Verify Trust Overview

IBM® Verify Trust ("Verify Trust") is designed to help companies quickly and transparently create and sustain trust with existing customers throughout the digital omnichannel lifecycle. It uses the trust that is created to provide security for an organization's users.

Verify Trust offers a multilayered and holistic user view as well as a modular approach that can help organizations transparently build identity trust with a wide range of users for a seamless digital customer experience. It provides protection against account takeover, phishing, social engineering, bots, malware, remote access trojans (RAT), mobile overlay attacks, authorized push payment fraud (APP fraud), emulators, SMS stealers, rooting/jailbreaking, spoofed devices, and SIM swap attacks, while leveraging multi-factor authentication (MFA) feedback data to both increase coverage and reduce friction.

IBM Trusteer® offers a multilayered and holistic user view built on top ofVerify Trust solutions benefit from a powerful intelligence service. This service combines AI, machine learning, and advanced analytics technology to analyze millions of sessions every hour together with human intelligence and experienced threat researchers. Cross-organization, global consortium, and new threat insights are all combined to identify emerging patterns and evolving threats, and rapidly adapt protections.

Additionally, a scalable, agile cloud platform simplifies deployment and enables real-time risk assessment based on the latest intelligence for increased operational efficiency and reduced costs.

To learn about the broader capabilities and value that Pinpoint can bring to help you detect fraud, authenticate users, and establish identity trust across the omni-channel journey, see https://www.ibm.com/security/fraud-protection/trusteer.
Table 1. Pinpoint Business Solutions
Pinpoint Product Business Solution Key Capabilities
Pinpoint Assure Helps organizations detect and predict identity risk for guest and new users during the new digital account creation process. Correlates rich proprietary insights, mobile carrier intelligence, and global security intelligence specific to new and anonymous users, including:
  • Behavioral and user journey analysis to help detect malicious bot attacks or known malicious activity usage patterns.
  • Device identification, association, authenticity, and hygiene to identify if the device is trustworthy.
  • Phone number reputation and intelligence
  • Identity linkages that show if the same identity or identity attributes are opening new accounts or conducting transactions at a velocity or rate that does not match legitimate activity at other companies that use IBM Trusteer solutions.
  • Malicious evidence consortium data from a worldwide network
  • An ecosystem-friendly approach that exposes and enables the usage of IBM Trusteer new account intelligence.
Pinpoint Detect Helps assess risk dynamically and authenticate known digital identities
  • Enables real-time assessment and provides recommended actions to help detect and mitigate fraudulent activities.
  • Enables fraud analysts to customize new policies and rapidly deploy countermeasures with visibility to IBM Trusteer crime logic.
  • Provides device identification by using device characteristics, and a global device identifier
  • Provides environment intelligence, such as location and connection attributes
  • Uses behavioral biometric capabilities to seamlessly authenticate users by building models that are based on patterns of mouse movements, keyboard typing, and mobile touchscreen swipes in real time and analyzing patterns against learned user behavior and known fraud patterns.
  • Identifies access using compromised credentials
Pinpoint Detect for Remote Workforce Helps assess risk dynamically and authenticate known digital identities for a remote workforce.
  • Enables real-time assessment and provides recommended actions to help detect and mitigate fraudulent activities.
  • Enables fraud analysts to customize new policies and rapidly deploy countermeasures with visibility to IBM Trusteer crime logic.
  • Deployed digitally as a software-as-a-service (SaaS) offering that can be up and running within hours.
  • Provides device identification by using device characteristics
  • Provides environment intelligence, such as location and connection attributes
  • Integration with the IBM Security QRadar SIEM solution for consolidated visibility, detection, investigation, and response to threats from across the enterprise.