Trusteer Apex


Re-defining Endpoint Protection for Advanced Threats

Trusteer Apex protects endpoints throughout the threat lifecycle by applying an integrated, multi-layered defense to prevent endpoint compromise. The preemptive approach breaks the attack chain – the end-to-end process used by attackers to breach an organization – by choking off attacks at the strategic chokepoints. Through extensive research, Trusteer has identified and mapped out the strategic chokepoints which are the specific stages of the attack chain where the attacker has relatively few execution options. Apex leverages in-depth technical expertise and unique low level visibility into application execution paths, to accurately and effectively control the strategic chokepoints. As a result, Apex provides powerful advanced threat protection against both unknown/zero-day threats and known malware, with a low operational impact to your security team and your end users.


Financial institutions and other enterprises rely on Trusteer to protect their web applications and their employees’ and customers’ computers and mobile devices from online threats that are often invisible to legacy security solutions. Trusteer combines multi-layer security software with real-time threat intelligence designed to achieve sustainable protection against malware and phishing attacks and help customers meet regulatory compliance requirements.

Trusteer offers:


IBM Expands Security Portfolio to Combat Financial Fraud and Advanced Security Threats

IBM has closed the acquisition of Trusteer, a privately held leading provider of software that helps protect organizations against financial fraud and advanced security threats.

Also announced on August 15, IBM is forming a cybersecurity software lab in Israel that will bring together more than 200 Trusteer and IBM researchers and developers to focus on mobile and application security, advanced threat protection, malware, counter-fraud, and financial crimes. This lab is an addition to IBM’s existing research and development facilities in Israel.

IBM Trusteer. IBM Closes on Acquisition of Trusteer. Learn more. IBM Trusteer. IBM Closes on Acquisition of Trusteer. Learn more.

IBM Threat Protection System

.

Prevention is possible. Discover how the latest advances in Threat Protection can keep your organization safe.

The Blueprint of Advanced Attacks

  • See how the Threat Protection System can help

    Learn more

Cybersecurity 2014 Roadshow

NEW: Cybersecurity 2014 Roadshow coming to 6 cities in North America"

Follow the Money, Follow the Crime. Latest X-Force security trends to help you stay one step ahead of cybercriminals

Announcing 20/20 Vision: Identity and Access Management Roadshow 2014

  • Meet IBM Security experts to help you prepare for security challenges for IAM solutions.

    Learn more

IBM X-Force Threat Intelligence Quarterly - 2Q 2014

  • IBM X-Force Threat Intelligence Quarterly - 1Q 2014

    Learn about emerging security threats and trends


For More information

See IBM Security in Action