Re-defining Endpoint Protection for Advanced Threats
Trusteer Apex protects endpoints throughout the threat lifecycle by applying an integrated, multi-layered defense to prevent endpoint compromise. The preemptive approach breaks the attack chain – the end-to-end process used by attackers to breach an organization – by choking off attacks at the strategic chokepoints. Through extensive research, Trusteer has identified and mapped out the strategic chokepoints which are the specific stages of the attack chain where the attacker has relatively few execution options. Apex leverages in-depth technical expertise and unique low level visibility into application execution paths, to accurately and effectively control the strategic chokepoints. As a result, Apex provides powerful advanced threat protection against both unknown/zero-day threats and known malware, with a low operational impact to your security team and your end users.
Financial institutions and other enterprises rely on Trusteer to protect their web applications and their employees’ and customers’ computers and mobile devices from online threats that are often invisible to legacy security solutions. Trusteer combines multi-layer security software with real-time threat intelligence designed to achieve sustainable protection against malware and phishing attacks and help customers meet regulatory compliance requirements.
IBM Expands Security Portfolio to Combat Financial Fraud and Advanced Security Threats
IBM has closed the acquisition of Trusteer, a privately held leading provider of software that helps protect organizations against financial fraud and advanced security threats.
Also announced on August 15, IBM is forming a cybersecurity software lab in Israel that will bring together more than 200 Trusteer and IBM researchers and developers to focus on mobile and application security, advanced threat protection, malware, counter-fraud, and financial crimes. This lab is an addition to IBM’s existing research and development facilities in Israel.
IBM Threat Protection System
Prevention is possible. Discover how the latest advances in Threat Protection can keep your organization safe.
The Blueprint of Advanced Attacks
See how the Threat Protection System can helpLearn more
Cybersecurity 2014 Roadshow
NEW: Cybersecurity 2014 Roadshow coming to 6 cities in North America"
Announcing 20/20 Vision: Identity and Access Management Roadshow 2014
Meet IBM Security experts to help you prepare for security challenges for IAM solutions.Learn more
IBM X-Force Threat Intelligence Quarterly - 2Q 2014
Learn about emerging security threats and trends