Trusteer
   HOME

TheInfoList



OR:

Trusteer is a Boston-based computer security division of IBM, responsible for a suite of security software. Founded by Mickey Boodaei and Rakesh K. Loonkar, in Israel in 2006, Trusteer was acquired in September 2013 by IBM for $1 billion. Trusteer's products aim to block online threats from malware and phishing attacks, and to support regulatory compliance requirements. Trusteer's malware research team aims to analyze information received from the installed base of 30,000,000 user endpoints and hundreds of organizations. Trusteer has a presence in North America, South America, Europe, Africa, Japan and China.


Products

Trusteer's products aim to prevent incidents at the point of attack while investigating their source to mitigate future attacks. In addition, Trusteer allows organizations to receive immediate alerts, and to report whenever a new threat is launched against them or their customers.


Trusteer Rapport

Trusteer Rapport is security software advertised as an additional layer of security to anti-virus software. It is designed to protect confidential data, such as account credentials, from being stolen by malicious software (malware) and via phishing. To achieve this goal, the software includes anti-phishing measures to protect against misdirection and attempts to prevent malicious
screen scraping Data scraping is a technique where a computer program extracts data from human-readable output coming from another program. Description Normally, data transfer between programs is accomplished using data structures suited for automated processin ...
; it attempts to protect users against the following forms of attacks:
man-in-the-browser Man-in-the-browser (MITB, MitB, MIB, MiB), a form of Internet threat related to man-in-the-middle (MITM), is a proxy Trojan horse that infects a web browser by taking advantage of vulnerabilities in browser security to modify web pages, modify tra ...
,
man-in-the-middle In cryptography and computer security, a man-in-the-middle, monster-in-the-middle, machine-in-the-middle, monkey-in-the-middle, meddler-in-the-middle, manipulator-in-the-middle (MITM), person-in-the-middle (PITM) or adversary-in-the-middle (AiTM) ...
,
session hijacking In computer science, session hijacking, sometimes also known as cookie hijacking, is the exploitation of a valid computer session—sometimes also called a ''session key''—to gain unauthorized access to information or services in a computer sys ...
and screen capturing. On installation, Rapport also tries to remove existing financial malware from end-user machines and to prevent future infection. The client is available for multiple platforms in the form of a browser extension. As of March 2020, the Windows version supports
Google Chrome Google Chrome is a cross-platform web browser developed by Google. It was first released in 2008 for Microsoft Windows, built with free software components from Apple WebKit and Mozilla Firefox. Versions were later released for Linux, macOS ...
,
Microsoft Edge Microsoft Edge is a proprietary, cross-platform web browser created by Microsoft. It was first released in 2015 as part of Windows 10 and Xbox One and later ported to other platforms as a fork of Google's Chromium open-source project: Android ...
,
Mozilla Firefox Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. It uses the Gecko rendering engine to display web pages, which implements current and a ...
, and Microsoft
Internet Explorer Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly abbreviated IE or MSIE) is a series of graphical user interface, graphical web browsers developed by Microsoft which was used in the Microsoft Wind ...
on Windows 7 and later; while the macOS version supports Google Chrome, Mozilla Firefox, and
Apple Safari Safari is a web browser developed by Apple. It is built into macOS, iOS, and iPadOS, and uses Apple's open-source browser engine, WebKit, which was derived from KHTML. Safari was introduced in Mac OS X Panther in January 2003. It was inclu ...
on macOS 10.12 (Sierra) and later. Financial institutions offer the software free of charge with a view to making
online banking Online banking, also known as internet banking, web banking or home banking, is an electronic payment system that enables customers of a bank or other financial institution to conduct a range of financial transactions through the financial inst ...
safer for customers. Banks offering the software include
Bank of America The Bank of America Corporation (often abbreviated BofA or BoA) is an American multinational investment bank and financial services holding company headquartered at the Bank of America Corporate Center in Charlotte, North Carolina. The bank w ...
,
Société Générale Société Générale S.A. (), colloquially known in English as SocGen (), is a French-based multinational financial services company founded in 1864, registered in downtown Paris and headquartered nearby in La Défense. Société Générale ...
,
Tangerine The tangerine is a type of citrus fruit that is orange in color. Its scientific name varies. It has been treated as a separate species under the name ''Citrus tangerina'' or ''Citrus'' × ''tangerina'', or treated as a variety of ''Citrus retic ...
, INGDirect,
HSBC HSBC Holdings plc is a British multinational universal bank and financial services holding company. It is the largest bank in Europe by total assets ahead of BNP Paribas, with US$2.953 trillion as of December 2021. In 2021, HSBC had $10.8 tri ...
,
CIBC The Canadian Imperial Bank of Commerce (CIBC; french: Banque canadienne impériale de commerce) is a Canadian multinational banking and financial services corporation headquartered at CIBC Square in the Financial District of Toronto, Ontario. T ...
, BMO,
Guaranty Trust Bank Guaranty Trust Holding Company PLC also known as GTCO PLC is a multinational financial services group, that offers retail and investment banking, pension management, asset management and payments services, headquartered in Victoria Island, Lagos ...
(GTBank),
Ecobank Ecobank, whose official name is Ecobank Transnational Inc. (ETI), is a pan-African banking conglomerate, with banking operations in 36 African countries. It is the leading independent regional banking group in West Africa and Central Africa, se ...
Davivienda Davivienda is a Colombian bank founded on August 1, 1972, which renders services to individuals, companies, and the rural sector. Currently, it is part of Grupo Bolivar and it is the third-largest bank in Colombia by assets and profits. History ...
and
First Republic Bank First Republic Bank is an American full-service bank and wealth management company offering personal banking, business banking, trust, and wealth management services, catering to low-risk, high net-worth clientele, and focusing on providing pe ...
. Some banks which had offered the software discontinued offering it. For instance,
NatWest National Westminster Bank, commonly known as NatWest, is a major retail and commercial bank in the United Kingdom based in London, England. It was established in 1968 by the merger of National Provincial Bank and Westminster Bank. In 2000, it ...
and
RBS RBS may refer to: Organisations Banking * The Royal Bank of Scotland, a retail banking subsidiary of NatWest Group ** RBS International, the offshore banking arm of NatWest Group Education * Regent's Business School * Rotterdam Business School ...
withdrew use in January 2019, stating that "The security and fraud prevention technologies we now use provide you a higher and far broader level of protection."


Trusteer Pinpoint

Trusteer Pinpoint is a web-based service that allows financial institutions to detect and mitigate malware, phishing and account takeover attacks without installing any software on endpoint devices. It allows companies concerned about online fraud or data theft to scan their Web traffic to ensure that an outside laptop or desktop that is brought into a corporate network is not infected with malware before allowing the visitor access to their Web services. Trusteer Pinpoint combines device fingerprinting, proxy detection and malware infection detection. When a user infected with malware accesses an online banking site protected by Trusteer Pinpoint Malware Detection, it identifies the infection and malware type (e.g. “User Steve is infected with Prinimalka-Gozi”), alerts the bank and flags the user's credentials as compromised. Once notified, banks can immediately contact the end user to have them install Trusteer Rapport which will remove the malware. Trusteer Pinpoint Account Takeover Detection also fingerprints the device and checks for the use of proxies.


Trusteer Mobile Fraud Risk Prevention

Mobile Risk Engine aims to protect organizations against mobile and PC-to-mobile (cross-channel) attacks. The product tries to detect and stops account takeover from mobile devices by identifying criminal access attempts. It also tries to identify devices that are vulnerable to compromise by malware and those that have been infected. Trusteer Mobile Risk Engine is a web-based service that includes the Trusteer Mobile SDK, Trusteer Mobile App, Trusteer Mobile Out-of-Band Authentication, and Mobile Risk API. The combination of Mobile Risk Engine and its client-side components provide device fingerprinting for mobile devices, account takeover prevention from mobile devices, detection of compromised mobile devices, and access to a global fraudster database.


Trusteer Apex

Trusteer Apex is an automated solution that tries to prevent exploits and malware from compromising the endpoints and extracting information. Apex has three layers of security: exploit prevention, data exfiltration prevention and credentials protection. Apex protects employee credentials from phishing attacks by validating that employees are submitting their credentials only to authorized enterprise web-application login URLs. Apex also prevents corporate employees from re-using their corporate credentials to access non-corporate, public applications like PayPal, e-Bay, Facebook or Twitter. Apex requires users to provide different credentials for such applications, to lower the risk of credentials exposure. Trusteer Apex is targeted at the behaviors of a small group of applications, on the hypothesis that they are responsible for the overwhelming majority of exploits, namely Java, Adobe's Reader and Flash, and Microsoft's Office. The technology behind Trusteer Apex does not rely on threat signatures, or on so-called "whitelists" of good applications. Instead, it watches applications as they run and spots suspicious or malicious behavior, based on knowledge of "normal" application behavior that it has refined from its large user base. Trusteer claims Apex can block both web based attacks that are used to implant malware by exploiting vulnerable applications, and data loss due to malware infections by spotting attempts by untrusted applications or processes to send data outside an organization or connect with Internet-based command and control (C&C) networks.


Technical concerns

End users have reported problems with Rapport, slow PCs due to high CPU and RAM utilization, incompatibility with various security/antivirus products and difficulty in removing the software.Davey Winder
Is HSBC's security software more trouble than it's worth?
''PC Pro'' magazine, 20 Jul 2010
The consumer organisation ''
Which? ''Which?'' is a United Kingdom brand name that promotes informed consumer choice in the purchase of goods and services by testing products, highlighting inferior products or services, raising awareness of consumer rights and offering independen ...
'' found that many members had problems due to running Trusteer Rapport, and advised against using it. They found that it could conflict with other security software, and slow or crash the Web browser. ''Which?'' emphasises that it is the bank's responsibility, not Rapport's, to protect customers' online banking, adding that online banking can be perfectly safe without Trusteer Rapport; its only benefit would be detecting a phishing site masquerading as the bank—"but plenty of other tools, including most modern browsers, can do this anyway". They clarify that the software is legitimate and respectable, but "don't feel the claims on Rapport's website add up". In a presentation given at 44con in September 2011, bypassing Trusteer Rapport's keylogger protection was shown to be relatively trivial. Shortly thereafter Trusteer confirmed that the flaw was corrected and said that even if a hacker were able to use the flaw to disable anti-keylogging functions in Rapport, other secondary security protection technologies would still be in play. Rapport software is incompatible with
Windows Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for serv ...
tool
Driver Verifier Driver Verifier is a tool included in Microsoft Windows that replaces the default operating system subroutines with ones that are specifically developed to catch device driver bugs. Once enabled, it monitors and stresses drivers to detect illeg ...
and may cause Blue Screen and system crash. Since Driver Verifier is not intended for end users in a production environment or workstations, Trusteer Support recommends that end users do not run Driver Verifier with Trusteer Endpoint Protection installed.


Blue Gem lawsuit

In March 2011, Blue Gem, a rival company, filed a lawsuit against Trusteer in a California court. Blue Gem accused Trusteer of plagiarizing their code in order to maintain compatibility between anti-
keystroke logging Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored ...
software types of Intel chipset that were first introduced back in 2007. Trusteer has described the accusations as "baseless".BlueGem lawsuit detail
/ref>


See also

* trustee (disambiguation)


References


External links

*
Frost and Sullivan Report

Reuters article

BBC article
{{IBM Computer security companies Companies based in Boston Computer security software companies IBM subsidiaries IBM acquisitions 2006 establishments in Israel