February 23, 2016 By Assaf Regev 2 min read

The Challenge With Today’s Fraud Protection Solutions

Today’s fraud prevention solutions suffer from a number of maladies, from focusing on a narrow set of attack vectors to a lack of visibility needed to combat new and emerging threats. The challenge lies in the amount of relevant information that is aggregated and analyzed and the updated countermeasures that are deployed accordingly.

In many cases, organizations are expending resources chasing down missed fraud and false alerts, which creates a significant waste of resources for their fraud teams and organization while ultimately burdening the customer with unnecessary authentication challenges.

It’s Time for a Change

IBM Security Trusteer has been pioneering an adaptive, cloud-based fraud protection service to help financial institutions continuously and automatically maintain effective cyber defenses. This means that if a new threat is seen on any single customer device anywhere in the world, new defenses are implemented and propagated across all our protected devices globally.

Now, by integrating Trusteer’s offerings with leading IBM offerings, we are introducing an end-to-end cybersecurity protection suite. The IBM Security Trusteer Fraud Protection Suite can help organizations better detect fraud, help enforce access to online and mobile accounts, help analyze suspected fraud incidents and remediate devices identified as being infected with active malware.

Bringing together these four capabilities into a single integrated suite provides financial institutions with powerful, sustainable and adaptable fraud protection from a single-source provider, helping to simplify ongoing maintenance and enhancements.

The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud management to help your organization more accurately identify and prevent fraud — all while helping to lower costs and improve the end-user experience.

It can provide out-of-the-box integration for IBM fraud detection, enforcement, investigation and remediation solutions, including the following:

https://www.youtube.com/watch?v=LusPzaTs0Bk

IBM Security Trusteer Momentum

Since its acquisition in 2013, IBM Security Trusteer has gathered tremendous momentum:

  • More than 475 leading global organizations use IBM Security Trusteer offerings.
  • Threat intelligence has been gathered from more than 270 million endpoints.
  • Our cloud infrastructure has expanded globally with locations in the United States, Europe and Japan, more than tripling our capacity and improving our response times.
  • We have more than doubled our staff covering research, development, security analysts, sales and marketing.
  • We have introduced new product releases with increased functionality and effectiveness, along with tighter integration with the greater IBM portfolio.
  • Major financial institutions use IBM Security Trusteer offerings to:
    • Help protect customers against financial fraud by detecting risky devices and transactions
    • Build a more secure mobile platform that helps manage cyberfraud by providing mobile financial malware detection
    • Help to detect, block and remediate malware and phishing threats across both customer and employee endpoints.

More from

New proposed federal data privacy law suggests big changes

3 min read - After years of work and unsuccessful attempts at legislation, a draft of a federal data privacy law was recently released. The United States House Committee on Energy and Commerce released the American Privacy Rights Act on April 7, 2024. Several issues stood in the way of passing legislation in the past, such as whether states could issue tougher rules and if individuals could sue companies for privacy violations. With the American Privacy Rights Act of 2024, the U.S. government established…

AI cybersecurity solutions detect ransomware in under 60 seconds

2 min read - Worried about ransomware? If so, it’s not surprising. According to the World Economic Forum, for large cyber losses (€1 million+), the number of cases in which data is exfiltrated is increasing, doubling from 40% in 2019 to almost 80% in 2022. And more recent activity is tracking even higher.Meanwhile, other dangers are appearing on the horizon. For example, the 2024 IBM X-Force Threat Intelligence Index states that threat group investment is increasingly focused on generative AI attack tools.Criminals have been…

The major hardware flaw in Apple M-series chips

3 min read - The “need for speed” is having a negative impact on many Mac users right now. The Apple M-series chips, which are designed to deliver more consistent and faster performance than the Intel processors used in the past, have a vulnerability that can expose cryptographic keys, leading an attacker to reveal encrypted data. This critical security flaw, known as GoFetch, exploits a vulnerability found in the M-chips data memory-dependent prefetcher (DMP). DMP’s benefits and vulnerabilities DMP predicts memory addresses that the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today