Contact
QR code for the current URL

Story Box-ID: 618241

IBM Deutschland GmbH Schönaicher Str. 220 71032 Böblingen, Germany http://www.de.ibm.com
Contact Mr Tod Freeman +1 415-320-5893

IBM to Acquire Trusteer to Help Companies Combat Financial Fraud and Advanced Security Threats

(PresseBox) (Armonk, N.Y., )
New IBM Cybersecurity Software Lab in Israel will focus on mobile and application security, counter-fraud and malware detection http://www-03.ibm.com/...

IBM (NYSE: IBM) today announced a definitive agreement to acquire Trusteer, a leading provider of software that helps protect organizations against financial fraud and advanced security threats. The acquisition of Trusteer advances the investment IBM is making in cloud-delivered software and services. Financial terms were not disclosed.

As part of this announcement, IBM is forming a cybersecurity software lab in Israel that will bring together more than 200 Trusteer and IBM researchers and developers to focus on mobile and application security, advanced threat, malware, counter-fraud, and financial crimes. This lab is an addition to IBM's existing research and development facilities in Israel.

With offices located in Boston and Tel Aviv, Israel, Trusteer helps hundreds of organizations including many financial institutions protect Web applications, employee and customer computers, and mobile devices from threats. Cybercriminals are becoming increasingly efficient in creating and deploying attacks to bypass existing security controls.

Trusteer software can identify security threats that can be missed by traditional security software. For example, to help ensure that banking customers can safely transfer money on a mobile device, Trusteer software performs detection of malware that can infect a smartphone, enabling the bank to take steps to prevent fraudulent behavior and account takeover before the transaction occurs. Seven of the top 10 U.S. banks and nine of the top 10 U.K. banks use Trusteer's solutions to help secure customer accounts against financial fraud and cyber attacks.

"Trusteer's expertise and superior technology in enterprise endpoint defense and advanced malware prevention will help our clients across all industries address the constantly evolving threats they are facing," said Brendan Hannigan, General Manager, Security Systems Division, IBM. "Together with IBM's capabilities in advanced threat detection, analysis and remediation, we will now be able to offer our clients several additional layers of defense against sophisticated attackers."

"The way organizations protect data is quickly evolving," said Mickey Boodaei, CEO, Trusteer. "As attacks become more sophisticated, traditional approaches to securing enterprise and mobile data are no longer valid. Trusteer has helped hundreds of large banks and organizations around the world defeat thousands of sophisticated attacks using innovative solutions that combine intelligence, cloud, mobile, and desktop technologies."

Among the capabilities Trusteer will bring to the IBM security portfolio:

Security as a Service Delivered through the Cloud

Cloud-delivered security solutions by Trusteer will complement more than 100 Software as a Service (SaaS) solutions offered by IBM.  In addition to traditional IT solutions, Trusteer leverages SaaS architecture to enable protected PCs, desktops, smartphones and tablets to rapidly adapt against emerging threats. Because Trusteer software can be delivered through the cloud, organizations can receive accurate, real-time updates on malicious activities and the latest threats, better protecting data from fraud and compromise.

Comprehensive Counter-Fraud and Advanced Persistent Threat (APT) Protection

Trusteer's cybersecurity protection can scale to help protect tens of millions of endpoints, including smartphones and tablets. One of the primary targets of malware attacks are consumer endpoints. Malware installed on a bank customer's PC or smartphone, for example, can generate fraudulent transactions. Additionally, malware and phishing can help attackers steal credentials and other personal data. Financial malware and fraudulent activity can be identified and removed using solutions from Trusteer.

The acquisition of Trusteer will complement IBM's advanced portfolio of counter- fraud software and services, including QRadar, i2, SPSS, InfoSphere and Enterprise Content Management. These capabilities offer predictive, content and investigative analytics to help prevent and solve cases of fraud for private and public sector organizations.

Helping to Secure Mobile Transactions

Of the top 25 US financial institutions, about half are offering mobile person-to-person transfers and mobile remote deposit capabilities, a figure that has more than doubled since 2011. This steady increase in adoption is putting the mobile channel in the crosshairs of account takeover attacks that are launched using credentials stolen from customers via phishing and malware attacks. Trusteer can help provide account takeover prevention, compromised device detection, complex device fingerprinting and a global fraudster database.

Cybersecurity Software Lab

IBM is also announcing that it will combine its Israeli software security research and development team along with Trusteer's research and development team in Tel Aviv to form an IBM Cybersecurity Software Lab.

This lab will focus on mobile and application security, as well as advanced fraud and malware detection. Trusteer's research and global expertise in fraud intelligence and malware helps provide organizations with protection in a constantly evolving threat landscape. This is done by analyzing data gathered from more than 30 million endpoints, using data analytics to develop real-time, actionable intelligence that will be incorporated into IBM's security products and services.

About IBM Security

IBM provides the security intelligence to help organizations protect their people, data, applications and infrastructure. IBM operates one of the world's broadest security research and development organizations. IBM manages and monitors 15 billion security events every day for nearly 4,000 clients around the world and holds more than 3,000 security patents.

For more information on IBM security, please visit: www.ibm.com/security.To listen to a podcast by IBM and Trusteer's leadership discussing today's announcement, please visit http://securityintelligence.com/...

About Trusteer

Trusteer is a leading provider of endpoint cybercrime prevention solutions that help protect organizations against financial losses and data breaches.

Hundreds of organizations and millions of end users rely on Trusteer to protect managed and unmanaged endpoints against exploitation and compromise by online threats often invisible to legacy security solutions. Trusteer was founded in 2006 by Mickey Boodaei, Rakesh Loonkar, Amit Klein, Shmulik Regev, and Eldan Ben-Haim and is backed by U.S. Venture Partners and Shlomo Kramer.

Website Promotion

Website Promotion
The publisher indicated in each case (see company info by clicking on image/title or company info in the right-hand column) is solely responsible for the stories above, the event or job offer shown and for the image and audio material displayed. As a rule, the publisher is also the author of the texts and the attached image, audio and information material. The use of information published here is generally free of charge for personal information and editorial processing. Please clarify any copyright issues with the stated publisher before further use. In case of publication, please send a specimen copy to service@pressebox.de.
Important note:

Systematic data storage as well as the use of even parts of this database are only permitted with the written consent of unn | UNITED NEWS NETWORK GmbH.

unn | UNITED NEWS NETWORK GmbH 2002–2024, All rights reserved

The publisher indicated in each case (see company info by clicking on image/title or company info in the right-hand column) is solely responsible for the stories above, the event or job offer shown and for the image and audio material displayed. As a rule, the publisher is also the author of the texts and the attached image, audio and information material. The use of information published here is generally free of charge for personal information and editorial processing. Please clarify any copyright issues with the stated publisher before further use. In case of publication, please send a specimen copy to service@pressebox.de.