Sunday, April 19, 2015
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Memory-Tech Promises Improved Audio CD Quality With New UHQCD Technology
Sony's 4K Ultra HD TV Lineup Coming In The U.S.
Moore's Law And The Software Industry
Adobe And Windows Zero-Day Exploits Likely Leveraged by Russians In Highly-Targeted Attack
Samsung Logo Removed From Japanese Smartphones
Google Is Getting Serious With Project Loon
New Technology Can Track Detailed Hand Motion
Office Universal apps Coming Next Month On Windows 10 for Phones
Active Discussions
Help make DVDInfoPro better with dvdinfomantis!!!
Question about nero
Copied dvd's say blank in computer only
menu making
Optiarc AD-7260S review
cdrw trouble
Need serious help!!!!
burning
 Home > News > General Computing > IBM to ...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, August 15, 2013
IBM to Acquire Trusteer, Establishes Cybersecurity Software Lab


IBM today announced a definitive agreement to acquire Trusteer, a provider of software that helps protect organizations against financial fraud and advanced security threats. The acquisition of Trusteer advances the investment IBM is making in cloud-delivered software and services.

Financial terms were not disclosed.

IBM is also forming a cybersecurity software lab in Israel that will bring together more than 200 Trusteer and IBM researchers and developers to focus on mobile and application security, advanced threat, malware, counter-fraud, and financial crimes. This lab is an addition to IBM's existing research and development facilities in Israel.

With offices located in Boston and Tel Aviv, Israel, Trusteer helps hundreds of organizations including many financial institutions protect Web applications, employee and customer computers, and mobile devices from threats. Cybercriminals are becoming increasingly efficient in creating and deploying attacks to bypass existing security controls.

Trusteer software can identify security threats that can be missed by traditional security software. For example, to help ensure that banking customers can safely transfer money on a mobile device, Trusteer software performs detection of malware that can infect a smartphone, enabling the bank to take steps to prevent fraudulent behavior and account takeover before the transaction occurs.

Among the capabilities Trusteer will bring to the IBM security portfolio:

Cloud-delivered security solutions by Trusteer will complement more than 100 Software as a Service (SaaS) solutions offered by IBM. In addition to traditional IT solutions, Trusteer leverages SaaS architecture to enable protected PCs, desktops, smartphones and tablets to rapidly adapt against emerging threats. Because Trusteer software can be delivered through the cloud, organizations can receive real-time updates on malicious activities and the latest threats.

Trusteer's cybersecurity protection can scale to help protect tens of millions of endpoints, including smartphones and tablets. One of the primary targets of malware attacks are consumer endpoints. Malware installed on a bank customer's PC or smartphone, for example, can generate fraudulent transactions. Additionally, malware and phishing can help attackers steal credentials and other personal data. Financial malware and fraudulent activity can be identified and removed using solutions from Trusteer.

The acquisition of Trusteer will complement IBM's advanced portfolio of counter- fraud software and services, including QRadar, i2, SPSS, InfoSphere and Enterprise Content Management.


Previous
Next
Ask Google For Your Flights, Reservations, Package Delivery Info        All News        Windows 8.1 Begins Rolling Out Oct. 18
Ask Google For Your Flights, Reservations, Package Delivery Info     General Computing News      Windows 8.1 Begins Rolling Out Oct. 18

Get RSS feed Easy Print E-Mail this Message

Related News
IBM Opens Threat Intelligence to Combat Cyber Attacks
IBM Announces Partnerships to Transform Personal Health with Watson and Open Cloud
IBM Sets New Record for Tape Storage
IBM and China Telecom Partner to Accelerate Mobile Enterprise Adoption in China
IBM Connects Internet of Things to the Enterprise
IBM Delivers Cloud Data Services with Twitter Built-In
IBM Buys AlchemyAPI
IBM Unveils New Storage Solutions Based on Micron's Flash
IBM BigInsights Introduces Machine Learning With R
IBM Says Popular Dating Apps Are Vulnerable to Hackers
Cloud Cryptographic Algorithm Protects Personal Data
IBM Posts Fourth-quarter Results

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2015 - All rights reserved -
Privacy policy - Contact Us .