Breaking News

Samsung Galaxy S25 Edge Features New Corning Gorilla Glass Ceramic 2 for Enhanced Durability Razer announces Clio Chair Accessory for Audio Immersion Razer Unveils Ergonomic Gaming Mouse and Keyboard for Gaming on the Go Noctua releases NH-D15 G2 specific offset LGA1851 mounting bars for improved cooling performance ADATA Launches T7 and T5 Enterprise SSD Series

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

IBM to Acquire Trusteer, Establishes Cybersecurity Software Lab

IBM to Acquire Trusteer, Establishes Cybersecurity Software Lab

Enterprise & IT Aug 15,2013 0

IBM today announced a definitive agreement to acquire Trusteer, a provider of software that helps protect organizations against financial fraud and advanced security threats. The acquisition of Trusteer advances the investment IBM is making in cloud-delivered software and services. Financial terms were not disclosed.

IBM is also forming a cybersecurity software lab in Israel that will bring together more than 200 Trusteer and IBM researchers and developers to focus on mobile and application security, advanced threat, malware, counter-fraud, and financial crimes. This lab is an addition to IBM's existing research and development facilities in Israel.

With offices located in Boston and Tel Aviv, Israel, Trusteer helps hundreds of organizations including many financial institutions protect Web applications, employee and customer computers, and mobile devices from threats. Cybercriminals are becoming increasingly efficient in creating and deploying attacks to bypass existing security controls.

Trusteer software can identify security threats that can be missed by traditional security software. For example, to help ensure that banking customers can safely transfer money on a mobile device, Trusteer software performs detection of malware that can infect a smartphone, enabling the bank to take steps to prevent fraudulent behavior and account takeover before the transaction occurs.

Among the capabilities Trusteer will bring to the IBM security portfolio:

Cloud-delivered security solutions by Trusteer will complement more than 100 Software as a Service (SaaS) solutions offered by IBM. In addition to traditional IT solutions, Trusteer leverages SaaS architecture to enable protected PCs, desktops, smartphones and tablets to rapidly adapt against emerging threats. Because Trusteer software can be delivered through the cloud, organizations can receive real-time updates on malicious activities and the latest threats.

Trusteer's cybersecurity protection can scale to help protect tens of millions of endpoints, including smartphones and tablets. One of the primary targets of malware attacks are consumer endpoints. Malware installed on a bank customer's PC or smartphone, for example, can generate fraudulent transactions. Additionally, malware and phishing can help attackers steal credentials and other personal data. Financial malware and fraudulent activity can be identified and removed using solutions from Trusteer.

The acquisition of Trusteer will complement IBM's advanced portfolio of counter- fraud software and services, including QRadar, i2, SPSS, InfoSphere and Enterprise Content Management.

Tags: IBM
Previous Post
Ask Google For Your Flights, Reservations, Package Delivery Info
Next Post
Windows 8.1 Begins Rolling Out Oct. 18

Related Posts

  • IBM Unveils watsonx Generative AI Capabilities to Accelerate Mainframe Application Modernization

  • New magnetic tape prototype breaks data density and capacity records

  • IBM Expands the Computational Power of its IBM Cloud-Accessible Quantum Computers

  • Researchers Use Analog AI hardware to Support Deep Learning Inference Without Great Accuracy

  • Server Market Posts a Record First Quarter on Strong Cloud-service Demand

  • IBM Wants to Change IT Operations With Watson AIOps, Releses Edge Computing Solutions for 5G Deployments 5G era

  • IBM Reports Continued Cloud Revenue Growth, Withdraws Annual Forecast

  • COVID-19 High Performance Computing Consortium Launched

Latest News

Samsung Galaxy S25 Edge Features New Corning Gorilla Glass Ceramic 2 for Enhanced Durability
Smartphones

Samsung Galaxy S25 Edge Features New Corning Gorilla Glass Ceramic 2 for Enhanced Durability

Razer announces Clio Chair Accessory for Audio Immersion
Consumer Electronics

Razer announces Clio Chair Accessory for Audio Immersion

Razer Unveils Ergonomic Gaming Mouse and Keyboard for Gaming on the Go
PC components

Razer Unveils Ergonomic Gaming Mouse and Keyboard for Gaming on the Go

Noctua releases NH-D15 G2 specific offset LGA1851 mounting bars for improved cooling performance
Cooling Systems

Noctua releases NH-D15 G2 specific offset LGA1851 mounting bars for improved cooling performance

ADATA Launches T7 and T5 Enterprise SSD Series
Enterprise & IT

ADATA Launches T7 and T5 Enterprise SSD Series

Popular Reviews

be quiet! Light Loop 360mm

be quiet! Light Loop 360mm

be quiet! Dark Rock 5

be quiet! Dark Rock 5

G.skill Trident Z5 Neo RGB DDR5-6000 64GB CL30

G.skill Trident Z5 Neo RGB DDR5-6000 64GB CL30

Arctic Liquid Freezer III 420 - 360

Arctic Liquid Freezer III 420 - 360

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Crucial Pro OC 32GB DDR5-6000 CL36 White

Crucial Pro OC 32GB DDR5-6000 CL36 White

Crucial T705 2TB NVME White

Crucial T705 2TB NVME White

be quiet! Light Base 600 LX

be quiet! Light Base 600 LX

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed