IBM today announced a definitive agreement to acquire Trusteer, a provider of software that helps protect organizations against financial fraud and advanced security threats. The acquisition of Trusteer advances the investment IBM is making in cloud-delivered software and services.
Financial terms were not disclosed.
IBM is also forming a cybersecurity software lab in Israel that will bring together more than 200 Trusteer and IBM researchers and developers to focus on mobile and application security, advanced threat, malware, counter-fraud, and financial crimes. This lab is an addition to IBM's existing research and development facilities in Israel.
With offices located in Boston and Tel Aviv, Israel, Trusteer helps hundreds of organizations including many financial institutions protect Web applications, employee and customer computers, and mobile devices from threats. Cybercriminals are becoming increasingly efficient in creating and deploying attacks to bypass existing security controls.
Trusteer software can identify security threats that can be missed by traditional security software. For example, to help ensure that banking customers can safely transfer money on a mobile device, Trusteer software performs detection of malware that can infect a smartphone, enabling the bank to take steps to prevent fraudulent behavior and account takeover before the transaction occurs.
Among the capabilities Trusteer will bring to the IBM security portfolio:
Cloud-delivered security solutions by Trusteer will complement more than 100 Software as a Service (SaaS) solutions offered by IBM. In addition to traditional IT solutions, Trusteer leverages SaaS architecture to enable protected PCs, desktops, smartphones and tablets to rapidly adapt against emerging threats. Because Trusteer software can be delivered through the cloud, organizations can receive real-time updates on malicious activities and the latest threats.
Trusteer's cybersecurity protection can scale to help protect tens of millions of endpoints, including smartphones and tablets. One of the primary targets of malware attacks are consumer endpoints. Malware installed on a bank customer's PC or smartphone, for example, can generate fraudulent transactions. Additionally, malware and phishing can help attackers steal credentials and other personal data. Financial malware and fraudulent activity can be identified and removed using solutions from Trusteer.
The acquisition of Trusteer will complement IBM's advanced portfolio of counter- fraud software and services, including QRadar, i2, SPSS, InfoSphere and Enterprise Content Management.