I'm reviewing the feature set of Shiro and OpenAM right now. I know OpenAM has a suspicious activity detection feature but I'm having trouble figuring out if Shiro provides a similar feature.
Aside from that, it looks like most of the high-level features are the same, with differentiators being in how things are done. If there are any other important differentiators anyone is aware of that information would also be appreciated, but if you only have an answer for my initial question that's perfectly fine. Thanks in advance. -- View this message in context: http://shiro-user.582556.n2.nabble.com/Does-Shiro-provide-suspicious-activity-detection-threat-detection-tp7580510.html Sent from the Shiro User mailing list archive at Nabble.com.
