Frequently asked questions

Get answers to the most commonly asked questions about this product.

IBM Trusteer Pinpoint Assure assesses the risk of new or anonymous users. IBM Trusteer Pinpoint Detect continuously assesses the digital identities of known or enrolled users. Finally, IBM Trusteer Pinpoint Verify allows organizations to confirm trust for high-risk users with strong authentication.

IBM Trusteer products are primarily used by banks, financial institutions, insurers, retailers, telco, travel and transportation industries.

In general, software as a service (SaaS) solutions offer the ability to deploy quickly and easily. The SaaS deployment also allows Pinpoint Detect to employ agile, ongoing threat protections, using AI and analytics to identify new threats and patterns.

With Pinpoint Detect, Trusteer is able to provide comprehensive digital identity insights to seamlessly determine whether the user accessing the service is the true user owning that identity.

Today’s threat landscape means companies must make tradeoffs between security and customer experience. Digital identity trust technology lets companies measure both risk and trust to keep the customer’s digital journey secure while offering a better digital experience than ever.

IBM Trusteer Pinpoint Detect enables the collection of intelligence from digital endpoints -- that is, the organization’s mobile app, mobile browser, or desktop browsers — and combines the information with IBM worldwide intelligence sources and complementary third party intelligence sources.

IBM Trusteer Pinpoint Detect takes five context domains into consideration when evaluating risk: user identity and attributes, device information and hygiene, activity being performed or resource being accessed, environmental factors like location and IP networks, and behavioral information.

Pinpoint Detect works transparently, without the need for downloading executable files or plug-ins to the end user's computer. For web applications, Pinpoint uses code embedded into the webpage. For mobile applications, the organization’s app uses the IBM Trusteer Mobile SDK.

As a software as a service (SaaS) solution, Pinpoint Detect can deploy quickly and easily. The best practice is to follow a four stage deployment process, which includes scoping, implementation, launch, and validation with training.

Launch the interactive demo for a step by step walk through, or get more detailed implementation techniques at the Security Learning Academy.

See how it works

Learn more