addition, the auto-learning capability of OARM allows to constantly evaluate and learn what constitutes typical behavior for both individual users and users as a whole in real time. These techniques enable the system to fully harness both the human talent in your organization and multiple forms of machine learning to combat fraud and misuse.
  • Device Fingerprinting: OARM offers proprietary, clientless technologies, and an extensible client integration framework for device fingerprinting. Device information is tracked and profiled to detect elevated levels of risk. The fingerprinting process can be run multiple times within a user session, allowing the detection of mid-session changes that may indicate session hijacking.
  • Multi-Factor Challenge Methods: OARM in conjunction with OAA offers a comprehensive set of modern multi-factor challenge methods, empowering administrators to effortlessly select the challenge mechanisms that best fits with their business needs.
  • Customizable Rules: OARM is shipped with an out-of-the-box User Authentication activity, which is baked with a rich set of rules that can be readily deployed to enhance business security. The system also provides the flexibility to Administrators to augment the User Authentication activity by adding new rules, removing rules not applicable to business, or adding new user activities for monitoring. Additionally, OARM supports seeding data feeds with certified external sources that can be used in risk analytics. This, when combined with OARM's profiling capabilities, the integration ensures the right mix of seed data for running analytics. The configuration of rules and the management and monitoring of user activities are achieved with an intuitively designed Administration Console. The console allows Administrators to implement rules tailored to their organization without being concerned about the nuances of the underlying system.