Home

Security

Trusteer

IBM Trusteer Solutions
Authenticate customers, detect fraud and protect against malicious users across all channels
Access the Leadership Compass report
Close up of a person using contactless payment via smartphone to pay for her shopping at ATM

Digital Fraud Landscape Webinar

Find out how you can protect your customers from fraudsters in 2025. Join us on 4 February at 1 PM ET/7 PM CET for a webinar about the latest fraud trends and how to detect them.

Register now

Optimize security and customer experience

IBM® Trusteer® is a family of cloud services and endpoint device software that uses cloud-based intelligence, AI and machine learning to help assess risk, detect fraud, establish identity and authenticate users.

 

Establish continuous trust

Use real-time risk assessment throughout a user's digital journey to monitor for suspicious activity.

Respond to the latest fraud threats

A global intelligence network of millions of devices and world-class fraud researchers is at your fingertips.

Enable a unified fraud detection solution

Enable cross-channel coverage for mobile devices and web platforms, from account opening to daily user journeys.

Scale with an agile cloud platform

Establish cross-organizational, actionable insights that can scale with your business.

Trusteer product family

IBM® Trusteer® Pinpoint Detect

Outsmart account takeover attempts with AI, behavioral biometrics and machine learning.

IBM® Trusteer® Pinpoint Assure

Help power digital transformations by seamlessly assessing the risk of new and guest digital identities.

IBM® Trusteer® Mobile

Enhance your mobile growth with real-time accurate device hygiene and session risk assessment.

IBM® Trusteer Rapport®

Detect and remediate malware and identify phishing attacks.

Proven results 156%

156% ROI driven by Trusteer, as documented in the Forrester TEI report.¹

+90%

Over 90% fraud detection rate of account takeover.

+80%

Over 80% fraud detection rate for overlays and scams.

Multilayered risk assessment

IBM Trusteer analyzes devices on several levels. Device attributes are reviewed and checked for spoofing and abnormalities. Devices are then checked for malware before being scanned for other cybercriminal tools such as emulators, screen overlays and remote access tools.
Network information is crucial in determining the risk associated with a potential fraudulent activity. Trusteer checks for the location, carrier or hosting service while also detecting whether a VPN is being used or a call is in progress on the device because these are common social engineering techniques.
Behavior of a user can be assessed by looking at behavioral biometrics such as swipes, keystrokes, mouse movements, session length and more. These can be compared to previous user sessions and flagged if discrepancies are detected.
Data relating to the user’s accounts can be key in determining whether a cybercriminal is performing fraudulent activities. Transactional data such as amounts, targeted accounts and transactional types alongside account opening data can be analyzed and used to prevent funneling of funds to criminals.
IBM Trusteer employs a team of world-class threat experts that constantly monitor the dark web to identify emerging threats and devise ways to detect them. In addition, they tap into a global intelligence network of millions of devices across 190 countries by using a unique and persistent fingerprint for every device.
IBM Trusteer analyzes devices on several levels. Device attributes are reviewed and checked for spoofing and abnormalities. Devices are then checked for malware before being scanned for other cybercriminal tools such as emulators, screen overlays and remote access tools.
Network information is crucial in determining the risk associated with a potential fraudulent activity. Trusteer checks for the location, carrier or hosting service while also detecting whether a VPN is being used or a call is in progress on the device because these are common social engineering techniques.
Behavior of a user can be assessed by looking at behavioral biometrics such as swipes, keystrokes, mouse movements, session length and more. These can be compared to previous user sessions and flagged if discrepancies are detected.
Data relating to the user’s accounts can be key in determining whether a cybercriminal is performing fraudulent activities. Transactional data such as amounts, targeted accounts and transactional types alongside account opening data can be analyzed and used to prevent funneling of funds to criminals.
IBM Trusteer employs a team of world-class threat experts that constantly monitor the dark web to identify emerging threats and devise ways to detect them. In addition, they tap into a global intelligence network of millions of devices across 190 countries by using a unique and persistent fingerprint for every device.

Case studies

Hundreds of leading organizations rely on Trusteer to help secure their customers’ digital journeys and support business growth.

Take the next step

Discuss your fraud detection and digital identity trust use case with a Trusteer expert.

Access the Leadership Compass report
More ways to explore Documentation Security Intelligence Blog Support Fraud prevention solutions Get the Cost of a Data Breach report
Footnotes

"The Total Economic Impact™ of IBM Trusteer", Forrester Research, March 2020