Trusteer
   HOME

TheInfoList



OR:

Trusteer is a
Boston Boston is the capital and most populous city in the Commonwealth (U.S. state), Commonwealth of Massachusetts in the United States. The city serves as the cultural and Financial centre, financial center of New England, a region of the Northeas ...
-based computer security division of
IBM International Business Machines Corporation (using the trademark IBM), nicknamed Big Blue, is an American Multinational corporation, multinational technology company headquartered in Armonk, New York, and present in over 175 countries. It is ...
, responsible for a suite of security software. Founded by Mickey Boodaei and Rakesh K. Loonkar, in
Israel Israel, officially the State of Israel, is a country in West Asia. It Borders of Israel, shares borders with Lebanon to the north, Syria to the north-east, Jordan to the east, Egypt to the south-west, and the Mediterranean Sea to the west. Isr ...
in 2006, Trusteer was acquired in September 2013 by IBM for $1 billion. Trusteer's products aim to block online threats from
malware Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
and
phishing Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Phishing attacks have become increasingly sophisticate ...
attacks and to support regulatory compliance requirements. Trusteer's malware research team aims to analyze information received from the installed base of 30,000,000 user endpoints and hundreds of organizations. Trusteer has a presence in
North America North America is a continent in the Northern Hemisphere, Northern and Western Hemisphere, Western hemispheres. North America is bordered to the north by the Arctic Ocean, to the east by the Atlantic Ocean, to the southeast by South Ameri ...
,
South America South America is a continent entirely in the Western Hemisphere and mostly in the Southern Hemisphere, with a considerably smaller portion in the Northern Hemisphere. It can also be described as the southern Subregion#Americas, subregion o ...
,
Europe Europe is a continent located entirely in the Northern Hemisphere and mostly in the Eastern Hemisphere. It is bordered by the Arctic Ocean to the north, the Atlantic Ocean to the west, the Mediterranean Sea to the south, and Asia to the east ...
,
Africa Africa is the world's second-largest and second-most populous continent after Asia. At about 30.3 million km2 (11.7 million square miles) including adjacent islands, it covers 20% of Earth's land area and 6% of its total surfac ...
,
Japan Japan is an island country in East Asia. Located in the Pacific Ocean off the northeast coast of the Asia, Asian mainland, it is bordered on the west by the Sea of Japan and extends from the Sea of Okhotsk in the north to the East China Sea ...
and
China China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
.


Products

Trusteer's products aim to prevent incidents at the point of attack while investigating their source to mitigate future attacks. In addition, Trusteer allows organizations to receive immediate alerts and to report whenever a new threat is launched against them or their customers.


Trusteer Rapport

Trusteer Rapport is security software advertised as an additional layer of security to anti-virus software. It is designed to protect confidential data, such as account credentials, from being stolen by malicious software (malware) and via phishing. To achieve this goal, the software includes
anti-phishing Phishing is a form of Social engineering (security), social engineering and a scam where attackers deceive people into revealing Information sensitivity, sensitive information or installing malware such as Computer virus, viruses, Computer worm, ...
measures to protect against misdirection and attempts to prevent malicious
screen scraping Data scraping is a technique where a computer program extracts data from human-readable output coming from another program. Description Normally, data transfer between programs is accomplished using data structures suited for automated processin ...
; it attempts to protect users against the following forms of attacks:
man-in-the-browser Man-in-the-browser (MITB, MitB, MIB, MiB), a form of Internet threat related to man-in-the-middle (MITM), is a proxy Trojan horse that infects a web browser by taking advantage of vulnerabilities in browser security to modify web pages, modify t ...
,
man-in-the-middle In cryptography and computer security, a man-in-the-middle (MITM) attack, or on-path attack, is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communi ...
,
session hijacking In computer science, session hijacking, sometimes also known as cookie hijacking, is the exploitation of a valid computer session—sometimes also called a ''session key''—to gain unauthorized access to information or services in a computer s ...
and screen capturing. On installation, Rapport also tries to remove existing financial malware from end-user machines and to prevent future infections. The client is available for multiple platforms in the form of a browser extension. As of March 2020, the Windows version supports
Google Chrome Google Chrome is a web browser developed by Google. It was first released in 2008 for Microsoft Windows, built with free software components from Apple WebKit and Mozilla Firefox. Versions were later released for Linux, macOS, iOS, iPadOS, an ...
,
Microsoft Edge Microsoft Edge is a Proprietary Software, proprietary cross-platform software, cross-platform web browser created by Microsoft and based on the Chromium (web browser), Chromium open-source project, superseding Edge Legacy. In Windows 11, Edge ...
,
Mozilla Firefox Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. It uses the Gecko rendering engine to display web pages, which implements curren ...
, and Microsoft
Internet Explorer Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly abbreviated as IE or MSIE) is a deprecation, retired series of graphical user interface, graphical web browsers developed by Microsoft that were u ...
on Windows 7 and later; while the macOS version supports Google Chrome, Mozilla Firefox, and
Apple Safari Safari is a web browser developed by Apple Inc., Apple. It is built into several of List of Apple operating systems, Apple's operating systems, including macOS, iOS, iPadOS, and visionOS, and uses Apple's open-source software, open-source bro ...
on macOS 10.12 (Sierra) and later. Financial institutions offer the software free of charge with a view to making
online banking Online banking, also known as internet banking, virtual banking, web banking or home banking, is a system that enables customers of a bank or other financial institution to conduct a range of financial transactions through the financial institut ...
safer for customers. Banks which offer the software, or have offered it in the past, include
Bank of America The Bank of America Corporation (Bank of America) (often abbreviated BofA or BoA) is an American multinational investment banking, investment bank and financial services holding company headquartered at the Bank of America Corporate Center in ...
,
Société Générale Société Générale S.A. (), colloquially known in English-speaking countries as SocGen (), is a French multinational universal bank and financial services company founded in 1864. It is registered in downtown Paris and headquartered nearby i ...
,
Tangerine The tangerine is a type of citrus fruit that is orange in colour, that is considered either a variety of the mandarin orange (''Citrus reticulata''), or a closely related species, under the name ''Citrus tangerina'', or yet as a hybrid (''Citr ...
,
INGDirect ING Group N.V. () is a Dutch multinational banking and financial services corporation headquartered in Amsterdam. Its primary businesses are retail banking, direct banking, commercial banking, investment banking, wholesale banking, private ban ...
,
HSBC HSBC Holdings plc ( zh, t_hk=滙豐; initialism from its founding member The Hongkong and Shanghai Banking Corporation) is a British universal bank and financial services group headquartered in London, England, with historical and business li ...
,
CIBC The Canadian Imperial Bank of Commerce (CIBC; ) is a Canadian Multinational corporation, multinational banking and financial services corporation headquartered at CIBC Square in the Financial District, Toronto, Financial District of Toronto, Ont ...
, BMO,
Guaranty Trust Bank Guaranty Trust Holding Company PLC also known as GTCO PLC is a multinational financial services group, that offers retail and investment banking, pension management, asset management and payments services, headquartered in Victoria Island, Lago ...
(GTBank),
Ecobank Ecobank, whose official name is Ecobank Transnational Inc. (ETI), is a pan-African banking conglomerate, with banking operations in 33 African countries. It is the leading independent regional banking group in West Africa and Central Africa, ...
Davivienda Davivienda is a Colombian bank founded on August 1, 1972, which renders services to individuals, companies, and the rural sector. Currently, it is part of Grupo Bolivar and it is the third-largest bank in Colombia by assets and profits. Davivie ...
and
First Republic Bank First Republic Bank was a commercial bank and provider of wealth management services headquartered in San Francisco, California, United States. It catered to high-net-worth individuals and operated 93 offices in 11 states, primarily in New Yor ...
. Some banks which had offered the software discontinued offering it. For instance,
NatWest National Westminster Bank, trading as NatWest, is a major Retail banking, retail and commercial bank in the United Kingdom based in London, England. It was established in 1968 by the Corporate merger, merger of National Provincial Bank and We ...
and
RBS RBS may refer to: Arts and media * Grupo RBS, Brazilian media group ** RBS TV * Republic Broadcasting System (RBS TV), now GMA Network, owned by GMA Network Inc., Philippines * RBS TV (Latvia), a defunct Latvian television station * ''Red Band ...
withdrew use in January 2019, stating that "The security and fraud prevention technologies we now use provide you a higher and far broader level of protection."


Trusteer Pinpoint

Trusteer Pinpoint is a web-based service that allows financial institutions to detect and mitigate malware, phishing and account takeover attacks without installing any software on endpoint devices. It allows companies concerned about online fraud or data theft to scan their Web traffic to ensure that an outside laptop or desktop that is brought into a corporate network is not infected with malware before allowing the visitor access to their Web services. Trusteer Pinpoint combines device fingerprinting, proxy detection and malware infection detection. When a user infected with malware accesses an online banking site protected by Trusteer Pinpoint Malware Detection, it identifies the infection and malware type (e.g. “User Steve is infected with Prinimalka-Gozi”), alerts the bank and flags the user's credentials as compromised. Once notified, banks can immediately contact the end user to have them install Trusteer Rapport which will remove the malware. Trusteer Pinpoint Account Takeover Detection also fingerprints the device and checks for the use of proxies.


Trusteer Mobile Fraud Risk Prevention

Mobile Risk Engine aims to protect organizations against mobile and PC-to-mobile (cross-channel) attacks. The product tries to detect and stops account takeover from mobile devices by identifying criminal access attempts. It also tries to identify devices that are vulnerable to compromise by malware and those that have been infected. Trusteer Mobile Risk Engine is a web-based service that includes the Trusteer Mobile SDK, Trusteer Mobile App, Trusteer Mobile Out-of-Band Authentication, and Mobile Risk API. The combination of Mobile Risk Engine and its client-side components provides device fingerprinting for mobile devices, account takeover prevention from mobile devices, detection of compromised mobile devices, and access to a global fraudster database.


Trusteer Apex

Trusteer Apex is an automated solution that tries to prevent exploits and malware from compromising the endpoints and extracting information. Apex has three layers of security: exploit prevention, data exfiltration prevention and credentials protection. Apex protects employee credentials from phishing attacks by validating that employees are submitting their credentials only to authorized enterprise web-application login URLs. Apex also prevents corporate employees from re-using their corporate credentials to access non-corporate, public applications like PayPal, eBay, Facebook or Twitter. Apex requires users to provide different credentials for such applications, to lower the risk of credentials exposure. Trusteer Apex is targeted at the behaviors of a small group of applications, on the hypothesis that they are responsible for the overwhelming majority of exploits, namely Java, Adobe's Reader and Flash, and Microsoft Office. The technology behind Trusteer Apex does not rely on threat signatures, or on so-called "whitelists" of good applications. Instead, it watches applications as they run and spots suspicious or malicious behavior, based on knowledge of "normal" application behavior that it has refined from its large user base. Trusteer claims Apex can block both web-based attacks that are used to implant malware by exploiting vulnerable applications, and data loss due to malware infections by spotting attempts by untrusted applications or processes to send data outside an organization or connect with Internet-based command and control (C&C) networks.


Technical concerns

End users have reported problems with Rapport, slow PCs due to high
CPU A central processing unit (CPU), also called a central processor, main processor, or just processor, is the primary processor in a given computer. Its electronic circuitry executes instructions of a computer program, such as arithmetic, log ...
and RAM utilization, incompatibility with various security/antivirus products and difficulty in removing the software.Davey Winder
Is HSBC's security software more trouble than it's worth?
''PC Pro'' magazine, 20 Jul 2010
The consumer organisation ''
Which? ''Which?'' is a United Kingdom brand name that promotes informed consumer choice in the purchase of goods and services by testing products, highlighting inferior products or services, raising awareness of consumer rights, and offering indepen ...
'' found that many members had problems due to running Trusteer Rapport, and advised against using it. They found that it could conflict with other security software, and slow or crash the Web browser. ''Which?'' emphasises that it is the bank's responsibility, not Rapport's, to protect customers' online banking, adding that online banking can be perfectly safe without Trusteer Rapport; its only benefit would be detecting a phishing site masquerading as the bank—"but plenty of other tools, including most modern browsers, can do this anyway". They clarify that the software is legitimate and respectable, but "don't feel the claims on Rapport's website add up". In a presentation given at 44con in September 2011, bypassing Trusteer Rapport's keylogger protection was shown to be relatively trivial. Shortly thereafter Trusteer confirmed that the flaw was corrected and said that even if a hacker were able to use the flaw to disable anti-keylogging functions in Rapport, other secondary security protection technologies would still be in play. Rapport software is incompatible with
Windows Windows is a Product lining, product line of Proprietary software, proprietary graphical user interface, graphical operating systems developed and marketed by Microsoft. It is grouped into families and subfamilies that cater to particular sec ...
tool Driver Verifier and may cause Blue Screen and system crash.


Blue Gem lawsuit

In March 2011, Blue Gem, a rival company, filed a lawsuit against Trusteer in a California court.Trusteer has described the accusations as "baseless".BlueGem lawsuit detail


See also

*
trustee (disambiguation) A trustee is a legal term for a holder of property on behalf of a beneficiary. Trustee or trusty may also refer to: Stewardship * Board of trustees, a group of people who jointly supervise the activities of an organization ** Trustee-in-trust ...


References


External links

*
Frost and Sullivan Report

Reuters article

BBC article
{{IBM Computer security companies Companies based in Boston Computer security software companies IBM subsidiaries IBM acquisitions 2006 establishments in Israel