NEW RAF INTELLIGENCE AIRCRAFT ARRIVES IN UK SEVE... » As part of its Airseeker Programme, the second signals intelligence aircraft has been delivered to t... Tenkay invests six figure sum for the future » Tenkay has installed a new state-of-the-art M20 component handling machine that is expected to incre... Stop Warmongering to preserve a Fraudulent Constit... » Email: Sundoor999@gmail.com Introduction In September 2013, as public clamor intensified for a Sov... Tripwire announces Asset Discovery Solution » London, UK: Tripwire, Inc.announced the debut of Tripwire® Asset Discovery Appliances, a high-perfor... HP unveils data-centric security protection enhanc... » New enterprise data security offerings from HP Atalla and HP Security Voltage address collaboration,... Tripwire announces asset discovery solution » PORTLAND, Ore.: Tripwire, Inc., has announced the debut of Tripwire® Asset Discovery Appliances, a h... Master Locksmiths Association joins powered gate... » The Master Locksmiths Association (MLA), the UK's leading trade association for the locksmith indust... Collyer Bristow is Deploying Enterprise Resource P... » LONDON, U.K LexisNexis® Enterprise has announced that Collyer Bristow LLP, a London-based law firm s... gateprotect listed in the Magic Quadrant for UTM F... » Hamburg: gateprotect, a German IT security specialist within the Rohde & Schwarz company group, was ... Duo to raise money for Blesma as part of Deloitte’... » Mark Powell, 42, and Matthew Toye, 43, will be cycling nearly 1000 miles from Land’s End to John O’G...

CLICK HERE TO

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

Cybersecurity software lab will focus on mobile and application security

ARMONK, N.Y.: IBM (NYSE: IBM) yesterday announced that it had completed the acquisition of Trusteer, Ltd., a privately held leading provider of software that helps protect organizations against fraud and advanced security threats. On August 15, IBM announced that it had entered into a definitive agreement to acquire Trusteer. Financial terms were not disclosed.

"The acquisition of Trusteer builds on more than 40 years of IBM’s rich contribution to the security space,” said Brendan Hannigan, General Manager, IBM Security Systems. “Trusteer will extend our data security capabilities further into the cloud, mobile and endpoint security space. This acquisition helps provide our clients with comprehensive network and endpoint anti-malware solutions.”

Also announced on August 15, IBM is forming a cybersecurity software lab in Israel that will bring together more than 200 Trusteer and IBM researchers and developers to focus on mobile and application security, advanced threat protection, malware, counter-fraud, and financial crimes. This lab is an addition to IBM’s existing research and development facilities in Israel.

“This acquisition is further proof that IBM is serious about providing clients with the security intelligence capabilities to help protect organizations in a constantly evolving threat landscape,” said John Johnson, Global Security Strategist, John Deere. “As part of IBM, Trusteer’s counter-fraud capabilities, along with the creation of a cybersecurity software lab, will help make advances in counter-fraud and malware protection.”

Among the capabilities Trusteer will bring to the IBM security portfolio:

Comprehensive Counter-Fraud and Advanced Persistent Threat (APT) Protection

Trusteer's cybersecurity protection scales to help protect tens of millions of endpoints, including smartphones and tablets. Malware and fraudulent activity can be identified and removed using solutions from Trusteer.

Security as a Service Delivered through the Cloud

Cloud-delivered security solutions by Trusteer will complement more than 100 Software as a Service (SaaS) solutions offered by IBM. Because Trusteer software can be delivered through the cloud, organizations can receive accurate, real-time updates on malicious activities and the latest threats, better protecting data from fraud and compromise.

Helping to Secure Mobile Transactions

Trusteer can help provide account takeover prevention with compromised device detection, complex device fingerprinting and a global fraudster database.