February 23, 2016 By Assaf Regev 2 min read

The Challenge With Today’s Fraud Protection Solutions

Today’s fraud prevention solutions suffer from a number of maladies, from focusing on a narrow set of attack vectors to a lack of visibility needed to combat new and emerging threats. The challenge lies in the amount of relevant information that is aggregated and analyzed and the updated countermeasures that are deployed accordingly.

In many cases, organizations are expending resources chasing down missed fraud and false alerts, which creates a significant waste of resources for their fraud teams and organization while ultimately burdening the customer with unnecessary authentication challenges.

It’s Time for a Change

IBM Security Trusteer has been pioneering an adaptive, cloud-based fraud protection service to help financial institutions continuously and automatically maintain effective cyber defenses. This means that if a new threat is seen on any single customer device anywhere in the world, new defenses are implemented and propagated across all our protected devices globally.

Now, by integrating Trusteer’s offerings with leading IBM offerings, we are introducing an end-to-end cybersecurity protection suite. The IBM Security Trusteer Fraud Protection Suite can help organizations better detect fraud, help enforce access to online and mobile accounts, help analyze suspected fraud incidents and remediate devices identified as being infected with active malware.

Bringing together these four capabilities into a single integrated suite provides financial institutions with powerful, sustainable and adaptable fraud protection from a single-source provider, helping to simplify ongoing maintenance and enhancements.

The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud management to help your organization more accurately identify and prevent fraud — all while helping to lower costs and improve the end-user experience.

It can provide out-of-the-box integration for IBM fraud detection, enforcement, investigation and remediation solutions, including the following:

https://www.youtube.com/watch?v=LusPzaTs0Bk

IBM Security Trusteer Momentum

Since its acquisition in 2013, IBM Security Trusteer has gathered tremendous momentum:

  • More than 475 leading global organizations use IBM Security Trusteer offerings.
  • Threat intelligence has been gathered from more than 270 million endpoints.
  • Our cloud infrastructure has expanded globally with locations in the United States, Europe and Japan, more than tripling our capacity and improving our response times.
  • We have more than doubled our staff covering research, development, security analysts, sales and marketing.
  • We have introduced new product releases with increased functionality and effectiveness, along with tighter integration with the greater IBM portfolio.
  • Major financial institutions use IBM Security Trusteer offerings to:
    • Help protect customers against financial fraud by detecting risky devices and transactions
    • Build a more secure mobile platform that helps manage cyberfraud by providing mobile financial malware detection
    • Help to detect, block and remediate malware and phishing threats across both customer and employee endpoints.

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today