Saturday, March 28, 2015
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Intel in Talks to buy Altera: report
MediaTek Releases New High-end Smartphone Helio SoC
Google To Get Into The Operating Room
Data Requests To Microsoft Decreased
Google Defeated in English Court - Decision Opens Door for Litigation by Millions of British Apple Users
LG G4 Smartphone Coming Late April
BlackBerry Posts Quarterly Profit
AMD Showcases DirectX 12 Performance in new 3DMark API Overhead Feature Test
Active Discussions
how to copy and move data files to dvd-rw
cdrw trouble
Need serious help!!!!
burning
nvidia 6200 review
Hello
Burning Multimedia in track 0
I'm lazy. Please help.
 Home > News > General Computing > IBM to ...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, August 15, 2013
IBM to Acquire Trusteer, Establishes Cybersecurity Software Lab


IBM today announced a definitive agreement to acquire Trusteer, a provider of software that helps protect organizations against financial fraud and advanced security threats. The acquisition of Trusteer advances the investment IBM is making in cloud-delivered software and services.

Financial terms were not disclosed.

IBM is also forming a cybersecurity software lab in Israel that will bring together more than 200 Trusteer and IBM researchers and developers to focus on mobile and application security, advanced threat, malware, counter-fraud, and financial crimes. This lab is an addition to IBM's existing research and development facilities in Israel.

With offices located in Boston and Tel Aviv, Israel, Trusteer helps hundreds of organizations including many financial institutions protect Web applications, employee and customer computers, and mobile devices from threats. Cybercriminals are becoming increasingly efficient in creating and deploying attacks to bypass existing security controls.

Trusteer software can identify security threats that can be missed by traditional security software. For example, to help ensure that banking customers can safely transfer money on a mobile device, Trusteer software performs detection of malware that can infect a smartphone, enabling the bank to take steps to prevent fraudulent behavior and account takeover before the transaction occurs.

Among the capabilities Trusteer will bring to the IBM security portfolio:

Cloud-delivered security solutions by Trusteer will complement more than 100 Software as a Service (SaaS) solutions offered by IBM. In addition to traditional IT solutions, Trusteer leverages SaaS architecture to enable protected PCs, desktops, smartphones and tablets to rapidly adapt against emerging threats. Because Trusteer software can be delivered through the cloud, organizations can receive real-time updates on malicious activities and the latest threats.

Trusteer's cybersecurity protection can scale to help protect tens of millions of endpoints, including smartphones and tablets. One of the primary targets of malware attacks are consumer endpoints. Malware installed on a bank customer's PC or smartphone, for example, can generate fraudulent transactions. Additionally, malware and phishing can help attackers steal credentials and other personal data. Financial malware and fraudulent activity can be identified and removed using solutions from Trusteer.

The acquisition of Trusteer will complement IBM's advanced portfolio of counter- fraud software and services, including QRadar, i2, SPSS, InfoSphere and Enterprise Content Management.


Previous
Next
Ask Google For Your Flights, Reservations, Package Delivery Info        All News        Windows 8.1 Begins Rolling Out Oct. 18
Ask Google For Your Flights, Reservations, Package Delivery Info     General Computing News      Windows 8.1 Begins Rolling Out Oct. 18

Get RSS feed Easy Print E-Mail this Message

Related News
IBM Delivers Cloud Data Services with Twitter Built-In
IBM Buys AlchemyAPI
IBM Unveils New Storage Solutions Based on Micron's Flash
IBM BigInsights Introduces Machine Learning With R
IBM Says Popular Dating Apps Are Vulnerable to Hackers
Cloud Cryptographic Algorithm Protects Personal Data
IBM Posts Fourth-quarter Results
IBM Launches Powerful z13 Mainframe
IBM Retains U.S. Patent Record in 2014
Intel, IBM Follow Different Strategies On 14nm FinFET
Apple and IBM Bring Big Data Analytics and Security Capabilities on iPhone And iPad
Mobile Shopping Dominated During Thanksgiving And Black Friday

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2015 - All rights reserved -
Privacy policy - Contact Us .