Trusteer's three-pronged approach to advanced threat protection

Trusteer Apex and IBM Security Solutions combine to create a protective shield

From the developerWorks archives

developerWorks security editors

Date archived: December 19, 2016 | First published: January 20, 2014

Explore how to help protect your IT environment from exploitation, exfiltration, and credential theft by adding Trusteer Apex. Discover how the Apex software performs these tasks. See how Apex (and other Trusteer software) combines with IBM® security products to create a more secure shield for your organization's data.

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.

Zone=Security, Mobile development
ArticleTitle=Trusteer's three-pronged approach to advanced threat protection